15.5 Admin Guide PDF
15.5 Admin Guide PDF
Prevention Administration
Guide
Version 15.5
Legal Notice
Copyright © 2019 Symantec Corporation. All rights reserved.
Symantec, CloudSOC, Blue Coat, the Symantec Logo, the Checkmark Logo, the Blue Coat logo, and the
Shield Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S.
and other countries. Other names may be trademarks of their respective owners.
This Symantec product may contain third party software for which Symantec is required to provide attribution
to the third party (“Third Party Programs”). Some of the Third Party Programs are available under open
source or free software licenses. The License Agreement accompanying the Software does not alter any
rights or obligations you may have under those open source or free software licenses. Please see the
Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec
product for more information on the Third Party Programs.
The product described in this document is distributed under licenses restricting its use, copying, distribution,
and decompilation/reverse engineering. No part of this document may be reproduced in any form by any
means without prior written authorization of Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE
DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY
INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL
DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS
DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO
CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software as defined
in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer
Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and
Commercial Computer Software Documentation," as applicable, and any successor regulations, whether
delivered by Symantec as on premises or hosted services. Any use, modification, reproduction release,
performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government
shall be solely in accordance with the terms of this Agreement.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
https://www.symantec.com
Symantec Support
All support services will be delivered in accordance with your support agreement and the
then-current Enterprise Technical Support policy.
Cleanse the data source file of blank columns and duplicate rows
(EDM) .......................................................................... 603
Remove ambiguous character types from the data source file
(EDM) .......................................................................... 604
Understand how multi-token cell matching functions (EDM) ........... 604
Do not use the comma delimiter if the data source has number
fields (EDM) .................................................................. 605
Map data source column to system fields to leverage validation
(EDM) .......................................................................... 605
Ensure that the data source is clean for indexing (EDM) ............... 605
Leverage EDM policy templates when possible .......................... 606
Include column headers as the first row of the data source file
(EDM) .......................................................................... 606
Check the system alerts to tune profile accuracy (EDM) ............... 607
Use stopwords to exclude common words from detection
(EDM) .......................................................................... 607
Use scheduled indexing to automate profile updates (EDM) .......... 607
Match on 3 columns in an EDM condition to increase detection
accuracy ....................................................................... 608
Leverage exception tuples to avoid false positives (EDM) ............. 609
Use a WHERE clause to detect records that meet specific criteria
(EDM) .......................................................................... 609
Use the minimum matches field to fine tune EDM rules ................ 610
Combine Data Identifiers with EDM rules to limit the impact of
two-tier detection ............................................................ 610
Include an email address field in the Exact Data Profile for profiled
DGM (EDM) .................................................................. 610
Use profiled DGM for Network Prevent for Web identity detection
(EDM) .......................................................................... 611
Include an email address field in the Exact Data Profile for profiled
DGM ............................................................................ 946
Use profiled DGM for Network Prevent for Web identity
detection ...................................................................... 947
Bulgaria Value Added Tax (VAT) Number wide breadth ............... 1061
Bulgaria Value Added Tax (VAT) Number medium breadth .......... 1061
Bulgaria Value Added Tax (VAT) Number narrow breadth ............ 1062
Bulgarian Uniform Civil Number - EGN .......................................... 1063
Bulgarian Uniform Civil Number - EGN wide breadth .................. 1063
Bulgarian Uniform Civil Number - EGN medium breadth ............. 1064
Bulgarian Uniform Civil Number - EGN narrow breadth ............... 1065
Burgerservicenummer ................................................................ 1066
Burgerservicenummer wide breadth ....................................... 1066
Burgerservicenummer narrow breadth .................................... 1066
Canada Driver's License Number ................................................. 1067
Canada Driver's License Number wide breadth ......................... 1067
Canada Driver's License Number medium breadth .................... 1068
Canada Driver's License Number narrow breadth ...................... 1069
Canada Passport Number .......................................................... 1070
Canada Passport Number wide breadth .................................. 1071
Canada Passport Number narrow breadth ............................... 1071
Canada Permanent Residence (PR) Number .................................. 1072
Canada Permanent Residence (PR) Number wide breadth ......... 1072
Canada Permanent Residence (PR) Number narrow
breadth ....................................................................... 1073
Canadian Social Insurance Number .............................................. 1074
Canadian Social Insurance Number wide breadth ...................... 1075
Canadian Social Insurance Number medium breadth ................. 1075
Canadian Social Insurance Number narrow breadth ................... 1076
Chilean National Identification Number .......................................... 1077
Chilean National Identification Number wide breadth .................. 1077
Chilean National Identification Number medium breadth ............. 1078
Chilean National Identification Number narrow breadth ............... 1078
China Passport Number ............................................................. 1079
China Passport Number wide breadth ..................................... 1080
China Passport Number narrow breadth .................................. 1080
Codice Fiscale .......................................................................... 1081
Codice Fiscale wide breadth ................................................. 1081
Codice Fiscale narrow breadth .............................................. 1082
Colombian Addresses ................................................................ 1082
Colombian Addresses wide breadth ........................................ 1083
Colombian Addresses narrow breadth ..................................... 1084
Colombian Cell Phone Number .................................................... 1085
Colombian Cell Phone Number wide breadth ............................ 1085
Colombian Cell Phone Number narrow breadth ......................... 1086
Colombian Personal Identification Number ..................................... 1088
Colombian Personal Identification Number wide breadth ............. 1088
Contents 31
Italy Value Added Tax (VAT) Number narrow breadth ................. 1285
Japan Driver's License Number ................................................... 1285
Japan Driver's License Number wide breadth ........................... 1286
Japan Driver's License Number medium breadth ....................... 1286
Japan Driver's License Number narrow breadth ........................ 1286
Japan Passport Number ............................................................. 1287
Japan Passport Number wide breadth ..................................... 1287
Japan Passport Number narrow breadth .................................. 1288
Japanese Juki-Net Identification Number ....................................... 1289
Japanese Juki-Net Identification Number wide breadth ............... 1289
Japanese Juki-Net Identification Number medium breadth .......... 1290
Japanese Juki-Net Identification Number narrow breadth ............ 1290
Japanese My Number - Corporate ................................................ 1291
Japanese My Number - Corporate wide breadth ........................ 1291
Japanese My Number - Corporate narrow breadth ..................... 1292
Japanese My Number - Personal ................................................. 1292
Japanese My Number - Personal wide breadth ......................... 1293
Japanese My Number - Personal medium breadth ..................... 1293
Japanese My Number - Personal narrow breadth ...................... 1294
Kazakhstan Passport Number ..................................................... 1295
Kazakhstan Passport Number wide breadth ............................. 1295
Kazakhstan Passport Number narrow breadth .......................... 1296
Korea Passport Number ............................................................. 1296
Korea Passport Number wide breadth ..................................... 1297
Korea Passport Number narrow breadth .................................. 1297
Korea Residence Registration Number for Foreigners ...................... 1298
Korea Residence Registration Number for Foreigners wide
breadth ....................................................................... 1298
Korea Residence Registration Number for Foreigners medium
breadth ....................................................................... 1299
Korea Residence Registration Number for Foreigners narrow
breadth ....................................................................... 1299
Korea Residence Registration Number for Korean ........................... 1300
Korea Residence Registration Number for Korean wide
breadth ....................................................................... 1301
Korea Residence Registration Number for Korean medium
breadth ....................................................................... 1301
Korea Residence Registration Number for Korean narrow
breadth ....................................................................... 1302
Latvia Driver's Licence Number .................................................... 1303
Latvia Driver's Licence Number wide breadth ........................... 1303
Latvia Driver's Licence Number narrow breadth ........................ 1304
Latvia Passport Number ............................................................. 1305
Contents 39
Table 1-1 Change history for the Symantec Data Loss Prevention Administration Guide
Date Description
19 August 2019 Corrected the path to the index data files on Windows to read
ProgramData\Symantec\DataLossPrevention\ServerPlatformCommon
\15.5\Protect\datafiles.
Corrected name of the log file for SMTP Prevent. The filename was
SmtpPrevent0.log; now it is RequestProcessor0.log.
Clarified that you must use dedicated hardware or VMs with dedicated
resources for OCR Servers.
Corrected the description of the Limit Incident Data Retention response rule
to indicate that the rule is only supported for Endpoint Prevent.
Table 1-1 Change history for the Symantec Data Loss Prevention Administration Guide
(continued)
Date Description
11 June 2019 Updated Secure ICAP content to reflect that both self-signed and CA-issued
certificates are supported.
Deleted text that indicated document source files uploaded to the Enforce
Server are deleted after indexing. IDM source files are not deleted from the
Enforce Server after indexing.
Added that for OCR, only load balancers without persistence enabled are
supported.
Added support for OCR and Cloud Prevent for Office 365 on Azure.
Fixed squished text in the "Advanced settings for OCR and FR image
extraction" table.
Added detailed information about pre- and post-validator characters for custom
data identifiers.
Added information about whitelisting the Titanium server for SEP Intensive
Protection.
26 March 2019 Updated cross reference to locale settings to one for JDK 8 and JRE 8:
Changed to
https://www.oracle.com/technetwork/java/javase/java8locales-2095355.html.
Fixed broken xref and properties name in Profile size limitations on the DLP
Agent for EMDI.
Removed the “Only available with Network Prevent for Email” text from two
response rule topics: "Network Prevent: Modify SMTP Message" and "Network
Prevent: Block SMTP Message".
6 March 2019 Reinstated procedure for starting an Enforce Server (inadvertently dropped
in previous release).
Table 1-1 Change history for the Symantec Data Loss Prevention Administration Guide
(continued)
Date Description
1 February 2019 ■ Revised entire "Detecting content using Exact Match Data Identifiers"
chapter.
■ Made minor updates to "Using diagnostics for OCR Server deployments"
section.
■ Added new "Creating a null policy to assist in OCR diagnostics for Discover
Servers" section.
■ Fixed formatting in table 69-2.
■ Added Cloud Applications and API Appliance lookup parameters.
■ Corrected data exposure detail description for "Document is Exposed."
■ Safeguard employee privacy. You can use the Enforce Server to review incidents without
revealing the sender identity or message content. In this way, multi-national companies
can meet legal requirements on monitoring European Union employees and transferring
personal data across national boundaries.
See “About role-based access control” on page 109.
■ Copy exposed or suspicious files. Network Protect can automatically copy those files that
violate policies to a quarantine area. The quarantine area can re-create the source file
structure for easy location, and leave the original file in place.
■ Quarantine file restoration. Network Protect can easily restore quarantined files to their
original or a new location.
■ Enforce access control and encryption policies. Network Protect proactively ensures
workforce compliance with existing access control and encryption policies.
See “About Symantec Data Loss Prevention” on page 75.
See “Configuring Network Protect for file shares” on page 2177.
■ FTP
■ HTTP/HTTPS
■ IM
■ Network shares
■ Print/Fax
■ USB removable media devices
See “About Endpoint Discover” on page 80.
See “About Symantec Data Loss Prevention” on page 75.
Chapter 2
Getting started
administering Symantec
Data Loss Prevention
This chapter includes the following topics:
System administration is performed from the Enforce Server administration console, which is
accessed by a Firefox or Internet Explorer Web browser. The Enforce console is displayed
after you log on.
See “About the Enforce Server administration console” on page 83.
After completing the installation steps in the Symantec Data Loss Prevention Installation Guide,
you must perform initial configuration tasks to get Symantec Data Loss Prevention up and
running for the first time. These are essential tasks that you must perform before the system
can begin monitoring data on your network.
See “Performing initial setup tasks” on page 85.
Icon Description
Help. Click this icon to access the context-sensitive online help for your current page.
Select this page as your Home page. If the current screen cannot be selected as
your Home page, this icon is unavailable.
Back to previous screen. Symantec recommends using this Back button rather than
your browser Back button. Use of your browser Back button may lead to
unpredictable behavior and is not recommended.
Screen refresh. Symantec recommends using this Refresh button rather than your
browser Reload or Refresh button. Use of your browser buttons may lead to
unpredictable behavior and is not recommended.
Getting started administering Symantec Data Loss Prevention 84
Logging on and off the Enforce Server administration console
Icon Description
Print the current report. If the current screen contents cannot be sent to the printer,
this icon is unavailable.
Email the current report to one or more recipients. If the current screen contents
cannot be sent as an email, this icon is unavailable.
See “Logging on and off the Enforce Server administration console” on page 84.
3 Click Save.
See “About the administrator account” on page 85.
See “About the Enforce Server administration console” on page 83.
See “About the Overview screen” on page 278.
2 Click Save.
The new text encoding is applied to CSV exported files. This encoding lets you select a
text encoding that matches the encoding that is expected by CSV applications.
To select a CSV delimiter
1 Choose one of the delimiters from the pull-down menu.
2 Click Save.
The new delimiter is applied to the next comma-separated values (CSV) list that you
export.
See “About incident reports” on page 1902.
See “Exporting incident reports” on page 1921.
To select XML export details
1 Include Incident Violations in XML Export. If this box is checked, reports exported to
XML include the highlighted matches on each incident snapshot.
2 Include Incident History in XML Export. If this box is checked, reports exported to XML
include the incident history data that is contained in the History tab of each incident
snapshot.
3 Click Save.
Your selections are applied to the next report you export to XML.
If neither box is checked, the exported XML report contains only the basic incident information.
See “About incident reports” on page 1902.
See “Exporting incident reports” on page 1921.
When your password expires, the system requires you to specify a new one the next time you
attempt to log on. If you are required to change your password, the Password Renewal window
appears.
To change your password from the Password Renewal window
1 Enter your old password in the Old password field of the Password Renewal window.
2 Enter your new password in the New Password field of the Password Renewal window.
3 Re-enter your new password in the Re-enter New Password field of the Password
Renewal window.
The next time you log on, you must use your new password.
You can also change your password at any time from the Profile screen.
See “Editing a user profile” on page 87.
See “About the administrator account” on page 85.
See “Logging on and off the Enforce Server administration console” on page 84.
Chapter 3
Working with languages
and locales
This chapter includes the following topics:
■ About locales
■ International character sets. To view and work with international character sets, the system
on which you are viewing the Enforce Server administration console must have the
appropriate capabilities.
See “Working with international characters” on page 93.
■ Locale-based date and number formats, as well as sort orders for lists and reports.
See “About locales” on page 95.
■ Localized user interface (UI) and Help system. Language packs for Symantec Data Loss
Prevention provide language-specific versions of the Enforce Server administration console.
They may also provide language-specific versions of the online Help system.
Note: These language packs are added separately following initial product installation.
Note: A mixed language notification pop-up displays if the user locale language does not
match the language used in the response rule.
■ Greek
■ Hebrew
■ Hungarian
■ Italian
■ Japanese
■ Korean
■ Norwegian
■ Polish
■ Portuguese
■ Romanian
■ Russian
■ Spanish
■ Swedish
See “About support for character sets, languages, and locales” on page 91.
■ On a Windows system, you add supplemental language support using the Control
Panel > Regional and Language Options > Languages (tab) - Supplemental
Language Support to add fonts for some character sets.
■ It may also be necessary to set your browser to accommodate the characters you want to
view and enter.
Note: The Enforce Server administration console supports UTF-8 encoded data.
Caution: When you install a new version of Symantec Data Loss Prevention, any language
packs you have installed are deleted. For a new, localized version of Symantec Data Loss
Prevention, you must upgrade to a new version of the language pack.
About locales
Locales are installed as part of a language pack.
A locale provides the following:
■ Displays dates and numbers in formats appropriate for that locale.
■ Sorts lists and reports based on text columns, such as "policy name" or "file owner,"
alphabetically according to the rules of the locale.
An administrator can also configure an additional locale for use by individual users. This
additional locale need only be supported by the required version of Java.
For a list of these locales, see
https://www.oracle.com/technetwork/java/javase/java8locales-2095355.html.
The locale can be specified at product installation time, as described in the Symantec Data
Loss Prevention Installation Guide. It can also be configured at a later time using the Language
Pack Utility.
See “Using a non-English language on the Enforce Server administration console” on page 95.
See “About support for character sets, languages, and locales” on page 91.
Note: The addition of multiple language packs could slightly affect Enforce Server performance,
depending on the number of languages and customizations present. This occurs because an
additional set of indexes has to be built and maintained for each language.
Warning: Do not modify the Oracle database NLS_LANGUAGE and NLS_TERRITORY settings.
See “About Symantec Data Loss Prevention language packs” on page 94.
See “About locales” on page 95.
Working with languages and locales 96
Using the Language Pack Utility
A Symantec Data Loss Prevention administrator specifies which of the available languages
is the default system-wide language.
To choose the default language for all users
1 On the Enforce Server, go to System > Settings > General and click Configure.
The Edit General Settings screen is displayed.
2 Scroll to the Language section of the Edit General Settings screen, and click the button
next to the language you want to use as the system-wide default.
3 Click Save.
Individual Symantec Data Loss Prevention users can choose which of the available languages
and locales they want to use by updating their profiles.
See “Editing a user profile” on page 87.
Administrators can use the Language Pack Utility to update the available languages.
See “Using the Language Pack Utility” on page 96.
See “About support for character sets, languages, and locales” on page 91.
Note: If the Enforce Server runs on a Linux host, you must install language fonts on the host
machine using the Linux Package Manager application. Language font packages begin with
fonts-<language_name>. For example, fonts-japanese-0.20061016-4.el5.noarch
Note: Running the Language Pack Utility causes the SymantecDLPManagerService and
SymantecDLPIncidentPersisterService services to stop for as long as 20 seconds. Any
users who are logged on to the Enforce Server administration console will be logged out
automatically. When finished making its updates, the utility restarts the services automatically,
and users can log back on to the administration console.
Language packs for Symantec Data Loss Prevention can be obtained from Symantec File
Connect.
To add a language pack (Windows)
1 Advise other users that anyone currently using the Enforce Server administration console
must save their work and log off.
2 Run the Language Pack Utility with the -a flag followed by the name of the ZIP file for
that language pack. Enter:
LanguagePackUtility -a filename
where filename is the fully qualified path and name of the language pack ZIP file.
For example, if the Japanese language pack ZIP file is stored in c:\temp, add it by entering:
LanguagePackUtility -a c:\temp\Symantec_DLP_15.5_Japanese.zip
To add multiple language packs during the same session, specify multiple file names,
separated by spaces, for example:
LanguagePackUtility -a
c:\temp\Symantec_DLP_15.5_Japanese.zip
Symantec_DLP_15.5_Chinese.zip
3 Log on to the Enforce Server administration console and confirm that the new language
option is available on the Edit General Settings screen. To do this, go to System >
Settings > General > Configure > Edit General Settings.
To add a language pack (Linux)
1 Advise other users that anyone currently using the Enforce Server administration console
must save their work and log off.
2 Open a terminal session to the Enforce Server host and switch to the DLP_system_account
by running the following command:
su - DLP_system_account
Working with languages and locales 98
Using the Language Pack Utility
4 Log on to the Enforce Server administration console and confirm that the new language
option is available on the Edit General Settings screen. To do this, go to System >
Settings > General > Configure > Edit General Settings.
To remove a language pack
1 Advise users that anyone currently using the Enforce Server administration console must
save their work and log off.
2 Run the Language Pack Utility with the -r flag followed by the Java locale code of the
language pack you want to remove. Enter:
LanguagePackUtility -r locale
where locale is a valid Java locale code corresponding to a Symantec Data Loss Prevention
language pack.
For example, to remove the French language pack enter:
LanguagePackUtility -r fr_FR
To remove multiple language packs during the same session, specify multiple file names,
separated by spaces.
3 Log on to the Enforce Server administration console and confirm that the language pack
is no longer available on the Edit General Settings screen. To do this, go to System >
Settings > General > Configure > Edit General Settings.
Removing a language pack has the following effects:
■ Users can no longer select the locale of the removed language pack for individual use.
Note: If the locale of the language pack is supported by the version of Java required for
running Symantec Data Loss Prevention, the administrator can later specify it as an alternate
locale for any users who need it.
LanguagePackUtility -c locale
where locale is a valid locale code recognized by Java, such as pt_PT for Portuguese.
For example, to change the locale to Brazilian Portuguese enter:
LanguagePackUtility -c pt_BR
3 Log on to the Enforce Server administration console and confirm that the new alternate
locale is now available on the Edit General Settings screen. To do this, go to System >
Settings > General > Configure > Edit General Settings.
If you specify a locale for which there is no language pack, "Translations not available"
appears next to the locale name. This means that formatting and sort order are appropriate
for the locale, but the Enforce Server administration console screens and online Help are
not translated.
Note: Administrators can only make one additional locale available for users that is not based
on a previously installed Symantec Data Loss Prevention language pack.
See “About support for character sets, languages, and locales” on page 91.
Section 2
Managing the Enforce Server
platform
Symantec DLP Manager Provides the centralized reporting and management services for Symantec
Data Loss Prevention.
See “To increase memory for the Symantec DLP Manager service”
on page 102.
Managing Enforce Server services and settings 102
About starting and stopping services on Windows
Table 4-1 Symantec Data Loss Prevention Enforce Server services (continued)
■ Linux: /opt/Symantec/DataLossPrevention/EnforceServer/Services
wrapper.java.maxmemory = 4096
■ SymantecDLPManagerService
■ SymantecDLPIncidentPersisterService
■ SymantecDLPDetectionServerControllerService
Note: Start the SymantecDLPNotifierService service first before starting other services.
■ SymantecDLPIncidentPersisterService
■ SymantecDLPManagerService
■ SymantecDLPNotifierService
■ SymantecDLPManagerService
■ SymantecDLPIncidentPersisterService
■ SymantecDLPDetectionServerControllerService
■ SymantecDLPDetectionServerService
■ SymantecDLPDetectionServerControllerService
■ SymantecDLPIncidentPersisterService
■ SymantecDLPManagerService
■ SymantecDLPNotifierService
To start the Symantec Data Loss Prevention services on a Linux Enforce Server
1 On the computer that hosts the Enforce Server, log on as root.
2 Start the Symantec DLP Notifier service by running the following command:
3 Start the remaining Symantec Data Loss Prevention services, by running the following
commands:
3 Start the remaining Symantec Data Loss Prevention services by running the following
commands:
To stop the Symantec Data Loss Prevention services on a single-tier Linux installation
1 On the computer that hosts the Symantec Data Loss Prevention servers, log on as root.
2 Stop all running Symantec Data Loss Prevention services by running the following
commands:
■ Configuring roles
Roles determine what a user can see and do in the Enforce Server administration console.
For example, the Report role is a specific role that is included in most Symantec Data Loss
Prevention solution packs. Users in the Report role can view incidents and create policies,
and configure Discover targets (if you are running a Discover Server). However, users in the
Report role cannot create Exact Data or Document Profiles. Also, users in the Report role
cannot perform system administration tasks. When a user logs on to the system in the Report
role, the Manage > Data Profiles and the System > Login Management modules in the
Enforce Server administration console are not visible to this user.
You can assign a user to more than one role. Membership in multiple roles allows a user to
perform different kinds of work in the system. For example, you grant the information security
manager user (InfoSec Manager) membership in two roles: ISR (information security first
responder) and ISM (information security manager). The InfoSec Manager can log on to the
system as either a first responder (ISR) or a manager (ISM), depending on the task(s) to
perform. The InfoSec Manager only sees the Enforce Server components appropriate for those
tasks.
You can also combine roles and policy groups to limit the policies and detection servers that
a user can configure. For example, you associate a role with the European Office policy group.
This role grants access to the policies that are designed only for the European office.
See “Policy deployment” on page 373.
Users who are assigned to multiple roles must specify the desired role at log on. Consider an
example where you assign the user named "User01" to two roles, "Report" and "System
Admin." If "User01" wanted to log on to the system to administer the system, the user would
log on with the following syntax: Login: System Admin\User01
See “Logging on and off the Enforce Server administration console” on page 84.
The Administrator user (created during installation) has access to every part of the system
and therefore is not a member of any access-control role.
See “About the administrator account” on page 85.
new policies or modifying existing policies to prevent data loss. All solution packs create
an "InfoSec Manager" (ISM) role that has policy authoring privileges.
■ Incident Responder
This role provides access to the Incidents module and associated menu options in the
Enforce Server administration console. Users in this role can track and remediate incidents.
Businesses often have at least two incident responder roles that provide two levels of
privileges for viewing and responding to incidents.
A first-level responder may view generic incident information, but cannot access incident
details (such as sender or recipient identity). In addition, a first-level responder may also
perform some incident remediation, such as escalating an incident or informing the violator
of corporate security policies. A second-level responder might be escalation responder
who has the ability to view incident details and edit custom attributes. A third-level responder
might be an investigation responder who can create response rules, author policies, and
create policy groups.
All solution packs create an "InfoSec Responder" (ISR) role. This role serves as a first-level
responder. You can use the ISM (InfoSec Manager) role to provide second-level responder
access.
Your business probably requires variations on these roles, as well as other roles. For more
ideas about these and other possible roles, see the descriptions of the roles that are imported
with solution packs.
See “Roles included with solution packs” on page 112.
Exec Executive:
■ Users in this role can view, remediate, and delete incidents; look up attributes;
and view all custom attributes.
■ This role provides users with access privileges to prevent data loss risk at the
macro level. Users in this role can review the risk trends and performance
metrics, as well as incident dashboards.
HRM HR Manager:
■ Users in this role can view, remediate, and delete incidents; look up attributes;
and edit all custom attributes.
■ This role provides users with access privileges to respond to the security
incidents that are related to employee breaches.
■ Users in this role can view, remediate, and delete incidents; look up attributes;
and edit all custom attributes.
■ This role provides users with access privileges to research details of incidents,
including forwarding incidents to forensics. Users in this role may also
investigate specific employees.
■ Users in this role can view, remediate, and delete incidents. They can look
up attributes, edit all custom attributes, author policies and response rules.
■ This role provides users with second-level incident response privileges. Users
can manage escalated incidents within information security team.
■ Users in this role can view, remediate, and delete incidents; look up attributes;
and view or edit some custom attributes. They have no access to sender or
recipient identity details.
■ This role provides users with first-level incident response privileges. Users
can view policy incidents, find broken business processes, and enlist the
support of the extended remediation team to remediate incidents.
Managing roles and users 114
Configuring roles
■ Users in this role can administer the system and the system users, and can
view incidents. They have no access to incident details.
Configuring roles
Each Symantec Data Loss Prevention user is assigned to one or more roles that define the
privileges and rights that user has within the system. A user’s role determines system
administration privileges, policy authoring rights, incident access, and more. If a user is a
member of multiple roles, the user must specify the role when logging on, for example: Login:
Sys Admin/sysadmin01.
Server Select the Server Administration option to enable users to perform the
Administration following functions:
■ Configure detection servers.
■ Create and manage Data Profiles for Exact Data Matching (EDM),
Form Recognition, Indexed Document Matching (IDM), and Vector
Machine Learning (VML).
■ Configure and assign incident attributes.
■ Configure system settings.
■ Configure response rules.
■ Create policy groups.
■ Configure recognition protocols.
■ View system event and traffic reports.
■ Import policies.
Note: Selecting Server Administration also provides Agent Management
privileges.
Agent Management Select the Agent Management option to enable users to perform the
following functions:
■ Review agent status
■ Review agent events
■ Manage agents and perform troubleshooting tasks
■ Delete, restart, and shut down agents
■ Change the Endpoint Server to which agents connect
■ Pull agent logs
■ Access agent summary reports
■ Add and update agent configurations
■ Manage and create agent groups
■ View agent group conflicts
■ Review server logs
■ Manage server logs, including canceling log collection, configuring
logs, and downloading and deleting logs
People privilege:
User Select the User Reporting option to enable users to view the user risk summary.
Reporting
Note: The Incident > View privilege is automatically enabled for all incident
(Risk
types for users with the User Reporting privilege.
Summary,
User See “About user risk” on page 1973.
Snapshot)
Managing roles and users 116
Configuring roles
■ In the Incidents section, you grant users in this role the following incident privilege(s).
These settings apply to all incident reports in the system, including the Executive
Summary, Incident Summary, Incident List, and Incident Snapshots.
View Select the View option to enable users in this role to view policy violation
incidents.
You can customize incident viewing access by selecting various Actions
and Display Attribute options as follows:
■ By default the View option is enabled (selected) for all types of
incidents: Network Incidents, Discover Incidents, and Endpoint
Incidents.
■ To restrict viewing access to only certain incident types, select
(highlight) the type of incident you want to authorize this role to view.
(Hold down the Ctrl key to make multiple selections.) If a role does
not allow a user to view part of an incident report, the option is
replaced with "Not Authorized" or is blank.
Note: If you revoke an incident-viewing privilege for a role, the system
deletes any saved reports for that role that rely on the revoked privilege.
For example, if you revoke (deselect) the privilege to view network
incidents, the system deletes any saved network incident reports
associated with the role.
Managing roles and users 117
Configuring roles
Actions Select among the following Actions to customize the actions a user can
perform when an incident occurs:
■ Remediate Incidents
This privilege lets users change the status or severity of an incident,
set a data owner, add a comment to the incident history, set the Do
Not Hide and Allow Hiding options, and execute response rule
actions. In addition, if you are using the Incident Reporting and Update
API, select this privilege to remediate the location and status attributes.
■ Smart Response Rules to execute
You specify which Smart Response Rules that can be executed on
a per role basis. Configured Smart Response Rules are listed in the
"Available" column on the left. To expose a Smart Response Rule
for execution by a user of this role, select it and click the arrow to add
it to the right-side column. Use the CTRL key to select multiple rules.
■ Perform attribute lookup
Lets users look up incident attributes from external sources and
populate their values for incident remediation.
■ Delete incidents
Lets users delete an incident.
■ Hide incidents
Lets users hide an incident.
■ Unhide incidents
Lets users restore previously hidden incidents.
■ Export Web archive
Lets users export a report that the system compiles from a Web
archive of incidents.
■ Export XML
Lets users export a report of incidents in XML format.
■ Email incident report as CSV attachment
Lets users email as an attachment a report containing a
comma-separated listing of incident details.
Incident Reporting Select among the following user privileges to enable access for Web
and Update API Services clients that use the Incident Reporting and Update API or the
deprecated Reporting API:
■ Incident Reporting
Enables Web Services clients to retrieve incident details.
■ Incident Update
Enables Web Services clients to update incident details. (Does not
apply to clients that use the deprecated Reporting API.)
See the Symantec Data Loss Prevention Incident Reporting and Update
API Developers Guide for more information.
Managing roles and users 118
Configuring roles
Display Attributes Select among the following Display Attributes to customize what
attributes appear in the Incidents view for the policy violations that users
of the role can view.
Custom Attributes The Custom Attributes list includes all of the custom attributes
configured by your system administrator, if any.
■ Select View All if you want users to be able to view all custom attribute
values.
■ Select Edit All if you want users to edit all custom attribute values.
■ To restrict the users to certain custom attributes, clear the View All
and Edit All check boxes and individually select the View and/or Edit
check box for each custom attribute you want viewable or editable.
Note: If you select Edit for any custom attribute, the View check box is
automatically selected (indicated by being grayed out). If you want the
users in this role to be able to view all custom attribute values, select
View All.
■ In the Discover section, you grant users in this role the following privileges:
Folder Risk Reporting This privilege lets users view Folder Risk Reports. Refer to the Symantec
Data Loss Prevention Data Insight Implementation Guide.
Note: This privilege is only available for Symantec Data Loss Prevention
Data Insight licenses.
Content Root This privilege lets users configure and run Content Root Enumeration
Enumeration scans. For more information about Content Root Enumeration scans, See
“Working with Content Root Enumeration scans” on page 2162.
4 In the Incident Access tab, configure any conditions (filters) on the types of incidents
that users in this role can view.
Note: You must select the View option on the General tab for settings on the Incident
Access tab to have any effect.
5 In the Policy Management tab, select one of the following policy privileges for the role:
Managing roles and users 120
Configuring roles
■ Import Policies
This privilege lets users import policy files that have been exported from an Enforce
Server.
To enable this privilege, the role must also have the Server Administration, Author
Policies, Author Response Rules, and All Policy Groups privileges.
■ Author Policies
This privilege lets users add, edit, and delete policies within the policy groups that are
selected.
It also lets users modify system data identifiers, and create custom data identifiers.
It also lets users create and modify User Groups.
This privilege does not let users create or manage Data Profiles. This activity requires
Enforce Server administrator privileges.
■ Discover Scan Control
Lets the users in this role create Discover targets, run scans, and view Discover
Servers.
■ Credential Management
Lets users create and modify the credentials that the system requires to access target
systems and perform Discover scans.
■ Policy Groups
Select All Policy Groups only if users in this role need access to all existing policy
groups and any that will be created in the future.
Otherwise you can select individual policy groups or the Default Policy Group.
Note: These options do not grant the right to create, modify, or delete policy groups.
Only the users whose role includes the Server Administration privilege can work with
policy groups.
Note: Users cannot edit or author response rules for policy remediation unless you
select the Author Response Rules option.
Note: Preventing users from authoring response rules does not prevent them from executing
response rules. For example, a user with no response-rule authoring privileges can still
execute smart response rules from an incident list or incident snapshot.
Managing roles and users 121
Configuring user accounts
6 In the Users tab, select any users to which to assign this role. If you have not yet configured
any users, you can assign users to roles after you create the users.
7 Click Save to save your newly created role to the Enforce Server database.
4 Configure the Authentication section of the Configure User page. Only options that are
enabled are available on this page.
Option Instructions
Use Single Sign On If SAML authentication had been enabled, the user can sign on using Single Sign On Mapping
Mapping on the Configure User page.
Use Password Select this option to use password authentication and allow the user to sign on using the
access Enforce Server administration console log on page. This option is required if the user account
will be used for a Reporting API Web Service client.
If you select this option, also enter the user password in the Password and the Re-enter
Password fields. The password must be at least eight characters long and is case-sensitive.
For security purposes, the password is obfuscated and each character appears as an asterisk.
If you configure advanced password settings, the user must specify a strong password. In
addition, the password may expire at a certain date and the user has to define a new one
periodically.
You can choose password authentication even if you also use certificate authentication. If you
use certificate authentication, you can optionally disable sign on from the Enforce Server
administration console log on page.
Symantec Data Loss Prevention authenticates all Reporting API clients using password
authentication. If you configure Symantec Data Loss Prevention to use certificate authentication,
any user account that is used to access the Reporting API Web Service must have a valid
password. See the Symantec Data Loss Prevention Reporting API Developers Guide.
Note: If you configure Active Directory integration with the Enforce Server, users authenticate
using their Active Directory passwords. In this case the password field does not appear on
the Users screen.
Option Instructions
Use Certificate Select this option to use certificate authentication and allow the user to automatically single
authentication sign-on with a certificate that is generated by a separate Private Key Infrastructure (PKI). This
option is available only if you have manually configured support for certificate authentication.
If you select this option, you must specify the common name (CN) value for the user in the
Common Name (CN) field. The CN value appears in the Subject field of the user's certificate,
which is generated by the PKI. Common names generally use the format, first_name
last_name identification_number.
The Enforce Server uses the CN value to map the certificate to this user account. If an
authenticated certificate contains the specified CN value, all other attributes of this user
account, such as the default role and reporting preferences, are applied when the user logs
on.
Note: You cannot specify the same Common Name (CN) value in multiple Enforce Server
user accounts.
Account Disabled Select this option to lock the user out of the Enforce Server administration console. This option
disables access for the user account regardless of which authentication mechanism you use.
For security, after a certain number of consecutive failed logon attempts, the system
automatically disables the account and locks out the user. In this case the Account Disabled
option is checked. To reinstate the user account and allow the user to log on to the system,
clear this option by unchecking it.
5 Optionally enter an Email Address and select a Language for the user in the General
section of the page. The Language selection depends on the language pack(s) you have
installed.
6 In the Report Preferences section of the Users screen you specify the preferences for
how this user is to receive incident reports, including Text File Encoding and CSV
Delimiter.
If the role grants the privilege for XML Export, you can select to include incident violations
and incident history in the XML export.
7 In the Roles section, select the roles that are available to this user to assign data and
incident access privileges.
You must assign the user at least one role to access the Enforce Server administration
console.
See “Configuring roles” on page 114.
Managing roles and users 124
Configuring password enforcement settings
Note: Individual users can change their default role by clicking Profile and selecting a
different option from the Default Role menu. The new default role is applied at the next
logon.
Note: Once you have saved a new user, you cannot edit the user name.
Note: Do not change permissions or ownership on any configuration file from another
root or Administrator account.
Replace oracle_password with the password to the Enforce Server database, and replace
new_administrator_password with the password you want to set.
Managing roles and users 126
Manage and add roles
Note: The Administrator account is created on install and cannot be removed from the
system.
Note: When you delete a user account, you also delete all private saved reports that are
associated with that user.
SAML Single sign-on With SAML authentication, the Enforce Server administration console
authentication authenticates each user by validating the supplied email, user name,
or other user attributes that map to attributes the identity provider uses.
When SAML is enabled, users access the Enforce Server Admin console
URL and are redirected to the identity provider logon page, where they
enter their credentials. After they are authenticated with the identity
provider, their user attributes are sent to the Enforce Server. The
Enforce Server attempts to find a user with matching attributes. If the
user is found, they are logged on to the Enforce Server administration
console.
Password Forms-based sign-on With password authentication, the Enforce Server administration console
authentication authenticates each user. It determines if the supplied user name and
password combination matches an active user account in the Enforce
Server configuration. An active user account is authenticated if it has
been assigned a valid role.
With password authentication, you must configure the user name and
password of each user account directly in the Enforce Server
administration console. You must also ensure that each user account
has at least one assigned role.
Active Directory Forms-based sign-on With Microsoft Active Directory authentication, the Enforce Server
authentication administration console first evaluates a supplied user name to determine
if the name exists in a configured Active Directory server. If the user
name exists in Active Directory, the supplied password for the user is
evaluated against the Active Directory password. Any password that is
configured in the Enforce Server configuration is ignored.
Certificate Single sign-on from Certificate authentication enables a user to automatically log on to the
authentication Public Key Infrastructure Enforce Server administration console using an X.509 client certificate.
(PKI) This certificate is generated by your public key infrastructure (PKI). To
use certificate-based single sign-on, you must first enable certificate
authentication as described in this section.
If the certificate is valid and has not been revoked, then the Enforce
Server uses the common name (CN) in the certificate to determine if
that CN is mapped to an active user account with a role in the Enforce
Server configuration. For each user that accesses the Enforce Server
administration console using certificate-based single sign-on, you must
create a user account in the Enforce Server that defines the
corresponding user's CN value. You must also assign one or more valid
roles to the user account.
Here are some important things to note when you set up SAML authentication.
■ You must restart the manager when you change the way you authenticate users in SAML.
Changing this mapping criteria in the springSecurityContext file for SAML without
Managing roles and users 131
Configuring user authentication
restarting the manager results in users that are out of sync, as the system continues to use
previous version of the file. For example, if you change the mapping criteria from user name
to email address, you must restart the manager.
■ You must remap each user when you change the way you map users in SAML. Changing
mapping criteria invalidates the existing user's mapping.
■ You must validate the XML syntax before you restart the manager. Some characters such
as "&" that can be part of a user attribute make the XML invalid. You need to replace these
characters with their XML escape string. For example, instead of "&" use "&".
■ Do not delete any XML nodes in the XML files.
■ Attribute names in XML must exactly match (including case) attribute names in the identity
provider.
■ When switching from forms-based to SAML authentication, you must go through each user
and disable password access for non-Web Services users.
■ When switching from Certificate authentication to SAML authentication, make sure that the
ClientAuth value in server.xml is set to false.
Setting up authentication
Table 5-3 shows a summary of the tasks for the setup with links to more information on each
step.
Step Edit the Spring context file for the authentication See “Set up and configure the authentication
1 method. method” on page 133.
Step Set up the authentication configuration. For SAML:See “Set up the SAML authentication
2 configuration” on page 135.
For Forms-based:
For Certificate:
Step Restart the Enforce Server. See “About Symantec Data Loss Prevention
3 services” on page 101.
Step For SAML, generate and download the service See “Generate or download Enforce (service
4 provider SAML metadata. The Enforce Server providers) SAML metadata” on page 135.
administration console is the service provider.
Step For SAML, configure Enforce as a SAML service See “Configure the Enforce Server as a SAML
5 provider with the identity provider. service provider with the IdP (Create an
application in your identity provider)” on page 136.
Step For SAML, download the identity provider See “Export the IdP metadata to DLP”
6 metadata. on page 136.
Step Complete the process by restarting the Enforce See “About Symantec Data Loss Prevention
7 Server. services” on page 101.
Step Log on to the Enforce Server administration See “Administrator Bypass URL” on page 133.
8 console using the Administrator Bypass URL.
Managing roles and users 133
Configuring user authentication
Note: The Enforce Server administration console (the service provider in SAML) and the IdP
exchange messages using the settings in the configuration. Ensure that your settings match
with your IdP's configuration and capabilities. Unmatched settings break the system.
You must restart the Enforce Server twice: once after you set up the authentication configuration
in the springSecurityContext.xml file, and once after you download the IdP metadata file
and replace the contents of idp-metadata.xml in the Enforce install directory with the IdP
metadata.
Note: Only one active logon is available with the Bypass URL.
Note: The files that you must modify are commented with details to help you through the update
process.
Note: You can no longer perform the initial setup of Active Directory through the Enforce
Server administration console.
See “Configuring the Enforce Server for Active Directory authentication” on page 141.
See “Set up the SAML authentication configuration” on page 135.
Managing roles and users 135
Configuring user authentication
Note: Unless you only want to access the Enforce Server administration console from the host
machine, don't use localhost as the host name.
Set the property value of "nameID" by editing the property name ="nameID" value in the
Spring file to a name identifier such as emailAddress, WindowsDomainQualifiedName, or
another nameID that your IdP supports. Here's an example for email address:
<property name="nameID"
value=urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress" />
You may want to use a combination of user attributes returned from the IdP to identify a Data
Loss Prevention user. In this case you can set the userAttributes property. For example:
3 Go to System > Settings > General and navigate to the DLP User Authentication
section.
4 Click the link to the right of The SAML config file for your IdP is at to download the
metadata.
See “Configure the Enforce Server as a SAML service provider with the IdP (Create an
application in your identity provider)” on page 136.
See “Generate or download Enforce (service providers) SAML metadata” on page 135.
user accounts in the system. Only those existing user names that match Active Directory user
names remain valid after the switch.
Users must use their Active Directory passwords when they log on. Note that all Symantec
Data Loss Prevention user names remain case sensitive, even though Active Directory user
names are not. You can switch to Active Directory authentication after already having created
user names in Symantec Data Loss Prevention. However, users still have to use the
case-sensitive Symantec Data Loss Prevention user name when they log on.
To use Active Directory authentication
1 Verify that the Enforce Server host is time-synchronized with the Active Directory server.
Note: Ensure that the clock on the Active Directory host is synched to within five minutes
of the clock on the Enforce Server host.
2 (Linux only) Make sure that the following Red Hat RPMs are installed on the Enforce
Server host:
■ krb5-workstation
■ krb5-libs
■ pam_krb5
3 Create the krb5.ini (or krb5.conf for Linux) configuration file that gives the Enforce
Server information about your Active Directory domain structure and Active Directory
server addresses.
See “Creating the configuration file for Active Directory integration” on page 138.
4 Confirm that the Enforce Server can communicate with the Active Directory server.
See “Verifying the Active Directory connection” on page 140.
5 Configure Symantec Data Loss Prevention to use Active Directory authentication.
See “Configuring the Enforce Server for Active Directory authentication” on page 141.
Note: If you are running Symantec Data Loss Prevention on Linux, verify the Active Directory
connection using the kinit utility. You must rename the krb5.ini file as krb5.conf. The kinit
utility requires the file to be named krb5.conf on Linux. Symantec Data Loss Prevention
assumes that you use kinit to verify the Active Directory connection, and directs you to rename
the file as krb5.conf.
Symantec Data Loss Prevention provides a sample krb5.ini file that you can modify for use
with your own system. The sample file is stored in \15.5\Protect\config (for example,
\Program Files\Symantec\DataLossPrevention\EnforceServer\15.5\Protect\config
on Windows or /opt/Symantec/DataLossPrevention/EnforceServer/15.5/Protect/config
on Linux). If you are running Symantec Data Loss Prevention on Linux, Symantec recommends
renaming the file to krb5.conf. The sample file, which is divided into two sections, looks like
this:
[libdefaults]
default_realm = TEST.LAB
[realms]
ENG.COMPANY.COM = {
kdc = engAD.eng.company.com
}
MARK.COMPANY.COM = {
kdc = markAD.eng.company.com
}
QA.COMPANY.COM = {
kdc = qaAD.eng.company.com
}
The [libdefaults] section identifies the default domain. (Note that Kerberos realms
correspond to Active Directory domains.) The [realms] section defines an Active Directory
server for each domain. In the previous example, the Active Directory server for
ENG.COMPANY.COM is engAD.eng.company.com.
Managing roles and users 140
Integrating Active Directory for user authentication
2 Copy the sample krb5.ini file to the c:\windows directory (on Windows) or the /etc
directory (on Linux). If you are running Symantec Data Loss Prevention on Linux, plan to
verify the Active Directory connection using the kinit command-line tool. Rename the file
as krb5.conf.
See “Verifying the Active Directory connection” on page 140.
3 Open the krb5.ini or krb5.conf file in a text editor.
4 Replace the sample default_realm value with the fully qualified name of your default
domain. (The value for default_realm must be all capital letters.) For example, modify
the value to look like the following:
default_realm = MYDOMAIN.LAB
5 Replace the other sample domain names with the names of your actual domains. (Domain
names must be all capital letters.) For example, replace ENG.COMPANY.COM with
ADOMAIN.COMPANY.COM.
6 Replace the sample kdc values with the host names or IP addresses of your Active
Directory servers. (Be sure to follow the specified format, in which opening brackets are
followed immediately by line breaks.) For example, replace engAD.eng.company.com with
ADserver.eng.company.com, and so on.
7 Remove any unused kdc entries from the configuration file. For example, if you have only
two domains besides the default domain, delete the unused kdc entry.
8 Save the file.
If you run the Enforce Server on Linux, use the kinit utility to test access from the Enforce
Server to the Active Directory server. Rename the krb5.ini file as krb5.conf. The kinit
utility requires the file to be named krb5.conf on Linux.
To test the connection to the Active Directory server
1 On the Enforce Server host, go to the command line and navigate to the directory where
kinit is located.
2 Issue a kinit command using a known user name and password as parameters. (Note
that the password is visible in clear text when you type it on the command line.) For
example, issue the following:
The first time you contact Active Directory you may receive an error that it cannot find the
krb5.ini or krb5.conf file in the expected location. On Windows, the error looks similar
to the following:
In this case, copy the krb5.ini or krb5.conf file to the expected location and then rerun
the kinit command that is previously shown.
3 Depending on how the Active Directory server responds to the command, take one of the
following actions:
■ If the Active Directory server indicates it has successfully created a Kerberos ticket,
continue configuring Symantec Data Loss Prevention.
■ If you receive an error message, consult with your Active Directory administrator.
3 At the Edit General Settings screen that appears, locate the Active Directory
Authentication section near the bottom and select (check) Perform Active Directory
Authentication.
The system then displays several fields to fill out.
4 See “Creating the configuration file for Active Directory integration” on page 138.
5 If your environment has more than one Active Directory domain, click Configure and
enter the domain names (separated by commas) in the Active Directory Domain List
field.
The system displays Active Directory domains in a drop-down list on the user logon page.
Users then select the appropriate domain at logon. Do not list the default domain, as it
already appears in the drop-down list by default.
6 Click Save.
7 Go to the operating system services tool and restart the Symantec Data Loss Prevention
Manager service.
Note: Some browsers cache a user's client certificate, and automatically log the user on to the
Administration Console after the user has chosen to sign out. In this case, users must close
the browser window to complete the log out process.
Managing roles and users 143
About certificate authentication configuration
The following table describes the steps necessary to use certificate authentication with
Symantec Data Loss Prevention.
1 Enable certificate authentication on the Enforce You can configure an existing Enforce Server
Server computer. to enable authentication. Enforce Servers have
form-based authentication by default.
2 Add certificate authority (CA) certificates to You can add CA certificates to the Tomcat trust
establish the trust chain. store with the Java keytool utility to manually
add certificates to an existing Enforce Server.
3 (Optional) Change the Tomcat trust store The Symantec Data Loss Prevention installer
password. configures each new Enforce Server installation
with a default Tomcat trust store password.
Follow these instructions to configure a secure
password.
4 Map certificate common name (CN) values to See “Mapping Common Name (CN) values to
Enforce Server user accounts. Symantec Data Loss Prevention user accounts”
on page 149.
5 Configure the Enforce Server to check for See “About certificate revocation checks”
certificate revocation. on page 150.
Note: Do not change permissions or ownership on any configuration file from another
root or Administrator account.
To enable certificate authentication for users of the Enforce Server administration console
1 Log on to the Enforce Server computer using the account that you created during Symantec
Data Loss Prevention installation.
Note: Do not change permissions or ownership on any configuration file from another
root or Administrator account.
See “Adding certificate authority (CA) certificates to the Tomcat trust store” on page 146.
Note: Do not change permissions or ownership on any configuration file from another
root or Administrator account.
4 Use the keytool utility that is installed with Symantec Data Loss Prevention to add a
certificate to the Tomcat trust store. For Windows systems, enter:
c:\Program Files\Symantec\DataLossPrevention\EnforceServer\jre\bin\keytool
-import
-trustcacerts
-alias CA_CERT_1
-file certificate_1.cer
-keystore .\truststore.jks
/opt/Symantec/DataLossPrevention/jre/bin/keytool
-import
-trustcacerts
-alias CA_CERT_1
-file certificate_1.cer
-keystore ./truststore.jks
In these commands, replace CA_CERT_1 with a unique alias for the certificate that you
import. Replace certificate_1.cer with the name of the certificate file you copied to the
Enforce Server computer.
5 Enter the password to the keystore at the keytool utility prompt. The default keystore
password is protect.
6 Repeat these steps to install all the certificate files that are necessary to complete the
certificate chain.
7 Stop and then restart the Symantec DLP Manager service to apply your changes.
8 If you have not yet changed the default Tomcat keystore password, do so now.
See “Changing the Tomcat trust store password” on page 147.
Note: Do not change permissions or ownership on any configuration file from another
root or Administrator account.
c:\Program Files\Symantec\DataLossPrevention\ServerJRE\1.8.0_162\bin\
keytool - storepasswd -new new_password -keystore ./truststore.jks
/opt/Symantec/DataLossPrevention/EnforceServer/15.5/jre/bin/keytool -storepasswd
-new new_password -keystore ./truststore.jks
7 In the following line in the file, edit the truststorePass="protect" entry to specify your
new password:
Replace protect with the new password that you defined in the keytool command.
8 Save your changes and exit the text editor.
9 Change directory to the
/opt/Symantec/DataLossPrevention/EnforceServer/15.5/Protect/config (Linux)
or c:\Program
Files\Symantec\DataLossPrevention\EnforceServer\15.5\Protect\config (Windows)
directory. If you installed Symantec Data Loss Prevention into a different directory,
substitute the correct path.
10 Open the Manager.properties file with a text editor.
Add the following line in the file to specify the new password:
com.vontu.manager.tomcat.truststore.password = password
Replace password with the new password. Do not enclose the password in quotation
marks.
11 Save your changes and exit the text editor.
12 Open the Protect.properties file with a text editor.
13 Edit (or if not present, add) the following line in the file to specify the new password:
com.vontu.manager.tomcat.truststore.password = password
Replace password with the new password. Do not enclose the password in quotation
marks.
14 Save your changes and exit the text editor.
15 Stop and then restart the Symantec DLP Manager service to apply your changes.
account associates the common name (CN) value from the user's client certificate to one or
more roles in the Enforce Server administration console. You can map a CN value to only one
Enforce Server user account.
The user account that you create does not require a separate Enforce Server administration
console password. You can optionally configure a password if you want to allow the user to
also log on from the Enforce Server administration console log-on page. If you enable password
authentication and the user does not provide a certificate when the browser asks for one, then
the Enforce Server displays the log-on page. A log-on failure is displayed if password
authentication is disabled and the user does not provide a certificate.
An active user account must identify a user's CN value and have a valid role assigned in the
Enforce Server to log on using single sign-on with certificate authentication. You can disable
or delete the associated Enforce Server user account to prevent a user from accessing the
Enforce Server administration console without revoking their client certificate.
See “Configuring user accounts” on page 121.
Note: Certificate revocation checking is disabled by default. You must enable it and configure
it. See “Configuring certificate revocation checks” on page 151.
Symantec Data Loss Prevention retrieves revocation lists from a Certificate Revocation List
Distribution Point (CRLDP). To check revocation using a CRLDP, the client certificate must
include a CRL distribution point field. The following shows an example CRLDP field definition:
Note: Symantec Data Loss Prevention does not support specifying the CRLDP using an LDAP
URL.
If the CRL distribution point is defined in each certificate and the Enforce Server can directly
access the server, then no additional configuration is required to perform revocation checks.
If the CRL distribution point is accessible only by a proxy server, then you must configure the
proxy server settings in the Symantec Data Loss Prevention configuration.
Managing roles and users 151
About certificate authentication configuration
Note: Do not change permissions or ownership on any configuration file from another
root or Administrator account.
wrapper.java.additional.22=-Dcom.sun.security.enableCRLDP=true
This option is enabled by default for new Symantec Data Loss Prevention installations.
Managing roles and users 152
About certificate authentication configuration
5 If you use CRLDP revocation checks, optionally configure the cache lifetime using the
property:
wrapper.java.additional.22=-Dsun.security.certpath.ldap.cache.lifetime=30
This parameter specifies the length of time, in seconds, to cache the revocation lists that
are obtained from a CRL distribution point. After this time is reached, a lookup is performed
to refresh the cache the next time there is an authentication request. The default cache
lifetime 30 seconds. Specify 0 to disable the cache, or -1 to store cache results indefinitely.
6 Stop and then restart the Symantec DLP Manager service to apply your changes.
Note: Symantec Data Loss Prevention supports certificate revocation when the Enforce Server
is in non-FIPS mode.
Note: Do not change permissions or ownership on any configuration file from another
root or Administrator account.
wrapper.java.additional.22=-Dhttp.proxyHost=myproxy.mydomain.com
wrapper.java.additional.23=-Dhttp.proxyPort=8080
wrapper.java.additional.24=-Dhttp.nonProxyHosts=hosts
Replace myproxy.mydomain.com and 8080 with the host name and port of your proxy
server. You can include server host names, fully qualified domain names, or IP addresses
separated with a pipe character. For example:
wrapper.java.additional.24=-Dhttp.nonProxyHosts=crldp-server|
127.0.0.1|DataInsight_Server_Host
Note: If certificate authentication fails while the browser establishes an HTTPS connection to
the Enforce Server administration console, then Symantec Data Loss Prevention cannot log
an error message.
You can optionally log additional information about certificate revocation checks by adding or
uncommenting the following system property in the SymantecDLPManager.conf file:
wrapper.java.additional.90=-Djava.security.debug=certpath
Note: When you disable forms-based logon you disable the feature for all users, including
those with Administrator privileges. As an alternative, you can disable forms-based logon or
certificate authentication for an individual user by configuring that user's account.
See “Configuring user accounts” on page 121.
If you later turn on forms-based logon but the Administrator user account does not have a
password configured, you can reset the Administrator password. Reset the password using
the AdminPasswordReset utility.
See “Resetting the Administrator password” on page 125.
Chapter 6
Connecting to group
directories
This chapter includes the following topics:
Note: If you use a directory server that contains a self-signed authentication certificate, you
must add the certificate to the Enforce Server or the Discover Server. If your directory server
uses a pre-authorized certificate, it is automatically added to the Enforce Server or Discover
Server. See “Importing SSL certificates to Enforce or Discover servers” on page 277.
Connecting to group directories 156
Configuring directory server connections
1 Navigate to the Directory Connections This page is available at System > Settings > Directory
page (if not already there). Connections.
2 Click Create New Connection. This action takes you to the Configure Directory
Connection page.
3 Enter a Name for the directory server The Connection Name is the user-defined name for the
connection. connection. It appears at the Directory Connections home
page once the connection is configured.
4 Specify the Network Parameters for the Table 6-2 provides details on these parameters.
directory server connection. Enter or specify the following parameters:
5 Specify the Authentication mode for Table 6-3 provides details on configuring the authentication
connecting to the directory server. parameters.
6 Click Test Connection to verify the If there is anything wrong with the connection, the system
connection. displays an error message describing the problem.
Connecting to group directories 157
Configuring directory server connections
7 Click Save to save the direction connection The system automatically indexes the directory server after
configuration. you successfully create, test, and save the directory server
connection.
8 Select the Index and Replication Status Verify that the directory server was indexed. After some time
tab. (depending on the size of the directory server query), you
should see that the Replication Status is "Completed
<date> <time>". If you do not see that the status is
completed, verify that you have configured and tested the
directory connection properly. Contact your directory server
administrator for assistance.
9 Select the Index Settings tab. You can adjust the directory server indexing schedule as
necessary at the Index Settings tab.
You must enter the Fully Qualified Name (FQN) of the directory server. Do not use
the IP address.
Base DN Enter the Base DN for the directory server. This field only accepts one directory
server entry.
Encryption Method Select the Secure option if you want the communication between the directory server
and the Enforce Server to be encrypted using SSL.
Note: If you choose to use a secure connection, you may need to import the SSL
certificate for the directory server to the Enforce Server keystore. See “Importing SSL
certificates to Enforce or Discover servers” on page 277.
Authentication Description
Authentication Select the Authentication option to connect to the directory server using
authentication mode. Check Connect with Credentials to add your username and
password to authenticate to the directory server.
Username To authenticate with Active Directory, use one of the following methods:
Password Enter the password for the user name that was specified in the preceding field.
Table 6-4 Schedule group directory server indexing and view status
Index the directory server The Once setting is selected by default and automatically indexes the director
once. server at 12:00 AM the day after you create the initial connection.
You can modify the default Once indexing schedule by specifying when and
how often the index is supposed to be rebuilt.
Index the directory server Select the Daily option to schedule the index daily.
daily.
Specify the time of day and, optionally, the Until duration for this schedule.
Index the directory server Select the Weekly option to schedule the index to occur once a week.
weekly.
Specify the day of the week to index.
Index the directory server Specify the day of the month to index the directory and the time.
monthly.
Optionally, specify the Until duration for this schedule.
View the indexing and Select the Index and Replication Status tab to view the status of the indexing
replication status. process.
■ Indexing Status
Displays the next scheduled index, date and time.
■ Detection Server Name
Displays the detection server where the User Group profile is deployed.
■ Replication Status
■ Displays the data and time of the most recent synchronization with the
directory group server.
Chapter 7
Managing stored
credentials
This chapter includes the following topics:
3 Click Save.
4 You can later edit or delete credentials from the credential store.
See “Managing credentials in the credential store” on page 162.
See “Configuring endpoint credentials” on page 161.
3 Under the Credential Management section, ensure that the Allow Saved Credentials
on Endpoint Agent checkbox is selected.
4 Click Save.
5 Go to: System > Settings > Credentials.
6 Click Add Credential.
7 Under the General section, enter the details of the credential you want to add.
8 Under Usage Permission, select Servers and Endpoint agents.
9 Click Save.
See “About the credential store” on page 160.
See “Configuring the Endpoint Discover: Quarantine File action” on page 1815.
Store your authentication credentials in a central store to simplify management of user name
and password changes.
You can add, delete, or edit stored credentials.
To add a stored credential
1 In System > Settings > Credentials, click Add Credential.
2 Enter the following information:
3 Click Save.
To delete a stored credential
1 In System > Settings > Credentials, locate the name of the stored credential that you
want to remove.
2 Click the delete icon to the right of the name. A credential can be deleted only if it is not
currently referenced in a Discover target or indexed document profile.
To edit a stored credential
1 In System > Settings > Credentials, locate the name of the stored credential that you
want to edit.
2 Click the edit icon (pencil) to the right of the name.
3 Update the user name or password.
4 Click Save.
5 If you change the password for a given credential, the new password is used for all
subsequent Discover scans that use that credential.
See “Providing the password authentication for Network Discover scanned content” on page 2095.
Chapter 8
Managing system events
and messages
This chapter includes the following topics:
■ The five most recent system events of severity Warning or Severe are listed on the
Overview screen (System > Servers and Detectors > Overview).
See “About the Overview screen” on page 278.
■ Reports on all system events of any severity can be viewed by going to System > Servers
and Detectors > Events.
See “System events reports” on page 165.
■ Recent system events for a particular detection server or cloud service are listed on the
Server/Detector Detail screen for that server or detector.
See “Server/Detector Detail screen” on page 283.
■ Click on any event in an event list to go to the Event Details screen for that event. The
Event Details screen provides additional information about the event.
See “Server and Detectors event detail” on page 169.
There are three ways that system events can be brought to your attention:
■ System event reports displayed on the administration console
■ System alert email messages
See “About system alerts” on page 175.
■ Syslog functionality
See “Enabling a syslog server” on page 174.
Some system events require a response.
See “About system event responses” on page 172.
To narrow the focus of system event management you can:
■ Use the filters in the various system event notification methods.
See “System events reports” on page 165.
■ Configure the system event thresholds for individual servers.
See “Configuring event thresholds and triggers” on page 170.
Table 8-1
Events Description
Type The type (severity) of the event. Type may be any one of those listed in Table 8-2.
Managing system events and messages 166
System events reports
Events Description
Host The IP address or host name of the server on which the event occurred.
See the Symantec Data Loss Prevention Administration Guide for information on event
code numbers.
Summary A brief description of the event. Click on the summary for more detail about the event.
Event Description
System information
Warning
Severe
applied. If multiple filters are applied, events are only listed if they match all the filters and the
date range.
To apply additional advanced filters
1 Click on Advanced Filters and Summarization.
2 Click on Add Filter.
3 Choose the filter you want to use from the left-most drop-down list. Available filters are
listed in Table 8-3.
4 Choose the filter-operator from the middle drop-down list.
Note: You can use the Cloud Operations filter value to view events from Cloud Operations
for your detectors.
For each advanced filter you can specify a filter-operator Is Any Of or Is None Of.
5 Enter the filter value, or values, in the right-hand text box, or click a value in the list to
select it.
■ To select multiple values from a list, hold down the Control key and click each one.
■ To select a range of values from a list, click the first one, then hold down the Shift key
and click the last value in the range you want.
Filter Description
Event Code Filter events by the code numbers that identify each
kind of event. You can filter by a single code number
or multiple code numbers separated by commas
(2121, 1202, 1204). Filtering by code number
ranges, or greater than, or less than operators is
not supported.
Managing system events and messages 168
Working with saved system reports
Filter Description
Note: A small subset of the parameters that trigger system events have thresholds that can
be configured. These parameters should only be adjusted with advice from Symantec Support.
Before changing these settings, you should have a thorough understanding of the implications
that are involved. The default values are appropriate for most installations.
See “Configuring event thresholds and triggers” on page 170.
Item Description
Item Description
To view and change the configurable parameters that trigger system events
1 Go to the Overview screen (System > Servers and Detectors > Overview).
2 Click on the name of a detection server or detector to display that server's Server/Detector
Detail screen.
3 Click Server/Detector Settings.
The Advanced Server/Detector Settings screen for that server is displayed.
4 Change the configurable parameters, as needed.
BoxMonitor.DiskUsageError Indicates the amount of filled disk space Low disk space
(as a percentage) that triggers a severe
system event. For example, a Severe
event occurs if a detection server is
installed on the C drive and the disk
space error value is 90. The detection
server creates a Severe system event
when the C drive usage is 90% or
greater. The default is 90.
BoxMonitor.DiskUsageWarning Indicates the amount of filled disk space Low disk space
(as a percentage) that triggers a
Warning system event. For example, a
Warning event occurs if the detection
server is installed on the C drive and the
disk space warning value is 80. Then
the detection server generates a
Warning system event when the C drive
usage is 80% or greater. The default is
80.
BoxMonitor.MaxRestartCount Indicates the number of times that a process name restarts excessively
system process can be restarted in one
hour before a Severe system event is
generated. The default is 3.
In most cases, the system event summary and detail information should provide enough
information to direct investigation and remediation steps. The following table provides some
general guidelines for responding to system events.
Low disk space If this event is reported on a detection server, recycle the
Symantec Data Loss Prevention services on the detection server.
The detection server may have lost its connection to the Enforce
Server. The detection server then queues its incidents locally,
and fills up the disk.
Tablespace is almost full Add additional data files to the database. When the hard disk is
at 80% of capacity, obtain a bigger disk instead of adding
additional data files.
Monitor not responding Restart the Symantec DLP Detection Server service. If the event
persists, check the network connections. Make sure the computer
that hosts the detections server is turned on by connecting to it.
You can connect with terminal services or another remote desktop
connection method. If necessary, contact Symantec Support.
Alert or scheduled report sending Go to System > Settings > General and ensure that the settings
failed in the Reports and Alerts and SMTP sections are configured
correctly. Check network connectivity between the Enforce Server
and the SMTP server. Contact Symantec Support.
Long message wait time Increase detection server capacity by adding more CPUs or
replacing the computer with a more powerful one.
Increase the threshold wait times if all of the following items are
true:
process_name restarts excessively Check the process by going to System > Servers > Overview.
To see individual processes on this screen, Process Control must
be enabled by going to System > Settings > General >
Configure.
N incidents in queue Investigate the reason for the incidents filling up the queue.
The most likely reasons are as follows:
systemevent.syslog.host=server1
systemevent.syslog.port=600
systemevent.syslog.format= [{0}] {1} - {2}
Using this example, a low disk space event notification from an Enforce Server on a host
named dlp-1 would look like:
Alerts are specified and edited on the Configure Alert screen, which is reached by System
> Servers and Detectors > Alerts > Add Alert.
Alerts can be specified based on event severity, server name, or event code, or a combination
of those factors. Alerts can be sent for any system event.
The email that is generated by the alert has a subject line that begins with Symantec Data
Loss Prevention System Alert followed by a short event summary. The body of the email
contains the same information that is displayed by the Event Detail screen to provide complete
information about the event.
See “Configuring the Enforce Server to send email alerts” on page 176.
See “Configuring system alerts” on page 177.
See “Server and Detectors event detail” on page 169.
Note: Reports with incident data cannot be distributed if this option is set.
■ Send report data with emails. Symantec Data Loss Prevention sends email messages
and attaches the report data.
Managing system events and messages 177
Configuring system alerts
3 Enter the Enforce Server domain name or IP address in the Fully Qualified Manager
Name field.
If you send reports as links, Symantec Data Loss Prevention uses the domain name as
the basis of the URL in the report email.
Do not specify a port number unless you have modified the Enforce Server to run on a
port other than the default of 443.
4 If you want alert recipients to see any correlated incidents, check the Correlations Enabled
box.
When correlations are enabled, users see them on the Incident Snapshot screen.
5 In the SMTP section, identify the SMTP server to use for sending out alerts and reports.
Enter the relevant information in the following fields:
■ Server: The fully qualified hostname or IP address of the SMTP server that Symantec
Data Loss Prevention uses to deliver system events and scheduled reports.
■ System email: The email address for the alert sender. Symantec Data Loss Prevention
specifies this email address as the sender of all outgoing email messages. Your IT
department may require the system email to be a valid email address on your SMTP
server.
■ User ID: If your SMTP server requires it, type a valid user name for accessing the
server. For example, enter DOMAIN\bsmith.
■ Password: If your SMTP server requires it, enter the password for the User ID.
6 Click Save.
See “About system alerts” on page 175.
See “Configuring system alerts” on page 177.
See “About system events” on page 164.
Alerts are specified and edited on the Configure Alert screen, which is reached by System
> Servers > Alerts and then choosing Add Alert to create a new alert, or clicking on the name
of an existing alert to modify it.
To create or modify an alert
1 Go the Alerts screen (System > Servers and Detectors > Alerts).
2 Click the Add Alert tab to create a new alert, or click on the name of an alert to modify
it.
The Configure Alert screen is displayed.
3 Fill in (or modify) the name of the alert. The alert name is displayed in the subject line of
the email alert message.
4 Fill in (or modify) a description of the alert.
5 Click Add Condition to specify a condition that will trigger the alert.
Each time you click Add Condition you can add another condition. If you specify multiple
conditions, every one of the conditions must be met to trigger the alert.
Click on the red X next to a condition to remove it from an existing alert.
6 Enter the email address that the alert is to be sent to. Separate multiple addresses by
commas.
7 Limit the maximum number of times this alert can be sent in one hour by entering a number
in the Max Per Hour box.
If no number is entered in this box, there is no limit on the number of times this alert can
be sent out. The recommended practice is to limit alerts to one or two per hour, and to
substitute a larger number later if necessary. If you specify a large number, or no number
at all, recipient mailboxes may be overloaded with continual alerts.
8 Click Save to finish.
The Alerts list is displayed.
There are three kinds of conditions that you can specify to trigger an alert:
■ Event type - the severity of the event.
■ Server - the server associated with the event.
■ Event code - a code number that identifies a particular kind of event.
For each kind of condition, you can choose one of two operators:
■ Is any of.
■ Is none of.
For each kind of condition, you can specify appropriate parameters:
Managing system events and messages 179
About log review
■ Event type. You can select one, or a combination of, Information, Warning, Severe. Click
on an event type to specify it. To specify multiple types, hold down the Control key while
clicking on event types. You can specify one, two, or all three types.
■ Server. You can select one or more servers from the list of available servers. Click on the
name of server to specify it. To specify multiple servers, hold down the Control key while
clicking on server names. You can specify as many different servers as necessary.
■ Event code. Enter the code number. To enter multiple code numbers, separate them with
commas or use the Return key to enter each code on a separate line.
See “System event codes and messages” on page 180.
By combining multiple conditions, you can define alerts that cover a wide variety of system
conditions.
Note: If you define more than one condition, the conditions are treated as if they were connected
by the Boolean "AND" operator. This means that the Enforce Server only sends the alert if all
conditions are met. For example, if you define an event type condition and a server condition,
the Enforce Server only sends the alert if the specified event occurs on the designated server.
Note: Numbers enclosed in braces, such as {0}, indicate text strings that are dynamically
inserted into the actual event name or description message.
1001 Local monitor started All monitor processes have been started.
1002 Monitor started Some monitor processes are disabled and haven't been
started.
1003 Local monitor started Some monitor processes are disabled and haven't been
started.
1005 Local monitor stopped All monitor processes have been stopped.
1006 {0} failed to start Process {0} can't be started. See log files for more detail.
1007 {0} restarts excessively Process {0} has restarted {1} times during last {2} minutes.
1008 {0} is down {0} process went down before it had fully started.
1010 Restarted {0} {0} process was restarted because it went down unexpectedly.
1011 Restarted {0} {0} was restarted because it was not responding.
1012 Unable to start {0} Cannot bind to the shutdown datagram socket. Will retry.
1014 Low disk space Hard disk space is low. Symantec Data Loss Prevention
server disk usage is over {0}%.
Managing system events and messages 181
System event codes and messages
1101 Aggregator failed to start Error starting Aggregator. {0} No incidents will be detected.
1102 Communications with non-legacy SSL keystore and truststore are not configured for this
agents are disabled endpoint server. Please go to configure server page to
configure SSL keystore and truststore.
1200 Loaded policy "{0}" Policy "{0}" v{1} ({2}) has been successfully loaded.
1202 No policies loaded No relevant policies are found. No incidents will be detected.
1203 Unloaded policy "{0}" Policy "{0}" has been unloaded.
1204 Updated policy "{0}" Policy "{0}" has been successfully updated. The current policy
version is {1}. Active channels: {2}.
1205 Incident limit reached for Policy The policy "{0}" has found incidents in more than {1}
"{0}" messages within the last {2} hours. The policy will not be
enforced until the policy is changed, or the reset period of {2}
hours is reached.
1206 Long message wait time Message wait time was {0}:{1}:{2}:{3}.
1207 Failed to load Vector Machine Failed to load [{0}] Vector Machine Learning profile. See
Learning profile server logs for more details.
1208 Failed to unload Vector Machine Failed to unload [{0}] Vector Machine Learning profile. See
Learning profile server logs for more details.
1209 Loaded Vector Machine Learning Loaded [{0}] Vector Machine Learning profile.
profile
1210 Unloaded Vector Machine Unloaded [{0}] Vector Machine Learning profile.
Learning profile
1211 Vector Machine Learning training Training succeeded for [{0}] Vector Machine Learning profile.
successful
1212 Vector Machine Learning training Training failed for [{0}] Vector Machine Learning profile.
failed
Managing system events and messages 182
System event codes and messages
1213 {0} messages timed out in {0} messages timed out in Detection in the last {1} minutes.
Detection recently Enable Detection execution trace logs for details.
1214 Detected regular expression rules Policy set contains regular expression rule(s) with invalid
with invalid patterns patterns. See FileReader.log for details.
1302 File Reader failed to start Error starting File Reader. {0} No incidents will be detected.
1303 Unable to delete folder File Reader was unable to delete folder "{0}" in the file system.
Please investigate, as this will cause system malfunction.
1305 Channel disabled Monitor channel "{0}" has been disabled. 1306 License
received. {0}.
1401 Invalid license The ICAP channel is not licensed or the license has expired.
No incidents will be detected or prevented by the ICAP
channel.
1402 Content Removal Incorrect Configuration rule in line {0} is outdated or not written in
proper grammar format. Either remove it from the config file
or update the rule.
1403 Out of memory Error (Web While processing request on connection ID{0}, out of memory
Prevent) while processing error occurred. Please tune your setup for traffic load.
message
Managing system events and messages 183
System event codes and messages
1404 Host restriction Any host (ICAP client) can connect to ICAP Server.
1405 Host restriction error Unable to get the IP address of host {0}.
1406 Host restriction error Unable to get the IP address of any host in Icap.AllowHosts.
1500 Invalid license The SMTP Prevent channel is not licensed or the license has
expired. No incidents will be detected or prevented by the
SMTP Prevent channel.
1501 Bind address error Unable to bind {0}. Please check the configured address or
the RequestProcessor log for more information. 1502 MTA
restriction error Unable to resolve host {0}.
1503 All MTAs restricted Client MTAs are restricted, but no hosts were resolved.
Please check the RequestProcessor log for more information
and correct the RequestProcessor.AllowHosts setting for this
Prevent server.
1504 Downstream TLS Handshake TLS handshake with downstream MTA {0} failed. Please
failed check SmtpPrevent and RequestProcessor logs for more
information.
1505 Downstream TLS Handshake TLS handshake with downstream MTA {0} was successfully
successful completed.
1600 Override folder invalid Monitor channel {0} has invalid source folder: {1} Using folder:
{2}.
1601 Source folder invalid Monitor channel {0} has invalid source folder: {1} The channel
is disabled.
Managing system events and messages 184
System event codes and messages
1700 Scan start failed Discover target with ID {0} does not exist. 1701 Scan
terminated {0}
1705 Scheduled scan failed Failed to start a scheduled scan of Discover target {0}. {1}
1708 Scheduled scan suspension Scheduled suspension failed for scan of Discover target {0}.
failed {1}
1709 Scheduled scan resume failed Scheduled suspension failed for scan of Discover target {0}.
{1}
1710 Maximum Scan Duration Timeout Discover target "{0}" timed out because of Maximum Scan
Occurred Duration.
1711 Maximum Scan Duration Timeout Maximum scan time duration timed out for scan: {0}. However,
Failed an error occurred while trying to abort the scan.
1712 Scan Idle Timeout Occurred Discover target "{0}" timed out because of Scan Idle Timeout.
1713 Scan Idle Timeout Failed Maximum idle time duration timed out for scan: {0}. However,
an error occurred while trying to abort the scan.
1714 Scan terminated - Invalid Server Scan of discover target "{0}" has been terminated from the
State state of "{1}" because the associated discover server {2}
entered an unexpected state of "{3}".
1715 Scan terminated - Server Scan of discover target "{0}" has been terminated because
Removed the associated discover server {1} is no longer available.
1716 Scan terminated - Server Scan of discover target "{0}" has been terminated because
Reassigned the associated discover server {1} is already scanning
discover target(s) "{2}".
1717 Scan terminated - Transition Failed to handle the state change of discover server {1} while
Failed scanning discover target "{0}". See log files for details.
Managing system events and messages 185
System event codes and messages
1718 Scan start failed Scan of discover target "{0}" has failed to start. See log files
for detailed error description.
1719 Scan start failed due to Scan of discover target "{0}" has failed, as its target type is
unsupported target type no longer supported.
1750 Incident attachment migration Migration of incident attachments from database to external
started storage directory has started.
1751 Incident attachment migration Completed migrating incident attachments from database to
completed external storage directory.
1752 Incident attachment migration One or more incident attachments could not be migrated from
failed database to external storage directory. Check the incident
persister log for more details. Once the error is resolved,
restart the SymantecDLPIncidentPersisterService
service to resume the migration.
1753 Incident attachment migration One or more incident attachments migration from database
error. to external storage directory has encountered error. Check
the incident persister log for more details. Migration will
continue and will retry erred attachment later.
1754 Failed to update incident Failed to update the schedule to delete incident attachments
attachment deletion schedule in the external directory. Check the incident persister log for
more details.
1755 Incident attachment deletion Deletion of obsolete incident attachments from the external
started storage directory has started.
1756 Incident attachment deletion Deletion of obsolete incident attachments from the external
completed storage directory has completed.
Managing system events and messages 186
System event codes and messages
1757 Incident attachment deletion One or more incident attachments could not be deleted from
failed the external storage directory. Check the incident persister
log for more details.
1758 Incident attachment external Incident attachment external storage directory is not
storage directory is not accessible. Check the incident persister log for more details.
accessible
1800 Incident Persister is unable to Persister ran out of memory processing incident {0}.
process incident Incident
1802 Corrupted incident received A corrupted incident was received, and renamed to {0}.
1804 Incident Persister is unable to Incident Persister cannot start because it failed to access the
start incident folder {0}. Check folder permissions.
1805 Incident Persister is unable to Incidents folder The Incident Persister is unable to access
access the incident folder {0}. Check folder permissions.
1806 Response rule processing failed Response rule processing failed to start: {0}.
to start
1807 Response rule processing Response rule command runtime execution failed from error:
execution failed {0}.
1808 Unable to write incident Failed to delete old temporary file {0}.
1809 Unable to write incident Failed to rename temporary incident file {0}.
1810 Unable to list incidents Failed to list incident files in folder {0}. Check folder
permissions.
1811 Error sending incident Unexpected error occurred while sending an incident. {0}
Look in the incident writer log for more information.
Managing system events and messages 187
System event codes and messages
1812 Incident writer stopped Failed to delete incident file {0} after it was sent. Delete the
file manually, correct the problem and restart the incident
writer.
1813 Failed to list incidents Failed to list incident files in folder {0}. Check folder
permissions.
1814 Incident queue backlogged There are {0} incidents in this server's queue.
1815 Low disk space on incident server Hard disk space for the incident data storage server is low.
Disk usage is over {0}%.
1816 Failed to update policy statistics Failed to update policy statistics for policy {0}.
1817 Daily incident maximum The daily incident maximum for policy {0} has been
exceeded exceeded.\n No further incidents will be generated.
1818 Incident is oversized, has been Incident is oversized, has been partially persisted with
persisted with a limited number messageID {0}, Incident File Name {1}.
of components and/or violations
1821 Failure to process an incident Unexpected error occurred while sending an incident {0}
received from the cloud gateway
1900 Failed to load update package Database connection error occurred while loading the
software update package {0}.
1901 Software update failed Failed to apply software update from package {0}. Check the
update service log.
2000 Key ignition error Failed to ignite keys with the new ignition password. Detection
against Exact Data Profiles will be disabled.
2001 Unable to update key ignition The key ignition password won't be updated, because the
password. cryptographic keys aren't ignited. Exact Data Matching will
be disabled.
Managing system events and messages 188
System event codes and messages
2099 Administrator password reset The Administrator password has been reset by the password
reset tool.
2101 Data source removed The data source with ID {0} was removed by {1}.
2102 Data source saved The {0} data source was saved by {1}.
2103 Document source removed The document source with ID {0} was removed by {1}.
2104 Document source saved The {0} document source was saved by {1}.
2105 New protocol created The new protocol {0} was created by {1}.
2106 Protocol order changed The protocol {0} was moved {1} by {2}.
2109 User removed The user with ID {0} was removed by {1}.
2111 Runaway lookup detected One of the attribute lookup plug-ins did not complete
gracefully and left a running thread in the system. Manager
restart may be required for cleanup.
2112 Loaded Custom Attribute Lookup Plug-ins The following Custom Attribute
Lookup Plug-ins were loaded: {0}.
2113 No Custom Attribute Lookup No Custom Attribute Lookup Plug-in was found.
Plug-in was loaded
2114 Custom attribute lookup failed Lookup plug-in {0} timed out. It was unloaded.
2115 Custom attribute lookup failed Failed to instantiate lookup plug-in {0}. It was unloaded. Error
message: {1}
2118 Alert or scheduled report sending configured by {1} contains the following unreachable email
failed. {0} addresses: {2}. Either the addresses are bad or your email
server does not allow relay to those addresses.
2119 System settings changed The system settings were changed by {0}.
2120 Endpoint Location settings The endpoint location settings were changed by {0}.
changed
2121 The account ''{1}'' has been The maximum consecutive failed logon number of {0}
locked out attempts has been exceeded for account ''{1}'', consequently
it has been locked out.
2122 Loaded FlexResponse Actions The following FlexResponse Actions were loaded: {0}.
2124 A runaway FlexResponse action One of the FlexResponse plug-ins did not complete gracefully
was detected. and left a running thread in the system. Manager restart may
be required for cleanup.
2125 Data Insight settings changed. The Data Insight settings were changed by {0}.
2126 Agent configuration created Agent configuration {0} was created by {1}.
2127 Agent configuration modified Agent configuration {0} was modified by {1}.
2128 Agent configuration removed Agent configuration {0} was removed by {1}.
2129 Agent configuration applied Agent configuration {0} was applied to endpoint server {1} by
{2}.
2130 Directory Connection source The directory connection source with ID {0} was removed by
removed {1}.
2131 Directory Connection source The {0} directory connection source was saved by {1}.
saved
2132 Agent Troubleshooting Task Agent Troubleshooting task of type {0} created by user {1}.
2134 Certificate authority file is corrupt. Certificate authority file {0} is corrupt.
Managing system events and messages 190
System event codes and messages
2135 Password changed for certificate Password changed for certificate authority file {0}. New
authority file. certificate authority file is {1}.
2136 Server keystore generated. Server keystore {0} generated for endpoint server {1}.
2137 Server keystore is missing or Server keystore {0} for endpoint server {1} is missing or
corrupt. corrupt.
2138 Server truststore generated. Server truststore {0} generated for endpoint server {1}.
2139 Server truststore is missing or Server truststore {0} for endpoint server {1} is missing or
corrupt. corrupt.
2140 Client certificates and key Client certificates and key generated.
generated.
2141 Agent installer package Agent installer package generated for platforms {0}.
generated.
2200 End User License Agreement The Symantec Data Loss Prevention End User License
accepted Agreement was accepted by {0}, {1}, {2}.
2202 License has expired One or more of your product licenses has expired. Some
system feature may be disabled. Check the status of your
licenses on the system settings page.
2203 License about to expire One or more of your product licenses will expire soon. Check
the status of your licenses on the system settings page.
2204 No license The license does not exist, is expired or invalid. No incidents
will be detected.
2205 Keys ignited The cryptographic keys were ignited by administrator logon.
2206 Key ignition failed Failed to ignite the cryptographic keys manually. Please look
in the Enforce Server logs for more information. It will be
impossible to create new exact data profiles.
2207 Auto key ignition The cryptographic keys were automatically ignited.
Managing system events and messages 191
System event codes and messages
2208 Manual key ignition required The automatic ignition of the cryptographic keys is not
configured. Administrator logon is required to ignite the
cryptographic keys. No new exact data profiles can be created
until the administrator logs on.
2300 Low disk space Hard disk space is low. Symantec Data Loss Prevention
Enforce Server disk usage is over {0}%.
2301 Tablespace is almost full Oracle tablespace {0} is over {1}% full.
2302 {0} not responding Detection Server {0} did not update its heartbeat for at least
20 minutes.
2303 Monitor configuration changed The {0} monitor configuration was changed by {1}.
2304 System update uploaded A system update was uploaded that affected the following
components: {0}.
2305 SMTP server is not reachable. SMTP server is not reachable. Cannot send out alerts or
schedule reports.
2308 Monitor status updater exception The monitor status updater encountered a general exception.
Please look at the Enforce Server logs for more information.
2309 System statistics update failed Unable to update the Enforce Server disk usage and database
usage statistics. Please look at the Enforce Server logs for
more information.
2310 Statistics aggregation failure The statistics summarization task encountered a general
exception. Refer to the Enforce Server logs for more
information.
2311 Version mismatch Enforce version is {0}, but this monitor's version is {1}.
2313 Incident deletion completed Incident deletion ran for {0} and deleted {1} incident(s).
2315 Low disk space on incident server Hard disk space for the incident data storage server is low.
Disk usage is over {0}%.
2316 Over {0} incidents currently Persisting over {0} incidents can decrease database
contained in the database performance.
2318 Incident deletion flagging process Incident deletion flagging process started.
started.
2319 Incident deletion flagging process Incident deletion flagging process ended.
ended.
2320 Version obsolete Detection server is not supported when two major versions
older than Enforce server version. Enforce version is {0}, and
this detection server's version is {1}. This detection server
must be upgraded.
2321 Version older than Enforce Enforce will not have visibility for this detection server and
version will not be able to send updates to it. Detection server
incidents will be received and processed normally. Enforce
version is {0}, and this detection server's version is {1}.
2322 Version older than Enforce Functionality introduced with recent versions of Enforce
version relevant to this type of detection server will not be supported
by this detection server. Enforce version is {0}, and this
detection server's version is {1}.
2323 Minor version older than Enforce Functionality introduced with recent versions of Enforce
minor version relevant to this type of detection server will not be supported
by this detection server and might be incompatible with this
detection server. Enforce version is {0}, and this detection
server's version is {1}. This detection server should be
upgraded.
2324 Version newer than Enforce Detection server is not supported when its version is newer
version than the Enforce server version. Enforce version is {0}, and
this detection server's version is {1}. Enforce must be
upgraded or detection server must be downgraded.
Managing system events and messages 193
System event codes and messages
2400 Export web archive finished Archive "{0}" for user {1} was created successfully.
2401 Export web archive canceled Archive "{0}" for user {1} was canceled.
2402 Export web archive failed Failed to create archive "{0}" for user {1}. The report specified
had over {2} incidents.
2403 Export web archive failed Failed to create archive "{0}" for user {1}. Failure occurred at
incident {2}.
2404 Unable to run scheduled report The scheduled report job {0} was invalid and has been
removed.
2405 Unable to run scheduled report The scheduled report {0} owned by {1} encountered an error:
{2}.
2406 Report scheduling is disabled The scheduled report {0} owned by {1} cannot be run because
report scheduling is disabled.
2407 Report scheduling is disabled The scheduled report cannot be run because report
scheduling is disabled.
2408 Unable to run scheduled report Unable to connect to mail server when delivery scheduled
report {0}{1}.
2409 Unable to run scheduled report User {0} is no longer in role {1} which scheduled report {2}
belongs to. The schedule has been deleted.
2410 Unable to run scheduled report Unable to run scheduled report {0} for user {1} because the
account is currently locked.
2411 Scheduled report sent The schedule report {0} owned by {1} was successfully sent.
2412 Export XML report failed XML Export of report by user [{0}] failed XML Export of report
by user [{0}] failed.
2420 Unable to run scheduled data Unable to distribute report {0} (id={1}) by data owner because
owner report distribution sending of report data has been disabled.
2421 Report distribution by data owner Report distribution by data owner for report {0} (id={1}) failed.
failed
2422 Report distribution by data owner Report distribution by data owner for report {0} (id={1})
finished finished with {2} incidents for {3} data owners. {4} incidents
for {5} data owners failed to be exported.
Managing system events and messages 194
System event codes and messages
2423 Report distribution to data owner The report distribution {1} (id={2}) for the data owner "{0}"
truncated exceeded the maximum allowed size. Only the first {3}
incidents were sent to "{0}".
2500 Unexpected Error Processing {0} encountered an unexpected error processing a message.
Message See the log file for details.
2501 Memory Throttler disabled {0} x {1} bytes need to be available for memory throttling.
Only {2} bytes were available. Memory Throttler has been
disabled.
2600 Communication error Unexpected error occurred while sending {1} updates to {0}.
{2} Please look at the monitor controller logs for more
information.
2650 Communication error(VML) Unexpected error occurred while sending profile updates
config set {0} to {1} {2}. Please look at the monitor controller
logs for more information.
2702 Update transferred to {0} Successfully transferred update package {1} to detection
server {0}.
2703 Update transfer complete Successfully transferred update package {0} to all detection
servers.
2704 Update of {0} failed Failed to transfer update package to detection server {0}.
2705 Configuration file delivery Successfully transferred config file {0} to detection server.
complete
Managing system events and messages 195
System event codes and messages
2706 Log upload request sent. Successfully sent log upload request {0}.
2707 Unable to send log upload Encountered a recoverable error while attempting to deliver
request log upload request {0}.
2708 Unable to send log upload Encountered an unrecoverable error while attempting to
request deliver log upload request {0}.
2709 Using built-in certificate Using built-in certificate to secure the communication between
Enforce and Detection Servers.
2710 Using user generated certificate Using user generated certificate to secure the communication
between Enforce and Detection Servers.
2711 Time mismatch between Enforce Time mismatch between Enforce and Monitor. It is
and Monitor. This may affect recommended to fix the time on the monitor through automatic
certain functions in the system. time synchronization.
2713 Cloud connector disconnected Error {0} - check your network settings.
2800 Bad spool directory configured Packet Capture has been configured with a spool directory:
for Packet Capture {0}. This directory does not have write privileges. Please
check the directory permissions and monitor configuration
file. Then restart the monitor.
2901 Keys are not ignited Exact Data Matching will be disabled until the cryptographic
keys are ignited.
2902 Index folder inaccessible Failed to list files in the index folder {0}. Check the
configuration and the folder permissions.
Managing system events and messages 196
System event codes and messages
2903 Created index folder The local index folder {0} specified in the configuration had
not existed. It was created.
2904 Invalid index folder The index folder {0} specified in the configuration does not
exist.
2905 Exact data profile creation failed Data file for exact data profile "{0}" was not created. Please
look in the enforce server logs for more information.
2907 Replication canceled Canceled replication of database profile "{0}" version {1} to
server {2}.
2908 Replication failed Connection to database was lost while replicating database
profile {0} to server {1}.
2909 Replication failed Database error occurred while replicating database profile
{0} to server {1}.
2910 Failed to remove index file Failed to delete index file {1} of database profile {0}.
2911 Failed to remove index files Failed to delete index files {1} of database profile {0}.
2912 Failed to remove orphaned file Failed to remove orphaned database profile index file {0}.
2913 Replication failed Replication of database profile {0} to server {2} failed.{1}
Check the monitor controller log for more details.
2914 Replication completed Completed replication of database profile {0} to server {2}.
File {1} was transferred successfully.
2915 Replication completed Completed replication of database profile {0} to the server
{2}. Files {1} were transferred successfully.
2916 Database profile removed Database profile {0} was removed. File {1} was deleted
successfully.
2917 Database profile removed Database profile {0} was removed. Files {1} were deleted
successfully.
2918 Loaded database profile Loaded database profile {0} from {1}.
2920 Failed to load database profile {2} No incidents will be detected against database profile "{0}"
version {1}.
Managing system events and messages 197
System event codes and messages
2921 Failed to unload database profile {2} It may not be possible to reload the database profile "{0}"
version {1} in the future without detection server restart.
2922 Couldn't find registered content Registered content with ID {0} wasn't found in database during
indexing.
2924 Process shutdown during The process has been shutdown during indexing. Some
indexing registered content may have failed to create.
2925 Policy is inaccurate Policy "{0}" has one or more rules with unsatisfactory
detection accuracy against {1}.{2}
2926 Created exact data profile Created {0} from file "{1}".\nRows processed: {2}\nInvalid
rows: {3}\nThe exact data profile will now be replicated to all
Symantec Data Loss Prevention Servers.
2927 User Group "{0}" synchronization The following User Group directories have been
failed removed/renamed in the Directory Server and could not be
synchronized: {1}.Please update the "{2}" User Group page
to reflect such changes.
2928 One or more EDM profiles are out Check the "Manage > Data Profiles > Exact Data" page for
of date and must be reindexed more details. The following EDM profiles are out of date: {0}.
3002 Replication canceled Canceled replication of document profile "{0}" version {1} to
server {2}.
3003 Replication failed Connection to database was lost while replicating document
profile "{0}" version {1} to server {2}.
3004 Replication failed Database error occurred while replicating document profile
"{0}" version {1} to server {2}.
3005 Failed to remove index file Failed to delete index file {2} of document profile "{0}" version
{1}.
Managing system events and messages 198
System event codes and messages
3006 Failed to remove index files Failed to delete index files {2} of document profile "{0}" version
{1}.
3008 Replication failed Replication of document profile "{0}" version {1} to server {3}
failed. {2}\nCheck the monitor controller log for more details.
3009 Replication completed Completed replication of document profile "{0}" version {1}
to server {3}. File {2} was transferred successfully.
3010 Replication completed Completed replication of document profile "{0}" version {1}
to server {3}.\nFiles {2} were transferred successfully.
3011 Document profile removed Document profile "{0}" version {1} was removed. File {2} was
deleted successfully.
3012 Document profile removed Document profile "{0}" version {1} was removed. Files {2}
were deleted successfully.
3013 Loaded document profile Loaded document profile "{0}" version {1} from {2}.
3014 Unloaded document profile Unloaded document profile "{0}" version {1}.
3015 Failed to load document profile {2}No incidents will be detected against document profile "{0}"
version {1}.
3016 Failed to unload document profile {2} It may not be possible to reload the document profile "{0}"
version {1} in the future without monitor restart.
3017 Created document profile Created "{0}" from "{1}". There are {2} accessible files in the
content root. {3} The profile contains index for {4}
document(s). {5} The document profile will now be replicated
to all Symantec Data Loss Prevention Servers.
3018 Document profile {0} has reached maximum size. Only {1} out of {2} documents
are indexed.
3020 Created document profile Created "{0}" from "{1}". There are {2} accessible files in the
content root. {3} The profile contains index for {4}
document(s). Comparing to last indexing run: {5} new
document(s) were added, {6} document(s) were updated, {7}
documents were unchanged, and {8} documents were
removed. The document profile will now be replicated to all
Symantec Data Loss Prevention servers.
Managing system events and messages 199
System event codes and messages
3021 Nothing to index The new remote IDM profile for source "{0}" was identical to
the previous imported version.
3022 Profile conversion IDM profile {0} has been converted to {1} on the endpoint.
3023 Endpoint IDM profiles memory IDM profile {0} size plus already deployed profiles size are
usage too large to fit on the endpoint, only exact matching will be
available.
3100 Invalid Attributes detected with Invalid or unsafe Attributes passed from Standard In were
Script Lookup Plugin removed during script execution. Please check the logs for
more details.
3101 Invalid Attributes detected with Invalid or unsafe Attributes passed to Standard Out were
Script Lookup Plugin removed during script execution. Please check the logs for
more details.
3301 Capture failed to start on device Device {0} is configured for capture, but could not be
{0} initialized. Please see PacketCapture.log for more information.
3302 PacketCapture could not elevate PacketCapture could not elevate its privileges. Some
its privilege level initialization tasks are likely to fail. Please check ownership
and permissions of the PacketCapture executable.
3303 PacketCapture failed to drop its Root privileges are still attainable after attempting to drop
privilege level them. PacketCapture will not continue
3304 Packet Capture started again as Packet capture started processing again because some disk
more disk space is available space was freed on the monitor hard drives.
3305 Packet Capture stopped due to Packet capture stopped processing packets because there
disk space limit is too little space on the monitor hard drives.
3306 Endace DAG driver is not Packet Capture was unable to activate Endace device
available support. Please see PacketCapture.log for more information.
3307 PF_RING driver is not available Packet Capture was unable to activate devices using the
PF_RING interface. Please check PacketCapture.log and
your system logs for more information.
3308 PACKET_MMAP driver is not Packet Capture was unable to activate devices using the
available PACKET_MMAP interface. Please check PacketCapture.log
and your system logs for more information.
3309 {0} is not available Packet Capture was unable to load {0} . No native capture
interface is available. Please see PacketCapture.log for more
information.
Managing system events and messages 201
System event codes and messages
3310 No {0} Traffic Captured {0} traffic has not been captured in the last {1} seconds.
Please check Protocol filters and the traffic sent to the
monitoring NIC.
3311 Could not create directory Could not create directory {0} : {1}.
3400 Couldn't add files to zip The files requested for collection could not be written to an
archive file.
3401 Couldn't send log collection The files requested for collection could not be sent.
3402 Couldn't read logging properties A properties file could not be read. Logging configuration
changes were not applied.
3403 Couldn't unzip log configuration The zip file containing logging configuration changes could
package not be unpacked. Configuration changes will not be applied.
3404 Couldn't find files to collect There were no files found for the last log collection request
sent to server.
3405 File creation failed Could not create file to collect endpoint logs.
3406 Disk usage exceeded File creation failed due to insufficient disk space.
3407 Max open file limit exceeded File creation failed as max allowed number of files are already
open.
3500 SPC Server successfully SPC Server successfully registered. Product Instance Id [{0}].
registered.
3501 SPC Server successfully SPC Server successfully unregistered. Product Instance Id
unregistered. [{0}].
3502 A self-signed certificate was A self-signed certificate was generated. Certificate alias [{0}].
generated.
Managing system events and messages 202
System event codes and messages
3600 User import completed User import from source {0} completed successfully.
successfully.
3601 User import failed. User import from data source {0} has failed.
3602 Updated user data linked to Updated user data linked to {0} existing incident events.
incidents.
3700 Unable to write catalog item Failed to delete old temporary file {0}.
3701 Unable to rename catalog item Failed to rename temporary catalog item file {0}.
3702 Unable to list catalog items Failed to list catalog item files in folder {0}.Check folder
permissions.
3703 Error sending catalog items Unexpected error occurred while sending an catalog
item.{0}Look in the file reader log for more information.
3704 File Reader failed to delete files. Failed to delete catalog file {0} after it was sent.\nDelete the
file manually, correct the problem and restart the File Reader.
3705 Failed to list catalog item files Failed to list catalog item files in folder {0}.Check folder
permissions.
3706 The configuration is not valid. The property {0} was configured with invalid value {1}. Please
make sure that this has correct value provided.
3707 Scan failed: Remediation Remediation detection catalog update timed out after {0}
detection catalog could not be seconds for target {1}.
updated
3802 Invalid Port for Could not retrieve the port for DetectionServerDatabase
DetectionServerDatabase process to listen to connection. Reason: {0}. Check if the
property file setting has the valid port number.
3900 Internal communications error. Internal communications error. Please see {0} for errors.
Search for the string {1}.
3901 System events have been System event throttle limit exceeded. {0} events have been
suppressed. suppressed. Internal error code = {1}.
4000 Agent Handshaker error Agent Handshaker error. Please see {0} for errors. Search
for the string {1}.
Table 8-42 Monitor controller replication communication layer application error events
4050 Agent data batch persist error Unexpected error occurred while agent data being persisted
: {0}. Please look at the monitor controller logs for more
information.
4051 Agent status attribute batch Status attribute data for {0} agent(s) could not be persisted.
persist error Please look at the monitor controller logs for more information.
4052 Agent event batch persist Event data for {0} agent(s) could not be persisted. Please
look at the monitor controller logs for more information.
4101 Response Rule Execution Request fetch failed even after {0} retries. Database
Service Database failure on connection still down. The service will be stopped.
request fetch
Managing system events and messages 204
System event codes and messages
4200 Cloud Service enrollment: Cloud Service enrollment: successfully received client
successfully received client certificate from Symantec Managed PKI Service.
certificate from Symantec
Managed PKI Service
4205 Symantec Managed PKI Symantec Managed PKI certificate expires in {0} days.
certificate expires in {0} days
4206 Symantec Managed PKI Service Symantec Managed PKI Service certificate has expired.
certificate has expired
4211 Cloud Service enrollment bundle Enrollment file missing from ZIP bundle.
error
4212 Invalid Cloud Detector enrollment Detector info doesn't match the existing configuration.
bundle
4400 One or more User Group profiles Check the "Manage > Policies > User Groups" page for
are out of date and must be more details. The following User Group profiles are out of
reindexed. date: {0}.
4701 Cloud operations events or Cloud operations issued an event or notification about the
notifications cloud service.
Managing system events and messages 205
System event codes and messages
4800 OCR service is busy Request not processed. OCR server's request queue
is full.
4801 Request failed to connect to Please verify OCR server's address, port, and that it
OCR server is reachable. Check logs for more detail.
4802 OCR server had an internal Please check OCR server logs for details about what
server error went wrong.
4807 The client and/or OCR server Unable to verify client and server with each other as
are not authorized with each authorized endpoints. Please verify that the client and
other server keystores are configured correctly. Check logs
on detection server and OCR server for more details.
Chapter 9
Managing the Symantec
Data Loss Prevention
database
This chapter includes the following topics:
You can generate a full database report in HTML format to share with Symantec Technical
Support at any time by clicking Get full report. The data in the report can help Symantec
Technical Support troubleshoot issues in your database.
See “Generating a database report” on page 208.
■ Auto Extendable: Specifies if the file is automatically extendable based on the Autoextend
setting of the file in the Oracle database.
■ Extendable To (MB): The maximum size to which the file can be automatically extended,
in megabytes.
■ Path: The path to the file.
com.vontu.manager.tablespaceThreshold.warning=85
com.vontu.manager.tablespaceThreshold.severe=95
■ Other Tables: This tab lists all other tables in the schema. The tab displays the following
information:
■ Table Name: The name of the table.
■ In Tablespace: The name of the tablespace that contains the table.
■ Size (MB): The size of the table, in megabytes.
■ % Full: The percentage of the table currently in use.
■ Indices: This table lists all of the indexes in the schema. The tab displays the following
information:
■ Index Name: The name of the index.
Managing the Symantec Data Loss Prevention database 210
Checking the database update readiness
■ Table Name: The name of the table that contains the index.
■ In Tablespace: The name of the tablespace that contains the table.
■ Size (MB): The size of the table, in megabytes.
■ % Full: The percentage of the table currently in use.
■ LOB Segments: This table lists all of the large object (LOB) tables in the schema. The tab
displays the following information:
■ Table Name: The name of the table.
■ Column Name: The name of the table column containing the LOB data.
■ In Tablespace: The name of the tablespace that contains the table.
■ LOB Segment Size (MB): The size of the LOB segment, in megabytes.
■ LOB Index Size: The size of the LOB index, in megabytes.
■ % Full: The percentage of the table currently in use.
Note: The percentage used value for each table displays the percentage of the table currently
in use as reported by the Oracle database in dark blue. It also includes an additional estimated
percentage used range in light blue. Symantec Data Loss Prevention calculates this range
based on tablespace utilization.
■ Numeric overflow
■ Temp Oracle space
Table 9-1 lists tasks you complete to run the tool.
1 Prepare to run the Update Readiness See “Preparing to run the Update Readiness tool”
tool. on page 211.
2 Create the Update Readiness tool See “Creating the Update Readiness tool database
database account. account” on page 213.
3 Run the tool. See “Running the Update Readiness tool at the
command line” on page 215.
4 Review the update readiness results. See “Reviewing update readiness results” on page 218.
Note: Review the Readme file that is included with the tool for a list of Symantec Data
Loss Prevention versions the tool is capable of testing.
■ That you are running the same Oracle Client version as the Oracle Server version.
If the versions do not match, the Oracle Client cannot connect to the database, which
causes the Update Readiness tool to fail.
■ That the Oracle Client is installed as Administrator.
If the Oracle Client is not installed as Administrator, reinstall it and select Administrator
on the Select Installation Type panel. Selecting Administrator enables the
command-line clients, expdp and impdp.
To unschedule jobs
1 Log on to SQL*Plus using the Symantec Data Loss Prevention database user name and
password.
2 Run the following:
BEGIN
FOR rec IN (SELECT * FROM user_jobs) LOOP
dbms_job.broken( rec.job, true);
dbms_job.remove( rec.job);
END LOOP;
END;
/
Confirm that the count is zero. If the count is not zero, run the command to clear the queue
again. If a job is running when you attempt to clear the queue, the job continues to run
until it completes and is not cleared. For long running jobs, Symantec recommends that
you wait for the job to complete instead of terminating the job.
4 Exit SQL*Plus.
sqlplus /nolog
SQL> @oracle_create_user.sql
4 At the Please enter the password for sys user prompt, enter the password for the SYS
user.
5 At the Please enter Service Name prompt, enter a user name.
6 At the Please enter required username to be created prompt, enter a name for the new
upgrade readiness database account.
Managing the Symantec Data Loss Prevention database 214
Checking the database update readiness
7 At the Please enter a password for the new username prompt, enter a password for
the new upgrade readiness database account.
Use the following guidelines to create an acceptable password:
■ Passwords cannot contain more than 30 characters.
■ Passwords cannot contain double quotation marks, commas, or backslashes.
■ Avoid using the & character.
■ Passwords are case-sensitive by default. You can change the case sensitivity through
an Oracle configuration setting.
■ If your password uses special characters other than _, #, or $, or if your password
begins with a number, you must enclose the password in double quotes when you
configure it.
Store the user name and password in a secure location for future use. You use this user
name and password to run the Update Readiness tool.
8 As the database sysdba user, grant permission to the Symantec Data Loss Prevention
schema user name for the following database objects:
Warning: Do not enter the protect user database credentials. Entering credentials other
than the Update Readiness tool database account overwrites the Symantec Data Loss
Prevention database.
See “Creating the Update Readiness tool database account” on page 213.
4 Click Run Update Readiness Tool to begin the update readiness check.
You can click Refresh this page to update the status of the readiness check. When you
refresh, a link to a summary of results returned at that point in time displays. The process
may take up to an hour depending on the size of the database.
When the tool completes the test, you are provided with a link you can use to download
the results log.
See “Reviewing update readiness results” on page 218.
See “Checking the database update readiness” on page 210.
"/opt/Symantec/DataLossPrevention/ServerJRE/1.8.0_181/bin/java" UpdateReadinessTool
--username <schema user name>
--password <password>
--readiness_username <readiness_username>
--readiness_password <readiness_password>
--sid <database_system_id>
[--quick]
<schema user name> The Symantec Data Loss Prevention schema user name.
<readiness_username> The Update Readiness tool database account user you created.
<readiness_password> The password for the Update Readiness tool database account
user.
[--quick] The optional command only runs the database object check and
skips the update readiness test.
After the test completes, you can locate the results in a log file in the /output directory.
This directory is located where you extracted the Update Readiness tool. If you do not
include [--quick] when you run the tool, the test may take up to an hour to complete.
You can verify the status of the test by reviewing log files in the /output directory.
See “Preparing to run the Update Readiness tool” on page 211.
See “Reviewing update readiness results” on page 218.
Managing the Symantec Data Loss Prevention database 218
Checking the database update readiness
Status Description
Pass Items that display under this section are confirmed and ready for update.
Warning If not fixed, items that display under this section may prevent the database from
upgrading properly.
Error These items prevent the upgrade from completing and must be fixed.
those email and files, from where they are accessed, and how they are used. You can also
use the ICE Cloud Console to set specific group permissions. You can set permissions for the
saving, sharing, and editing of email and files for policy groups. You can also revoke access
to individual email and files or revoke rights to access email and files for specific policy groups.
How and what you protect depends upon the Symantec solution you integrate with ICE. ICE
is designed to bring end-to-end encryption to multiple Symantec products, enhancing the
security of your emails and files. Table 10-1 lists the most common ways you can use ICE
with Symantec products.
Protect files in cloud file storage such as Box and Symantec CloudSOC
OneDrive.
Protect files stored in: Symantec Data Loss Prevention 15 and later
■ Cloud file storage such as Box and OneDrive. Symantec Data Loss Prevention also allows you to
■ Enterprise file storage such as File System create robust policies and remediation rules to
servers and Microsoft SharePoint. protect these files and emails.
■ Endpoint content such as removable drives.
Protect emails and email attachments in the cloud. Symantec Data Loss Prevention for Email with
Cloud Console (DLP Cloud Console)
Integrate classification with encryption capabilities Symantec Information Centric Tagging (ICT)
for multilevel protection of sensitive information both
Integrating the capabilities of ICE and ICT results
inside and outside your network.
in a powerful information protection solution known
Applies to files and email in a Windows as Symantec Information Centric Security Module.
environment.
See the Symantec™ Information Centric Encryption Deployment Guide for details on integrating
Symantec ICE with Symantec Data Loss Prevention.
for authentication. If the user is authenticated, the ICE Utility decrypts the file. The user can
decrypt ICE-encrypted files when endpoints are not connected to the Internet.
The ICE Utility also applies any permission sets assigned to the user in the ICE Cloud Console.
For example, if you have disabled printing for the user or the policy group, the user is not able
to print the document.
Note: On mobile devices, the ICE Utility is called ICE Workspace. You can get ICE Workspace
with the VIP Access for Mobile app.
The ICE Utility is context aware, meaning that it recognizes a user's environment. The ICE
Utility can be deployed in two types of environments: managed environments and unmanaged
environments.
The Symantec ICE Utility automatically detects a network proxy that is configured on an
endpoint and uses it to connect to the Symantec ICE Cloud. Additionally, in a managed
environments, the ICE Utility uses the same network proxy settings that are stored in an agent
configuration used by the DLP Agent that is installed on the same endpoint.
■ In managed environments, your organization provides and maintains the devices on which
users access protected files.
In managed environments, the ICE Utility leverages the policies and security controls that
your organization puts in place over user devices. In this environment, the ICE Utility gives
the user greater flexibility with decrypting and working with protected files. Files open in
their native app, and the user has full access to the file to edit, share, save, save as, and
print the file. Users are required to authenticate at least once every 180 days (configurable
in the ICE Cloud Console).
The managed version of the ICE Utility works the same across Windows and macOS
platforms; however, the Windows version of the ICE Utility installation package also includes
the ICT agent. Users can only install the ICT agent if you have implemented ICT and
correctly configured the ICT agent installation package.
■ In unmanaged environments, such as those of your partners or in which employees bring
their own devices, users' devices are outside your direct control.
Since you have no direct control over the security of the users' devices in unmanaged
environments, the ICE Utility provides additional security. The ICE Utility enforces stricter
restrictions over when and how a file is decrypted, and allows you greater content control
through the use of permission sets.
When users attempt to open a protected file on a device without the ICE Utility, they are
prompted to download the ICE Utility.
Users that attempt to access an encrypted file are required to authenticate at least once
every 24 hours (configurable in the ICE Cloud Console).
Working with Symantec Information Centric Encryption 222
Overview of implementing Information Centric Encryption capabilities
■ On Windows, supported file types are decrypted and opened in their native app, but
the permissions that you assigned to the user are enforced. So, if you have restricted
printing for the user or the policy group, the user is unable to print the file.
Files that ICE does not support open in their native app, but ICE does not enforce
permissions.
■ On macOS, supported file types are opened in their native app, if the edit permission
is enabled on the Information Centric Encryption Cloud Console. However, if the
permissions include content lock or print restrictions, such files open in the Mac
Preview application in view-only mode. For Office formats, ICE-encrypted files launch
the Microsoft Office application. If the user does not have Microsoft Office installed,
then Word documents open in Mac TextEdit, and Excel and PowerPoint files open in
Mac Preview.
On iOS, supported file types are opened in a view-only mode irrespective of the
permissions that are assigned to the user.
In all environments, when the user finishes with the file, the ICE Utility encrypts it again,
maintaining the file's security throughout its lifetime. However, if the permissions for a user
allow the user to save the file with a new name, the new file is not encrypted.
See the following for more information about the ICE Utility.
2 Configure the Enforce See “Configuring the Enforce Server to connect to the
Server to connect to the Symantec ICE Cloud” on page 224.
Symantec ICE Cloud.
3 Configure policy response See “Configuring the Endpoint Prevent: Encrypt action”
rule actions to protect on page 1821.
sensitive files using ICE
See “Configuring the Network Protect: Encrypt File action”
encryption.
on page 1838.
4 Configure Network Protect See “Configuring Network Protect for file shares” on page 2177.
to enable ICE encryption
protection for supported
scan targets.
5 Configure Cloud Service See “Encrypting cloud email with Symantec Information Centric
for Email policy response Encryption” on page 2518.
rule actions to protect both
sensitive emails and
attachments or sensitive
email attachments using
ICE encryption.
6 Enable ICE encryption in See “Information Centric Encryption settings for DLP Agents”
Endpoint Prevent to protect on page 2371.
confidential files that are:
See “Configuring Network Protect for SharePoint servers”
■ Stored on removable on page 2203.
devices that are
connected to endpoints
■ Stored on cloud storage
applications
■ Uploaded with
browsers using HTTPS
Working with Symantec Information Centric Encryption 224
Configuring the Enforce Server to connect to the Symantec ICE Cloud
7 Download and then install The ICE Utility is available for download from Symantec
the ICE Utility on all FileConnect.
managed devices within
See “About the Symantec ICE Utility” on page 220.
your organization. The ICE
Utility is required for users
to be able to access
ICE-encrypted files.
■ Service Password
Note: Obtain this information from the Settings > Advanced Configuration > External
Services page of the ICE Cloud Console. Note that the Service Password is only visible
when you first authorize an external service. If you have lost your Service Password, the
only way to see your Service Password is to obtain a new one.
4 Click Save.
5 To enable and configure the ICE functionality in Symantec Data Loss Prevention, do one
or more of the following, depending on which ICE licenses are installed:
■ Configure Network Protect to enable ICE encryption protection for the supported scan
targets.
See “Configuring Network Protect for file shares” on page 2177.
■ Configure Cloud Service for Email to enable ICE email encryption of Office 365 email
and Gmail in the cloud.
See the Cloud Service for Email Implementation Guide at the Symantec Support Center
at http://www.symantec.com/docs/DOC9008.
■ Enable ICE in Endpoint Prevent to encrypt the following sensitive files:
■ Files that are transferred to removable storage
■ Files that are transferred by a cloud storage application
■ Files that are uploaded with browsers using HTTPS
See “Information Centric Encryption settings for DLP Agents” on page 2371.
Chapter 11
Working with Symantec
Information Centric Tagging
This chapter includes the following topics:
Note: Import of the taxonomy requires that a Data Loss Prevention domain user, whose name
is identified when ICT server credentials are added to the credential store, is also associated
in ICT with certain Active Directory User Groups. This association provides the user access
to ICT Administration Webservice methods. Additionally, an entry must be added to the Windows
Hosts file, mapping the ICT server IP address to its host name.
Once you have imported the taxonomy, you select appropriate tags from it to define response
rules of the ICT Classification And Tagging action type. You then attach the rules to policies
so that ICT tags are applied to content according to your corporate policy.
Tags can be applied in two ways:
■ You create Endpoint Discover scans. These scans apply the tags in response to policy
violations, or to all targeted content solely as a baseline Classification Scan.
■ ICT end users apply tags. The ICT Administrator enables Data Loss Prevention integration
by selecting the Symantec DLP Policies Integration option during ICT system setup.
Those Data Loss Prevention policies configured with ICT-based response rules are imported
to ICT. Data Loss Prevention policies, not ICT rules, drive automatic classification on the
ICT endpoint..
You can also use the imported taxonomy to create detection rules using the Content Matches
Classification option. You create the rules by selecting the tags displayed on the administration
console. Tagged content is discovered in the metadata of supported emails and files.
Note: Tagging can be used to notify Symantec Endpoint Protection (SEP) about certain files.
(This requires a separate license and the presence of a SEP agent on the Data Loss Prevention
endpoint.) To enable integration with SEP, when the ICT Administrator creates the classification
taxonomy, the Administrator can enable the Information Centric Defense option. This ICD
option appears on the classification level screens. When your Endpoint Discover scan runs
and applies a tag that contains this option, Data Loss Prevention notifies SEP about this file.
In a forthcoming release of SEP that integrates this functionality, SEP administrators will be
able to configure SEP to take necessary action on the classified file
The integration of ICT with Data Loss Prevention requires ongoing coordination between you
and the ICT Administrator. Some of the events requiring communication include:
■ You decide to use ICT tags in Data Loss Prevention. You notify the ICT Administrator, who
lets you know when the ICT taxonomy is ready. You import the taxonomy into Data Loss
Prevention, create ICT-based response rules that use those tags, and attach them to
policies.
■ If ICT end users will be applying the tags, you notify the ICT Administrator that the policies
are in place. The ICT Administrator confirms that the Symantec DLP Policies Integration
check box is selected on the ICT Administration Console. The Data Loss Prevention policies
Working with Symantec Information Centric Tagging 228
Overview of steps to tie Information Centric Tagging to Data Loss Prevention
are imported to ICT so that automatic classification is driven by Data Loss Prevention
policies, not by ICT rules.
■ If you will be applying the tags as part of Endpoint Discover scans, as a courtesy, you notify
the ICT Administrator. If ICT end users are working with those files, tagging activity may
fail.
See “Overview of steps to tie Information Centric Tagging to Data Loss Prevention” on page 228.
For more information, see the Information Centric Tagging documentation here:
https://support.symantec.com/en_US/article.DOC11257.html
1 Prepare to integrate the ICT server with the See “Integrating the ICT server with the
Enforce Server by defining the ICT server Enforce Server” on page 229.
credentials, and the ICT Web Service URL or an
XML-file pathname.
2 Schedule or trigger the Information Centric Tagging See “Importing the ICT classification
classification taxonomy import. taxonomy” on page 231.
3 For detection purposes, define response rules with See “Configuring the Content Matches
the Content Matches Classification option, then Classification condition” on page 863.
attach them to policies.
4 For tagging purposes, define response rules with See “Configuring response rule actions”
the ICT Classification And Tagging Action type, on page 1765.
then attach them to policies.
See “Configuring the Endpoint: ICT
Classification And Tagging action”
on page 1814.
5 For ICT tagging driven by Endpoint Discover See “About Endpoint Discover classification
scans, define the scans, either for policy-violation scanning” on page 2320.
tagging or as a baseline Classification Scan.
See “Creating an Endpoint Discover scan”
Note: These tagging scans require the DLP Agent on page 2326.
on the endpoint. (Mac and Windows)
Working with Symantec Information Centric Tagging 229
Integrating the ICT server with the Enforce Server
processes--you can alternately import a static, XML-based version of the taxonomy. For either
of these methods, you can perform the import immediately, rather than schedule it.
See “Using the ICT Web Service for scheduled classification taxonomy imports” on page 230.
See “Using an XML file for static classification taxonomy imports” on page 231.
Requirements for using the ICT Web Service for imports are:
■ A network connectivity on port 80 between the Data Loss Prevention Enforce Server and
the Information Centric Tagging server.
■ The ICT server identified to Windows from the Enforce Server:
■ Navigate to %systemdrive%\Windows\System32\drivers\etc\.
■ Edit the Windows Hosts file to map the ICT server IP address to its host name, using
the tabulated format: <IP> <FQDN of ICT server>.
Circumstance Action
You have not yet synchronized an ICT classification Change the URL without taking any other action.
import using this URL.
Click Edit to enable the ICT Web Service URL field.
Make the change, then click Save.
You have synchronized an ICT classification import Change the URL without taking any other action.
using this URL and the new URL still points to the
same taxonomy as before.
Working with Symantec Information Centric Tagging 231
Importing the ICT classification taxonomy
Table 11-2 Implications of changing the ICT Web Service URL (continued)
Circumstance Action
You have synchronized an ICT classification import If you have existing detection rules in use:
using this URL, but the new URL points to a different
1 Delete any incidents generated from those
taxonomy.
rules.
Note: This step requires administrator (write) permission on the Enforce Server.
6 On the Information Centric Tagging page, in the ICT Web Service URL field, enter the
XML pathname instead of the URL. A sample XML pathname is:
file://Program Files/Symantec/Data
LossPrevention/EnforceServer/15.5/Protect/config/ICT.xml
Table 11-3 Supported file types for ICT-Data Loss Prevention integration
Microsoft Office files: CFB doc, dot, pot, pps, ppt, xla, xls, xlt Y Y
(old) format
Microsoft Office files: HTML docm, docx, dotm, dotx, potm, potx, Y Y
(new) format ppsm, ppsx, pptx, xlam, xlsb, xlsm, xltm,
xlsx, xltx
Table 11-3 Supported file types for ICT-Data Loss Prevention integration (continued)
png Y Y
See the Symantec Data Loss Prevention Upgrade Guide for Windows at the Symantec Support
Center at http://www.symantec.com/docs/DOC9258.
1 Download and extract the maintenance pack See “Downloading the maintenance pack
software. software for Windows servers” on page 237.
2 Confirm that all users are logged out of the If users are logged in during the
Enforce Server administration console. maintenance pack application process,
subsequent logins fail during the End User
Licensing Agreement confirmation.
3 Apply the maintenance pack to the Enforce See “Updating the Enforce Server on
Server. Windows” on page 237.
4 Apply the maintenance pack to the detection See “Updating the detection server on
server. Windows” on page 238.
Note: You can install the maintenance pack using Silent Mode by running the following
command:
msiexec /p "EnforceServer.msp" ORACLE_PASSWORD=<ORACLE PASSWORD>/qn
/norestart /L*v EnforceServer.log
where <ORACLE PASSWORD> is the database password used for Symantec Data Loss
Prevention 15.5.
a Click Start > Run > Browse to navigate to the folder where you copied the
EnforceServer.msp file.
d Enter the Symantec Data Loss Prevention database password in Oracle Database Server
Information panel.
e Click Update.
The update process may take a few minutes. The installation program window may display
for a few minutes while the services startup. After the update process completes, a
completion notice displays.
Note: You can install the maintenance pack using Silent Mode by running the following
command:
msiexec /p "DetectionServer.msp" /qn /norestart /L*v DetectionServer.log
a Click Start > Run > Browse to navigate to the folder where you copied the
DetectionServer.msp file.
d Click Update.
The update process may take a few minutes. The installation program window may display
for a few minutes while the services startup. After the update process completes, a
completion notice displays.
Note: You can install the maintenance pack using Silent Mode by running the following
command:
msiexec /p "SingleTierServer.msp" ORACLE_PASSWORD=<ORACLE PASSWORD>/qn
/norestart /L*v EnforceServer.log
where <ORACLE PASSWORD> is the database password used for Symantec Data Loss
Prevention.
a Click Start > Run > Browse to navigate to the folder where you copied the
SingleTierServer.msp file.
d Enter the Symantec Data Loss Prevention database password in Oracle Database
Server Information panel.
e Click Update.
The update process may take a few minutes. The installation program window may display
for a few minutes while the services startup. After the update process completes, a
completion notice displays.
1 Download and extract the upgrade software. See “Downloading the maintenance pack
software for Windows servers” on page 237.
2 Confirm that all users are logged out of the Enforce If users are logged in during the
Server administration console. maintenance pack application process,
subsequent logins fail during the End User
Licensing Agreement confirmation.
3 Apply the maintenance pack to the Enforce Server. See “Updating the Enforce Server on Linux”
on page 241.
4 Apply the maintenance pack to the detection See “Updating the detection server on Linux”
server. on page 242.
rpm -Uvh
symantec-dlp-15-5-content-extraction-service-15.5-01074.x86_64.rpm
symantec-dlp-15-5-server-platform-common-15.5-01074.x86_64.rpm
symantec-dlp-15-5-content-extraction-plugins-15.5-01074.x86_64.rpm
symantec-dlp-15-5-enforce-server-15.5-01074.x86_64.rpm
Note: Replace filenames with those the maintenance pack version you are installing.
You can install the RPMs at once by running the following command:
rpm -Uvh *.rpm
Note: You can install the maintenance pack using Silent Mode by running the following
command:
./EnforceServerUpdateConfigurationUtility -silent
-ORACLE_HOME=/opt/oracle/product/12.1.0/db_1 -oraclePassword=<ORACLE
PASSWORD>
where <ORACLE PASSWORD> is the database password used for Symantec Data Loss
Prevention.
During the update process, services shut down, then restart automatically. You can review
the update log file EnforceServerUpdateConfigurationUtility.log located at
/var/log/Symantec/DataLossPrevention/EnforceServer/15.5/debug.
These instructions assume that Symantec Data Loss Prevention 15.5 is installed and that the
DetectionServer.zip file has been copied into the /opt/temp/ directory on the server
computer.
To update the detection server
1 Log on as root to the system where the detection server is installed.
2 Navigate to the directory where you copied the DetectionServer.zip file. (/opt/temp)
3 Unzip the file to the same directory.
4 Apply the maintenance pack to the detection server by running the following command:
rpm -Uvh
symantec-dlp-15-5-content-extraction-plugins-15.5-01074.x86_64.rpm
symantec-dlp-15-5-content-extraction-service-15.5-01074.x86_64.rpm
symantec-dlp-15-5-detection-server-15.5-01074.x86_64.rpm
symantec-dlp-15-5-server-platform-common-15.5-01074.x86_64.rpm
Note: Replace filenames with those the maintenance pack version you are installing.
You can install the RPMs at once by running the following command:
rpm -Uvh *.rpm
4 Apply the maintenance pack to the single-tier installation by running the following command:
rpm -Uvh
symantec-dlp-15-5-content-extraction-plugins-15.5-01074.x86_64.rpm
symantec-dlp-15-5-content-extraction-service-15.5-01074.x86_64.rpm
symantec-dlp-15-5-detection-server-15.5-01074.x86_64.rpm
symantec-dlp-15-5-enforce-server-15.5-01074.x86_64.rpm
symantec-dlp-15-5-server-platform-common-15.5-01074.x86_64.rpm
symantec-dlp-15-5-single-tier-server-15.5-01074.x86_64.rpm
Note: Replace filenames with those the maintenance pack version you are installing.
You can install the RPMs at once by running the following command:
rpm -Uvh *.rpm
./SingleTierServerUpdateConfigurationUtility
Note: You can install Maintenance Patch 1 using Silent Mode by running the following
command:
./SingleTierServerUpdateConfigurationUtility -silent
-ORACLE_HOME=/opt/oracle/product/12.1.0/db_1 -oraclePassword=<ORACLE
PASSWORD>
where <ORACLE PASSWORD> is the database password used for Symantec Data Loss
Prevention 15.5.
During the update process, services shut down, then restart automatically. You can review
the update log file SingleTierServerUpdateConfigurationUtility.log located at
/var/log/Symantec/DataLossPrevention/SingleTierServer/15.5/debug/.
Section 3
Managing detection servers
■ Chapter 14. Installing and managing detection servers and cloud detectors
■ Server controls
■ Server configuration—basic
■ Editing a detector
■ Removing a server
Azure RMS Install the RMS client, version 2.1, on the detection server.
AD RMS ■ Install the RMS client, version 2.1, on the detection server using a domain service
user that is added to the AD RMS Super Users group.
■ Provide both the AD RMS Service User and the DLP Service User with Read and
Execute permissions to access ServerCertification.asmx. Refer to the
Microsoft Developer Network for additional details:
https://msdn.microsoft.com/en-us/library/mt433203.aspx.
■ Add the detection server to the AD RMS server domain.
■ Run the detection server services using a domain user that is a member of the AD
RMS Super Users group.
After you install the detection server, you enable RMS file detection. See “Enabling Microsoft
Rights Management file monitoring” on page 248.
C:\Program Files\Symantec\DataLossPrevention\ContentExtractionService\15.5\Protect\plugins\
contentextraction\MicrosoftRightsManagementPlugin\
3 Run the configuration utility ConfigurationCreator.exe to add the system user. Run
the utility as the protect user.
Installing and managing detection servers and cloud detectors 249
Preparing for Microsoft Rights Management file monitoring
Note: Enter all credentials accurately to ensure that the feature is enabled.
C:\Program Files\Symantec\DataLossPrevention\ContentExtractionService\15.5\Protect\
plugins\contentextraction\MicrosoftRightsManagementPlugin\ConfigurationCreator.exe
Do you want to configure ADAL authentication [y/n]: n
Do you want to configure symmetric key authentication [y/n]: y
Enter your symmetric key (base-64): [user's Azure RMS symmetric key]
Enter your app principal ID: [user's Azure RMS app principal ID]
Enter your BPOS tenant ID: [user's Azure RMS BPOS tenant ID]
After running this script, the following files are created in the
MicrosoftRightsManagementPlugin at \Program
Files\Symantec\DataLossPrevention\ContentExtractionService\15.5\Protect\plugins\contentextraction\:
■ rightsManagementConfiguration
■ rightsManagementConfigurationProtection
Note: You can confirm that Symantec Data Loss Prevention is monitoring RMS content
by reviewing the ContentExtractionHost_FileReader.log file (located at
\ProgramData\Symantec\DataLossPrevention\DetectionServer\15.5\protect\Logs\debug).
Error messages that display for the MicrosoftRightsManagementPlugin.cpp item indicate
that the plugin is not monitoring RMS content.
Installing and managing detection servers and cloud detectors 250
Enabling Advanced Process Control
Note: You can confirm that Symantec Data Loss Prevention is monitoring RMS content
by reviewing the ContentExtractionHost_FileReader.log file (located at
\ProgramData\Symantec\DataLossPrevention\DetectionServer\15.5\protect\Logs\debug).
Error messages that display for the MicrosoftRightsManagementPlugin.cpp item indicate
that the plugin is not monitoring RMS content.
Monitor Controller The Monitor Controller process The MonitorController Status is available for
controls detection servers. the Enforce Server.
File Reader The File Reader process detects The FileReader Status is available for all
incidents. detection servers.
Incident Writer The Incident Writer process sends The IncidentWriter Status is available for all
incidents to the Enforce Server. detection servers, unless they are part of a
single-tier installation, in which case there is only
one Incident Writer process.
Packet Capture The Packet Capture process The PacketCapture Status is available for
captures network streams. Network Monitor.
Request The Request Processor processes The RequestProcessor Status is available for
Processor SMTP requests. Network Prevent for Email.
Endpoint Server The Endpoint Server process The EndpointServer Status is available for
interacts with Symantec DLP Endpoint Prevent.
Agents.
Server controls
Servers and their processes are controlled from the Server/Detector Detail screen.
■ To reach the Server/Detector Detail screen for a particular server, go to the System >
Servers and Detectors > Overview screen and click a server name, detector name, or
appliance name in the list.
See “Server/Detector Detail screen” on page 283.
The status of the server and its processes appears in the General section of the
Server/Detector Detail screen. The Start, Recycle and Stop buttons control server and
process operations.
Current status of the server is displayed in the General section of the Server/Detector Detail
screen. The possible values are:
Installing and managing detection servers and cloud detectors 252
Server controls
Icon Status
Running Selected - Some processes on the server are stopped or have errors. To see
the statuses of individual processes, you must first enable Advanced Process Control
on the System Settings screen.
Note: Status and controls for individual server processes are only displayed if Advanced
Process Control is enabled for the Enforce Server. To enable Advanced Process Control, go
to System > Settings > General > Configure, check the Advanced Process Control box,
and click Save.
■ To update the status, click the refresh icon in the upper-right portion of the screen, as
needed.
See “About Symantec Data Loss Prevention administration” on page 82.
See “About the Overview screen” on page 278.
See “Server/Detector Detail screen” on page 283.
See “Server configuration—basic” on page 253.
See “System events reports” on page 165.
See “Server and Detectors event detail” on page 169.
Installing and managing detection servers and cloud detectors 253
Server configuration—basic
Server configuration—basic
Enforce Servers are configured from the System > Settings > General menu.
Detection servers and detectors are configured from each server's individual Configure Server
screen.
To configure a server
1 Go to the System > Servers and Detectors > Overview screen.
2 Click on the name of the server in the list.
That server's Server/Detector Detail screen is displayed. The following buttons are in
the upper-left portion of a Server/Detector Detail:
■ Done. Click Done to return to the previous screen.
■ Configure. Click Configure to specify a basic configuration for this server.
■ Server Settings. Click Server Settings to specify advanced configuration parameters
for this server. Use caution when modifying advanced server settings. It is
recommended that you check with Symantec Support before changing any of the
advanced settings.
See “Server and detector configuration—advanced” on page 273.
See Symantec Data Loss Prevention online Help for information about advanced
server configuration.
3 Click Configure or Server Settings to display a configuration screen for that type of
server.
4 Specify or change settings on the screen as needed, and then click Save.
Click Cancel to return to the previous screen without changing any settings.
■ Port. The port number used by the detection server to communicate with the Enforce
Server. The default is 8100.
For Single Tier Monitors, the Host field on the Configure Server page is pre-populated with
the local IP address 127.0.0.1. You cannot change this value.
The next portions of a Configure Server screen vary according to the type of server, except
for the OCR Engine and Detection tabs, which are common to all servers.
Click the OCR Engine tab to set up a connection to an OCR server.
See “Server configuration—basic”on page 705 on page 705.
Click the Detection tab to customize the Inspection Content Size.
See “Increasing the inspection content size” on page 459.
See “Network Monitor Server—basic configuration” on page 254.
See “Network Discover/Cloud Storage Discover Server and Network Protect—basic
configuration” on page 261.
See “Network Prevent for Email Server—basic configuration” on page 256.
See “Network Prevent for Web Server—basic configuration” on page 259.
See “Endpoint Server—basic configuration” on page 262.
See “Single Tier Monitor — basic configuration” on page 263.
See “Server/Detector Detail screen” on page 283.
Field Description
Source Folder Override The source folder is the directory the server uses to
buffer network streams before it processes them.
The recommended setting is to leave the Source
Folder Override field blank to accept the default. If
you want to specify a custom buffer directory, type
the full path to the directory.
Th Protocol section of the Packet Capture specifies the types of network traffic (by protocol)
to capture. It also specifies any custom parameters to apply. This section lists the standard
protocols that you have licensed with Symantec, and any custom TCP protocols you have
added.
To monitor a particular protocol, check its box. When you initially configure a server, the settings
for each selected protocol are inherited from the system-wide protocol settings. You configure
these settings by going to System > Settings > Protocol. System-wide default settings are
listed as Standard.
Consult Symantec Data Loss Prevention online Help for information about working with
system-wide settings.
To override the inherited filtering settings for a protocol, click the name of the protocol. The
following custom settings are available (some settings may not be available for some protocols):
■ IP filter
■ L7 sender filter
■ L7 recipient filter
■ Content filter
■ Search Depth (packets)
■ Sampling rate
■ Maximum wait until written
■ Maximum wait until dropped
■ Maximum stream packets
■ Minimum stream size
Installing and managing detection servers and cloud detectors 256
Server configuration—basic
Field Description
Next Hop Configuration Select Reflect to operate Network Prevent for Email
Server in reflecting mode. Select Forward to
operate in forwarding mode.
Note: If you select Forward you must also select
Enable MX Lookup orDisable MX Lookup to
configure the method that is used to determine the
next-hop MTA.
companyname.com
Field Description
smtp1.companyname.com
smtp2.companyname.com
smtp3.companyname.com
See the Symantec Data Loss Prevention MTA Integration Guide for Network Prevent for Email
for additional information about configuring Network Prevent for Email Server options.
See “About Symantec Data Loss Prevention administration” on page 82.
See “About the Overview screen” on page 278.
See “Server/Detector Detail screen” on page 283.
See “Server configuration—basic” on page 253.
See “Server controls” on page 251.
In addition to the settings available through the Configure Server screen, you can specify
advanced settings for this server. To specify advanced configuration parameters, click Server
Settings on the server's Server/Detector Detail screen. Use caution when modifying advanced
server settings. Check with Symantec Support before you change any advanced setting.
See “Advanced server settings” on page 285.
Installing and managing detection servers and cloud detectors 259
Server configuration—basic
See the Symantec Data Loss Prevention online Help for information about advanced server
settings.
Field Description
Ignore Requests Smaller Than Specify the minimum body size of HTTP
requests to inspect on this server. The
default value is 4096 bytes. HTTP requests
with bodies smaller than this number are
not inspected.
Installing and managing detection servers and cloud detectors 260
Server configuration—basic
Field Description
Ignore Requests from Hosts or Domains Enter the host names or domains whose
requests should be filtered out (ignored).
Enter one host or domain name per line.
Ignore Requests from User Agents Enter the names of user agents whose
requests should be filtered out (ignored).
Enter one agent per line.
■ The Response Filtering section configures the filtering criteria to manage HTTP responses:
Field Description
Ignore Responses Smaller Than Enter the minimum body size of HTTP
responses to inspect on this server. The
default value is 4096 bytes. HTTP
responses with bodies smaller than this
number are not inspected.
Inspect Content Type Specify the MIME content types that you
want this server to monitor. By default, this
field contains content type values for
standard Microsoft Office, PDF, and
plain-text formats. You can add other MIME
content type values. Enter separate content
types on separate lines. For example, to
inspect Excel files enter
application/ynd.ms-excel.
Ignore Responses from Hosts or Domains Enter the host names or domains whose
responses are to be ignored. Enter one host
or domain name per line.
Ignore Responses to User Agents Enter the names of user agents whose
responses are to be ignored. Enter one user
agent per line.
■ Click the OCR Engine tab to add an OCR Engine Configuration profile. Scroll to select
a configuration.
See “Server configuration—basic”on page 705 on page 705.
See “Creating an OCR configuration” on page 711.
■ The Connection section configures settings for the ICAP connection between an HTTP
proxy server and the Network Prevent for Web Server:
Installing and managing detection servers and cloud detectors 261
Server configuration—basic
Field Description
Overview screen and click on the name of the server in the list. That server's Server/Detector
Detail screen is displayed. Click Configure. The server's Configure Server screen is displayed.
See “Modifying the Network Discover/Cloud Storage Discover Server configuration” on page 2083.
A Network Discover Server's Configure Server screen is divided into a the following sections:
■ General section. This section is for specifying the server's name, host, and port.
See “Server configuration—basic” on page 253.
■ Discover tab. This tab is for performing the following configurations:
■ Modifying the number of parallel scans that run on this Discover Server.
The maximum count can be increased at any time. After it is increased, any queued
scans that are eligible to run on the Network Discover Server are started. The count
can be decreased only if the Network Discover Server has no running scans. Before
you reduce the count, pause, or stop, all scans running on the server.
To view the scans running on Network Discover Servers, go to Manage > Discover
Scanning > Discover Targets.
■ Configuring network proxy settings for connecting to the Symantec Information Centric
Encryption (ICE) Cloud.
You can specify an existing network proxy in your setup and, optionally, provide the
authentication credentials for connecting to it. Network Discover uses the proxy server
to communicate with the ICE Cloud whenever file share (File System) scans trigger the
Network Protect: Encrypt File response action.
See “Configuring Network Discover to use a proxy to connect to the Symantec ICE
Cloud for file share scans” on page 2085.
Overview screen and click the name of the server. The Server/Detector Detail screen for
that server is displayed. Click Configure to display the Configure Server screen for that
server.
See “Adding a detection server” on page 273.
The Configure Server screen for an Endpoint Server is divided into a general section and the
following tabs:
■ General. This section is for specifying the server name, host, and port.
See “Server configuration—basic” on page 253.
■ Agent. This section is for adding agent security certificates to the Endpoint Server.
See “Adding and editing agent configurations” on page 2348.
Agent Listener. Use this section to configure the Endpoint Server to listen for connections
from Symantec DLP Agents:
Field Description
Bind address Enter the IP address on which the Endpoint Server listens for communications from
the Symantec DLP Agents. The default IP address is 0.0.0.0 which allows the
Endpoint Server to listen on all host IP addresses.
Port Enter the port over which the Endpoint Server listens for communications from the
Symantec DLP Agents.
Note: Many Linux systems restrict ports below 1024 to root access. The Endpoint
Server cannot by configured to listen for connections from Symantec DLP Agents
to these restricted ports on Linux systems.
Note: If you are using FIPS 140-2 mode for communication between the Endpoint Server and
DLP Agents, do not use Diffie-Hellman (DH) cipher suites. Mixing cipher suites prevents the
agent and Endpoint Server from communicating. You can confirm the current cipher suit setting
by referring to the EndpointCommunications.SSLCipherSuites setting on the Server
Settings page. See “Advanced server settings” on page 285.
of these detection server types is associated with one or more detection "channels." The Single
Server deployment simplifies Symantec Data Loss Prevention administration and reduces
maintenance and hardware costs for small organizations, or for branch offices of larger
enterprises that would benefit from on-site deployments of Symantec Data Loss Prevention.
4 Optional: On the SMTP Copy Rule tab, specify the Source Folder Override to modify
the source folder where this server retrieves SMTP message files.
You can modify the source folder by entering the full path to a folder. Leave this field blank
to use the default source folder.
Note: If you plan to use the grid scanning feature to distribute the scanning workload across
multiple detection servers, retain the default value (1).
The maximum count can be increased at any time. After it is increased, any queued scans
that are eligible to run on the Network Discover Server are started. The count can be decreased
only if the Network Discover Server has no running scans. Before you reduce the count, pause,
or stop, all scans running on the server.
Ignore Requests Smaller Than Specifies the minimum body size of HTTP
requests to inspect. (The default is 4096 bytes.)
For example, search-strings typed in to search
engines such as Yahoo or Google are usually
short. By adjusting this value, you can exclude
those searches from inspection.
Ignore Requests without Attachments Causes the server to inspect only the requests
that contain attachments. This option can be
useful if you are mainly concerned with requests
intended to post sensitive files.
Ignore Requests to Hosts or Domains Causes the server to ignore requests to the hosts
or domains you specify. This option can be useful
if you expect a lot of HTTP traffic between the
domains of your corporate headquarters and
branch offices. You can type one or more host
or domain names (for example,
www.company.com), each on its own line.
Ignore Requests from User Agents Causes the server to ignore requests from user
agents (HTTP clients) you specify. This option
can be useful if your organization uses a program
or language (such as Java) that makes frequent
HTTP requests. You can type one or more user
agent values, each on its own line.
Installing and managing detection servers and cloud detectors 267
Server configuration—basic
3 Verify or modify the filter options for responses from web servers. The options in the
Response Filtering section are as follows:
Ignore Responses Smaller Than Specifies the minimum size of the body of HTTP
responses that are inspected by this server.
(Default is 4096 bytes.)
Inspect Content Type Specifies the MIME content types that Symantec
Data Loss Prevention should monitor in
responses. By default, this field contains
content-type values for Microsoft Office, PDF,
and plain text formats. To add others, type one
MIME content type per line. For example, type
application/word2013 to have Symantec
Data Loss Prevention analyze Microsoft Word
2013 files.
Ignore Responses from Hosts or Domains Causes the server to ignore responses from the
hosts or domains you specify. You can type one
or more host or domain names (for example,
www.company.com), each on its own line.
Ignore Responses to User Agents Causes the server to ignore responses to user
agents (HTTP clients) you specify. You can type
one or more user agent values, each on its own
line.
Installing and managing detection servers and cloud detectors 268
Server configuration—basic
4 Verify or modify settings for the ICAP connection between the HTTP proxy server and the
Web Prevent Server. The Connection options are as follows:
TCP Port Specifies the TCP port number over which this
server listens for ICAP requests. This number
must match the value that is configured on the
HTTP proxy that sends ICAP requests to this
server. The recommended value is 1344.
3 If you use TLS authentication in a forwarding mode configuration, enter the correct
password for the keystore file in the Keystore Password field of the Security
Configuration section.
Installing and managing detection servers and cloud detectors 270
Server configuration—basic
4 In the Next Hop Configuration section, configure reflecting mode or forwarding mode by
modifying the following fields:
Field Description
companyname.com
Field Description
smtp1.companyname.com
smtp2.companyname.com
smtp3.companyname.com
Field Description
Bind address Enter the IP address on which the Endpoint Server listens for communications
from the Symantec DLP Agents. The default IP address is 0.0.0.0 which allows
the Endpoint Server to listen on all host IP addresses.
Port Enter the port over which the Endpoint Server listens for communications from
the Symantec DLP Agents.
Installing and managing detection servers and cloud detectors 272
Editing a detector
Setting Value
MessageChain.NumChains 32
MessageChain.CacheSize 32
PacketCapture.NUMBER_BUFFER_POOL_PACKETS 1,200,000
PacketCapture.NUMBER_SMALL_POOL_PACKETS 1,000,000
6 Click Save.
See “About Symantec Data Loss Prevention administration” on page 82.
See “About the Overview screen” on page 278.
See “Server/Detector Detail screen” on page 283.
See “Server configuration—basic” on page 253.
See “Server controls” on page 251.
See “Advanced server settings” on page 285.
See the Symantec Data Loss Prevention online Help for information about Advanced Server
settings.
Editing a detector
You can change the name of your detector on the Server/Detector Detail screen.
Installing and managing detection servers and cloud detectors 273
Server and detector configuration—advanced
Note: Check with Symantec Support before changing any advanced settings. If you make a
mistake when changing advanced settings, you can severely degrade performance or even
disable the server entirely.
Note: Symantec recommends that you apply the same hardware and software configuration
to all of the detections servers that you intend to use for grid scans. Symantec Data Loss
Prevention supports grid scans that have up to 11 participating detection servers.
4 To perform the basic server configuration, use the Configure Server screen, then click
Save when you are finished.
See “Network Monitor Server—basic configuration” on page 254.
See “Network Prevent for Email Server—basic configuration” on page 256.
See Symantec Data Loss Prevention Cloud Prevent for Microsoft Office 365 Implementation
Guide for more details.
See “Network Prevent for Web Server—basic configuration” on page 259.
See “Network Discover/Cloud Storage Discover Server and Network Protect—basic
configuration” on page 261.
See “Endpoint Server—basic configuration” on page 262.
5 In addition to the configuration steps specific to each server, you can configure the OCR
Engine or Detection server Inspection Content Size from tabs on this screen.
See OCR Engine configuration.
See Inspection Content Size settings.
6 To return to the System Overview screen, click Done.
Your new server is displayed in the Servers and Detectors list with a status of Unknown.
7 Click on the server to display its Server/Detector Detail screen.
See “Server/Detector Detail screen” on page 283.
8 Click [Recycle] to restart the server.
9 Click Done to return to the System Overview screen.
When the server is finished restarting, its status displays Running.
10 If necessary, click Server Settings on the Server/Detector Detail screen to perform
Advanced Server configuration.
See “Advanced server settings” on page 285.
See Symantec Data Loss Prevention online Help for information about Advanced Server
configuration.
See “Server configuration—basic” on page 253.
the connection from your on-premises Enforce Server to the detection service in the Symantec
Cloud.
The enrollment bundle is a ZIP archive. For security reasons, you should save the unextracted
ZIP file to a location that is not accessible by others users. For example, on a Microsoft Windows
system, save the bundle to a folder such as:
c:\Users\username\downloads
/home/username/
See the documentation for your cloud detector for more detailed information about the
enrollment process.
After you have saved the enrollment bundle, register your cloud detector to enable
communication between it and your on-premises Enforce Server.
To register a cloud detector
1 Log on to the Enforce Server as Administrator.
2 Navigate to System > Servers and Detectors > Overview.
The Overview page appears.
3 Click Add Cloud Detector.
The Add Cloud Detector page appears.
4 Click Browse in the Enrollment Bundle File field.
5 Locate your saved enrollment bundle file, then enter a name in the Detector Name field.
6 Click Enroll Detector.
The Server/Detector Detail screen appears.
7 If necessary, click Detector Settings on the Server/Detector Detail screen to perform
advanced detector configuration.
See “Advanced detector settings” on page 326.
8 Click Done.
It may take several minutes for the Enforce Server administration console to show that the
cloud detector is running. To verify that the detector was added, check the System > Servers
and Detectors > Overview page. The detector should appear in the Servers and Detectors
list with the Connected status.
Installing and managing detection servers and cloud detectors 277
Removing a server
Removing a server
See the appropriate Symantec Data Loss Prevention Installation Guide for information about
uninstalling Symantec Data Loss Prevention from a server.
An Enforce Server administration console lists the detection servers registered with it on the
System > Servers and Detectors > Overview screen. If Symantec Data Loss Prevention is
uninstalled from a detection server, or that server is stopped or disconnected from the network,
its status is shown as Unknown on the console.
A detection server can be removed (de-registered) from an Enforce Server administration
console. When a detection server is removed from an Enforce Server, its Symantec Data Loss
Prevention services continue to operate. This means that even though a detection server is
de-registered from Enforce, it continues to function unless some action is taken to halt it. In
other words, even though it is removed from an Enforce Server administration console, a
detection server continues to operate. Incidents it detects are stored on the detection server.
If a detection server is re-registered with an Enforce Server, incidents detected and stored are
then forwarded to Enforce.
To remove (de-register) a detection server from Enforce
1 Go to System > Servers and Detectors > Overview.
See “About the Overview screen” on page 278.
2 In the Servers and Detectors section of the screen, click the red X on a server's status
line to remove it from this Enforce Server administration console.
See “Server controls” on page 251.
3 Click OK to confirm.
The server's status line is removed from the System Overview list.
Step Description
1 Copy the certificate file you want to import to the Enforce Server or Discover Server computer.
3 Execute the keytool utility with the -importcert option to import the public key certificate
to the Enforce Server or Discover Server keystore:
4 When you are prompted, enter the password for the keystore.
By default, the password is changeit. If you want you can change the password when prompted.
5 Answer Yes when you are asked if you trust this certificate.
detectors with the Add Cloud Detector button. After you register cloud detectors, they are
listed in the Servers and Detectors section of the screen.
■ The Add Appliance button is used to register and appliance. When this screen is first
viewed after installation, on the Enforce Server is listed. You must register your appliances
with the Add Appliance button. After you register your appliances, they are listed in the
Servers and Detectors section of the screen.
See “Adding an appliance” on page 2539.
■ The System Readiness and Appliances Update button is used to access the System
Readiness and Appliances Update screen where you can run tests to confirm that
database update readiness and update appliances.
■ The Upgrade button is for upgrading Symantec Data Loss Prevention to a newer version.
See “About system upgrades” on page 235.
See also the appropriate Symantec Data Loss Prevention Upgrade Guide.
■ The Servers and Detectors section of the screen displays summary information about
the status of each server, detector, or appliance. It can also be use to remove (de-register)
a server, detector, or appliance.
See “Server and detector status overview” on page 280.
■ The Recent Error and Warning Events section shows the last five events of error or
warning severity for any of the servers listed in the Servers and Detectors section.
See “Recent error and warning events list” on page 282.
■ The License section of the screen lists the Symantec Data Loss Prevention individual
products that you are licensed to use.
See “Server configuration—basic” on page 253.
See “About Symantec Data Loss Prevention administration” on page 82.
Network Discover also supports network proxies for connecting to the ICE Cloud during file
share (File System) scans. To configure the network proxy settings for file share scans, you
must update the Network Discover/Cloud Storage Discover Server configuration.
See “Configuring Network Discover to use a proxy to connect to the Symantec ICE Cloud for
file share scans” on page 2085.
To configure the Enforce Server to use a proxy to connect to a cloud service
1 Go to System > Settings > General and click Configure. The Edit General Settings
screen is displayed.
2 In the Enforce to Cloud Proxy Settings section, select one of the following proxy
categories:
■ No proxy, or transparent proxy, or
■ Manual proxy
3 If you choose Manual proxy, fields for a URL, Port, and Proxy is Authenticated appear.
■ Enter the the HTTP Proxy URL.
■ Enter a port number.
Note: The Enforce Server supports basic authentication when using a proxy to connect
to cloud services. For connecting to the ICE Cloud, the Enforce Server supports basic,
NTLM, and Kerberos authentication.
5 Click Save.
Running Selected Some Symantec Data Loss Prevention processes on the server are
stopped or have errors. To see the statuses of individual processes, you
must first enable Advanced Process Control on the System Settings
screen.
Stopping The server is in the process of stopping Symantec Data Loss Prevention
services.
For each server, the following additional information appears. You can also click on any server
name to display the Server/Detector Detail screen for that server.
Messages (Last 10 sec) The number of messages processed in the last 10 seconds.
For Endpoint Servers, the Messages and Incidents are not aligned. This
is because messages are being processed at the Endpoint and not the
Endpoint Server. However, the incident count still increases.
Installing and managing detection servers and cloud detectors 282
Recent error and warning events list
Incident Queue For the Enforce Server, this is the number of incidents that are in the
database, but do not yet have an assigned status. This number is updated
whenever this screen is generated.
For the other types of servers, this is the number of incidents that have
not yet been written to the Enforce Server. This number is updated
approximately every 30 seconds. If the server is shut down, this number
is the last number updated by the server. Presumably the incidents are
still in the incidents folder.
Message Wait Time The amount of time it takes to process a message after it enters the
system. This data applies to the last message processed. If the server
that processed the last message is disconnected, this is N/A.
Note: Removing (de-registering) a server only disconnects it from this Enforce Server, it does
not stop the detection server from operating.
Type
The yellow triangle indicates a warning, the red octagon indicates an error.
Installing and managing detection servers and cloud detectors 283
Server/Detector Detail screen
Host The IP address or name of the machine where the server resides. The server and
host names may be the same.
Code The system event code. The Messagecolumn provides the code text. Event lists
can be filtered by code number.
Message A summary of the error or warning message that is associated with this event code.
■ To display a list of all error and warning events, click Show all.
■ To display the Event Detail screen for additional information about that particular event,
click an event.
See “About the Overview screen” on page 278.
See “System events reports” on page 165.
See “Server and Detectors event detail” on page 169.
General The General section identifies the server, displays system status and statistics,
and provides controls for starting and stopping the server and its processes.
Configuration The Configuration section displays the Channels, Policy Groups, Agent
Configuration, User Device, and Configuration Status for the detection server.
All Agents The All Agents section displays a summary of all agents that are assigned to
an Endpoint Server.
Click the number next to an agent status to view agent details on the System
> Agents > Overview > Summary Reports screen.
Note: The system only displays the Agent Summary section for an Endpoint
Server.
Recent Error and The Recent Error and Warning Events section displays the five most recent
Warning Events Warning or Severe events that have occurred on this server.
Click on an event to show event details. Click show all to display all error and
warning events.
All Recent Events The All Recent Events section displays all events of all severities that have
occurred on this server during the past 24 hours.
Click on an event to show event details. Click show all to display all detection
server events.
Deployed Exact Data The Deployed Exact Data Profile section lists any Exact Data or Document
Profiles Profiles you have deployed to the detection server. The system displays the
version of the index in the profile.
Default is disabled.
Default is disabled.
EndpointMessageStatistics.
MaxFileDetectionCount,
EndpointMessageStatistics.
MaxFolderDetectionCount,
or EndpointMessageStatistics.
MaxMessageCount is generated,
Symantec Data Loss Prevention
lists the host machines where these
system events were generated. This
setting limits the number of hosts
displayed in the list.
■ EndpointServer.Discover.
ScanStatusBatchInterval
■ EndpointServer.Discover.
ScanStatusBatchSize
IncidentDetection.
MaxIncidentsPerPolicy
IncidentDetection.
IncidentTimeLimitResetTime.
IncidentDetection.
patternConditionMaxViolations
http://tools.ietf.org/html/
draft-levine-mass-batv-02
See http://tools.ietf.org/html/
OCR. RECORD_REQUEST _STATISTICS false When true, this setting enables the
OCR sizing tool. The OCR sizing
tool gives you insight into your
image traffic data, which helps you
determine the sizing requirements
for your OCR implementation.
RequestProcessor.AllowExtensions 8BITMIME VRFY DSN This setting lists the SMTP protocol
HELP PIPELINING extensions that Network Prevent for
SIZE Email can use when it
ENHANCEDSTATUSCODES communicates with other MTAs.
STARTTLS
DDM.MaxBinMatchSize 30,000,000 The maximum size (in bytes) used to generate the
MD5 hash for an exact binary match in an IDM. This
setting should not be changed. The following
conditions must be matched for IDM to work
correctly:
make changes to advanced agent and server settings if the load balancer you use does not
use default settings.
In general, load balancers should have the following settings applied to work best with Symantec
Data Loss Prevention:
■ 1-Gbps throughput
■ Source IP persistence. Set the persistence time to be greater than the agent polling period.
■ 24-hour SSL session timeout period
The Endpoint Servers communicate most efficiently with agents when the load balancer is set
up to use source IP persistence. (This protocol name may differ across load balancer brands.)
Using source IP persistence in a Symantec Data Loss Prevention implementation ensures
that if an agent is restarted on the same network, it reconnects to the same Endpoint Server
regardless of the SSL session state. Source IP persistence also uses less bandwidth during
the SSL handshake between agents and Endpoint Servers. This protocol also helps maintain
the event/attribute cache coherence.
For agents that connect to the Endpoint Server over a NAT or a proxy, SSL session server
affinity is the optimal load balancer setting. However, if this setting is used, and the agent is
restarted or if the SSL cached session identity is flushed, a new SSL session is negotiated.
Negotiating a new SSL session may cause the agent to connect to a different monitor more
frequently which may interfere with agent status updates on the Enforce Server.
You review agent connection settings if the load balancer idle connection settings is not set
to default. The load balancer idle connection setting can also be called connection timeout
interval, clean idle connection, and so-on depending on the load balancer brand.
You can assess your Symantec Data Loss Prevention and load balancer settings by considering
the following two scenarios:
■ Default DLP settings. Table 14-11
■ Non-default DLP settings. Table 14-12
Note: Contact Symantec Support before changing default advanced agent and advanced
server settings.
Installing and managing detection servers and cloud detectors 332
About using load balancers in an endpoint deployment
Description Resolution
Symantec Data Loss Prevention uses Consider how the agent idle timeout coincides with the load balancer
non-persistent connections by default. Using close idle connection setting. If the load balancer is configured to close
non-persistent connections means that idle connections after less than 30 seconds, agents are prematurely
Endpoint Servers close connections to agents disconnected from Endpoint Servers.
after agents are idle for 30 seconds.
To resolve the issue, complete one of the following:
Description Resolution
Consider how changes to default Symantec To resolve the issue, complete one of the following:
Data Loss Prevention settings affect how the
■ Change the agent heartbeat
load balancer handles idle and persistent
(EndpointCommunications.HEARTBEAT_INTERVAL_IN_SECONDS.int)
agent connections. For example, if you change
and no traffic timeout settings
the idle timeout setting to 0 to create a
(CommLayer.NO_TRAFFIC_TIMEOUT_IN_SECONDS.int) to less
persistent connection and you leave the default
than the load balancer idle connection setting.
agent heartbeat setting (270 seconds), you
■ Verify that the no traffic timeout setting is greater than the heartbeat
must consider the idle connection setting on
setting.
the load balancer. If the idle connection setting
on the load balancer is less than 270 seconds,
then agents are prematurely disconnected
from Endpoint Servers.
problem. Some debug log files are not created by default. Symantec Support can explain
how to configure the software to create the file if necessary.
See “Debug log files” on page 337.
■ Installation log files record information about the Symantec Data Loss Prevention installation
tasks that are performed on a particular computer. You can use these log files to verify an
installation or troubleshoot installation errors. Installation log files reside in the following
locations:
■ installdir\SymantecDLP\.install4j\installation.log stores the installation log
for Symantec Data Loss Prevention.
■ installdir\oracle_home\admin\protect\ stores the installation log for Oracle.
See the Symantec Data Loss Prevention Installation Guide for more information.
detection_operational_trace_0.log The detection trace log file provides All detection servers
details about each message that
the detection server processes. The
log file includes information such
as:
See “Network Prevent for Web operational log files and event codes” on page 351.
See “Network Prevent for Web access log files and fields” on page 352.
See “Network Prevent for Email log levels” on page 355.
See “Network Prevent for Email operational log codes” on page 355.
See “Network Prevent for Email originated responses and codes” on page 359.
BoxMonitor0.log This file is typically very small, and it shows how the All
application processes are running. The BoxMonitor detection
process oversees the detection server processes that servers
pertain to that particular server type.
ContentExtractionAPI_FileReader.log Logs the behavior of the Content Extraction API file Detection
reader that sends requests to the plug-in host. The Server
default logging level is "info" which is configurable
using log4cxx_config_filereader.xml in the
C:\Program
Files\Symantec\DataLossPrevention\
DetectionServer (Windows) or
/opt/Symantec/DataLossPrevention/
DetectionServer/15.5/Protect/config
(Linux) directory.
FileReader0.log This log file pertains to the file reader process and All
contains application-specific logging, which may be detection
helpful in resolving issues in detection and incident servers
creation. One symptom that shows up is content
extractor timeouts.
Managing log files 340
About log files
flash_client_0.log Logs messages from the Adobe Flex client used for Enforce
folder risk reports by Network Discover. Server
IncidentPersister0.log This log file pertains to the Incident Persister process. Enforce
This process reads incidents from the incidents folder Server
on the Enforce Server, and writes them to the
database. Look at this log if the incident queue on
the Enforce Server (manager) grows too large. This
situation can be observed also by checking the
incidents folder on the Enforce Server to see if
incidents have backed up.
Indexer0.log This log file contains information when an EDM profile Enforce
or IDM profile is indexed. It also includes the Server
information that is collected when the external indexer (or
is used. If indexing fails then this log should be computer
consulted. where
the
external
indexer
is
running)
jdbc.log This log file is a trace of JDBC calls to the database. Enforce
By default, writing to this log is turned off. Server
Managing log files 341
About log files
machinelearning_native_filereader.log This log file records the runtime category classification Detection
(positive and negative) and associated confidence Server
levels for each message detected by a VML profile.
The default logging level is "info" which is configurable
using \log4cxx_config_filereader.xml in the
C:\Program
Files\Symantec\DataLossPrevention\
DetectionServer (Windows) or
/opt/Symantec/DataLossPrevention/
DetectionServer/15.5/Protect/config
(Linux) directory.
machinelearning_training_0_0.log This log file records the design-time base accuracy Enforce
percentages for the k-fold evaluations for all VML Server
profiles.
machinelearning_training_native_manager.log This log file records the total number of features Enforce
modeled at design-time for each VML profile training Server
run. The default logging level is "info" which is
configurable using log4cxx_config_manager.xml
in the C:\Program
Files\Symantec\DataLossPrevention\
DetectionServer (Windows) or
/opt/Symantec/DataLossPrevention/
DetectionServer/15.5/Protect/config
(Linux) directory.
PacketCapture.log This log file pertains to the packet capture process Network
that reassembles packets into messages and writes Monitor
to the drop_pcap directory. Look at this log if there
is a problem with dropped packets or traffic is lower
than expected. PacketCapture is not a Java
process, so it does not follow the same logging rules
as the other Symantec Data Loss Prevention system
processes.
Managing log files 342
About log files
RequestProcessor0.log This log file pertains to SMTP Prevent only. The log SMTP
file is primarily for use in cases where Prevent
SmtpPrevent_operational0.log is not sufficient. detection
servers
ScanDetail-target-0.log Where target is the name of the scan target. All white Discover
spaces in the target's name are replaced with detection
hyphens. This log file pertains to Discover server servers
scanning. It is a file by file record of what happened
in the scan. If the scan of the file is successful, it
reads success, and then the path, size, time, owner,
and ACL information of the file scanned. If it failed,
a warning appears followed by the file name.
tomcat\localhost.date.log These Tomcat log files contain information for any Enforce
action that involves the user interface. The logs Server
include the user interface errors from red error
message box, password failures when logging on,
and Oracle errors (ORA –#).
SymantecDLPNotifier.log This log file pertains to the Notifier service and its Enforce
communications with the Enforce Server and the Server
MonitorController service. Look at this file to
see if the MonitorController service registered
a policy change.
SymantecDLPUpdate.log This log file is populated when you update Symantec Enforce
Data Loss Prevention. Server
Managing log files 343
Log collection and configuration screen
See “Network Prevent for Web protocol debug log files” on page 354.
See “Network Prevent for Email log levels” on page 355.
Make sure that the configuration file that you upload contains valid property definitions that
are applicable to the type of server you want to configure. If you make a mistake when uploading
a log configuration file, use the preconfigured Restore Defaults setting to revert the log
configuration to its original installed state.
The Enforce Server administration console performs only minimal validation of the log
configuration files that you upload. It ensures that:
■ Configuration file names correspond to actual logging configuration file names.
■ Root level logging is enabled in the configuration file. This configuration ensures that some
basic logging functionality is always available for a server.
■ Properties in the file that define logging levels contain only valid values (such as INFO,
FINE, or WARNING).
If the server detects a problem with any of these items, it displays an error message and
cancels the file upload.
If the Enforce Server successfully uploads a log configuration file change to a detection server,
the administration console reports that the configuration change was submitted. If the detection
server then encounters any problems when tries to apply the configuration change, it logs a
system event warning to indicate the problem.
Incident Reporting API Logs the entire SOAP request and response message for most requests to the Incident
SOAP Logging Reporting API Web Service. The logged messages are stored in the
webservices_soap.log file. To begin logging to this file, edit the
c:\ProgramData\Symantec\DataLossPrevention\EnforceServer\15.5\Protect\config\
ManagerLogging.properties (Windows) or
/var/log/Symantec/DataLossPrevention/EnforceServer/15.5/Protect/config/
ManagerLogging.properties (Linux) file to set the com.vontu.enforce.
reportingapi.webservice.log.
Table 15-3 Preconfigured log settings for the Enforce Server (continued)
Custom Attribute Lookup Logs diagnostic information each time the Enforce Server uses a lookup plug-in to
Logging populate custom attributes for an incident. Lookup plug-ins populate custom attribute
data using LDAP, CSV files, or other data repositories. The diagnostic information is
recorded in the Tomcat log file
(c:\ProgramData\Symantec\DataLossPrevention\EnforceServer\
15.5\Protect\logs\tomcat\localhost.date.log [Windows] or
/var/log/Symantec/DataLossPrevention/EnforceServer/
15.5/Protect/tomcat/localhost.date.log [Linux]) and the
IncidentPersister_0.log file.
Restore All detection servers Restores log file parameters to their default values.
Defaults
Discover Trace Network Discover Servers Enables informational logging for Network Discover scans. These
Logging log messages are stored in FileReader0.log.
Detection All detection servers Logs information about each message that the detection server
Trace Logging processes. This includes information such as:
Packet Capture Network Monitor Servers Enables basic debug logging for packet capture with Network
Debug Logging Monitor. This setting logs information in the PacketCapture.log
file.
While this type of logging can produce a large amount of data, the
Packet Capture Debug Logging setting limits the log file size to
50 MB and the maximum number of log files to 10.
Email Prevent Network Prevent for Email Enables full message logging for Network Prevent for Email
Logging servers servers. This setting logs the complete message content and
includes execution and error tracing information. Logged
information is stored in the RequestProcessor0.log file.
Note: Trace logging can produce a large amount of data, and the
data is stored in clear text format. Use trace logging only when
you need to debug a specific problem.
See “Network Prevent for Email operational log codes” on page 355.
ICAP Prevent Network Prevent for Web Enables operational and access logging for Network Prevent for
Message servers Web. This setting logs information in the FileReader0.log file.
Processing
See “Network Prevent for Web operational log files and event
Logging
codes” on page 351.
See “Network Prevent for Web access log files and fields”
on page 352.
Follow this procedure to change the log configuration for a Symantec Data Loss Prevention
server.
To configure logging properties for a server
1 Click the Configuration tab if it is not already selected.
2 If you want to configure logging properties for a detection server, select the server name
from the Select a Detection Server menu.
Managing log files 347
Collecting server logs and configuration files
3 If you want to apply preconfigured log settings to a server, select the configuration name
from the Select a Diagnostic Configuration menu next to the server you want to
configure.
See Table 15-3 and Table 15-4 for a description of the diagnostic configurations.
4 If you instead want to use a customized log configuration file, click Browse... next to the
server you want to configure. Then select the logging configuration file to use from the
File Upload dialog, and click Open. You upload only logging configuration files, and not
configuration files that affect other server features.
Note: If the Browse button is unavailable because of a previous menu selection, click
Clear Form.
5 Click Configure Logs to apply the preconfigured setting or custom log configuration file
to the selected server.
6 Check for any system event warnings that indicate a problem in applying configuration
changes on a server.
See “Log collection and configuration screen” on page 343.
Note: The following debug log files are configured manually outside of the logging framework
available through the Enforce Server administration console:
ContentExtractionAPI_FileReader.log, ContentExtractionAPI_Manager.log,
ContentExtractionHost_FileReader.log, ContentExtractionHost_Manager.log,
machinelearning_native_filereader.log, and
machinelearning_training_native_manager.log. Refer to the entry for each of these log
files in debug log file list for configuration details. See “Debug log files” on page 337.
Checkboxes on the Collection tab enable you to collect different types of files from the selected
servers. Table 15-5 describes each type of file.
Operational Operational log files record detailed information about the tasks the software performs and any errors
Logs that occur while the software performs those tasks. You can use the contents of operational log files
to verify that the software functions as you expect it to. You can also use these files to troubleshoot
any problems in the way the software integrates with other components of your system.
For example, you can use operational log files to verify that a Network Prevent for Email Server
communicates with a specific MTA on your network.
Debug and Debug log files record fine-grained technical details about the individual processes or software
Trace Logs components that comprise Symantec Data Loss Prevention. The contents of debug log files are not
intended for use in diagnosing system configuration errors or in verifying expected software
functionality. You do not need to examine debug log files to administer or maintain an Symantec
Data Loss Prevention installation. However, Symantec Support may ask you to provide debug log
files for further analysis when you report a problem. Some debug log files are not created by default.
Symantec Support can explain how to configure the software to create the file if necessary.
Configuration Use the Configuration Files option to retrieve both logging configuration files and server feature
Files configuration files.
Logging configuration files define the overall level of logging detail that is recorded in server log files.
Logging configuration files also determine whether specific features or subsystem events are recorded
to log files.
For example, by default the Enforce console does not log SOAP messages that are generated from
Incident Reporting API Web service clients. The ManagerLogging.properties file contains a
property that enables logging for SOAP messages.
You can modify many common logging configuration properties by using the presets that are available
on the Configuration tab.
If you want to update a logging configuration file by hand, use the Configuration Files checkbox to
download the configuration files for a server. You can modify individual logging properties using a
text editor and then use the Configuration tab to upload the modified file to the server.
The Configuration Files option retrieves the active logging configuration files and also any backup
log configuration files that were created when you used the Configuration tab. This option also
retrieves server feature configuration files. Server feature configuration files affect many different
aspects of server behavior, such as the location of a syslog server or the communication settings of
the server. You can collect these configuration files to help diagnose problems or verify server settings.
However, you cannot use the Configuration tab to change server feature configuration files. You
can only use the tab to change logging configuration files.
Managing log files 349
Collecting server logs and configuration files
Agent Logs Use the Agent Logs option to collect DLP agent service and operational log files from an Endpoint
Prevent detection server. This option is available only for Endpoint Prevent servers. To collect agent
logs using this option, you must have already pulled the log files from individual agents to the Endpoint
Prevent detection server using a Pull Logs action.
Use the Agent List screen to select individual agents and pull selected log files to the Endpoint
Prevent detection server. Then use the Agent Logs option on this page to collect the log files.
When the logs are pulled from the endpoint, they are stored on the Endpoint Server in an unencrypted
format. After you collect the logs from the Endpoint Server, the logs are deleted from the Endpoint
Server and are stored only on the Enforce Server. You can only collect logs from one endpoint at a
time.
Operational, debug, trace log files are stored in the server_identifier/logs subdirectory
of the ZIP file. server_identifier identifies the server that generated the log files, and it
corresponds to one of the following values:
■ If you collect log files from the Enforce Server, Symantec Data Loss Prevention replaces
server_identifier with the string Enforce. Note that Symantec Data Loss Prevention does
not use the localized name of the Enforce Server.
■ If a detection server’s name includes only ASCII characters, Symantec Data Loss Prevention
uses the detection server name for the server_identifier value.
■ If a detection server’s name contains non-ASCII characters, Symantec Data Loss Prevention
uses the string DetectionServer-ID-id_number for the server_identifier value. id_number
is a unique identification number for the detection server.
If you collect agent service log files or operational log files from an Endpoint Prevent server,
the files are placed in the server_identifier/agentlogs subdirectory. Each agent log file
uses the individual agent name as the log file prefix.
Follow this procedure to collect log files and log configuration files from Symantec Data Loss
Prevention servers.
To collect log files from one or more servers
1 Click the Collection tab if it is not already selected.
2 Use the Date Range menu to select a range of dates for the files you want to collect. Note
that the collection process does not truncate downloaded log files in any way. The date
range limits collected files to those files that were last updated in the specified range.
3 To collect log files from the Enforce Server, select one or more of the checkboxes next
to the Enforce Server entry to indicate the type of files you want to collect.
Managing log files 350
About log event codes
4 To collect log files from one or all detection servers, use the Select a Detection Server
menu to select either the name of a detection server or the Collect Logs from All
Detection Servers option. Then select one or more of the checkboxes next to the menu
to indicate the type of files you want to collect.
5 Click Collect Logs to begin the log collection process.
The administration console adds a new entry for the log collection process in the Previous
Log Collections list at the bottom of the screen. If you are retrieving many log files, you
may need to refresh the screen periodically to determine when the log collection process
has completed.
Note: You can run only one log collection process at a time.
6 To cancel an active log collection process, click Cancel next to the log collection entry.
You may need to cancel log collection if one or more servers are offline and the collection
process cannot complete. When you cancel the log collection, the ZIP file contains only
those files that were successfully collected.
7 To download collected logs to your local computer, click Download next to the log collection
entry.
8 To remove ZIP files stored on the Enforce Server, click Delete next to a log collection
entry.
See “Log collection and configuration screen” on page 343.
See “About log files” on page 333.
■ See “Network Prevent for Web operational log files and event codes” on page 351.
■ See “Network Prevent for Email operational log codes” on page 355.
■ See “Network Prevent for Email originated responses and codes” on page 359.
Managing log files 351
About log event codes
Network Prevent for Web operational log files and event codes
Network Prevent for Web log file names use the format of WebPrevent_OperationalX.log
(where X is a number). The number of files that are stored and their sizes can be specified by
changing the values in the FileReaderLogging.properties file. This file is in the c:\Program
Files\Symantec\DataLossPrevention\DetectionServer\15.5\Protect\config (Windows)
or /opt/Symantec/DataLossPrevention/DetectionServer/15.5/Protect/config (Linux)
directory. By default, the values are:
■ com.vontu.icap.log.IcapOperationalLogHandler.limit = 5000000
■ com.vontu.icap.log.IcapOperationalLogHandler.count = 5
Table 15-6 lists the Network Prevent for Web-defined operational logging codes by category.
The italicized part of the text contains event parameters.
Table 15-6 Status codes for Network Prevent for Web operational logs
Operational Events
Connectivity Events
Where:
■ icap_bind_address is the Network Prevent for Web bind address to which the server listens.
This address is specified with the Icap.BindAddress Advanced Setting.
■ icap_bind_port is the port at which the server listens. This port is set in the Server >
Configure page.
Where:
■ conn_id is the connection ID that is allocated to this connection. This ID can be helpful in
doing correlations between multiple logs.
■ icap_client_ip and icap_client_port are the proxy's IP address and port from which the
connect operation to Network Prevent for Web was performed.
Managing log files 352
About log event codes
Table 15-6 Status codes for Network Prevent for Web operational logs (continued)
Where:
Where N indicates the number of connections in each state, when the message was logged.
This message provides the system state in terms of connection management. It is logged
whenever a connection is opened or closed.
Connectivity Errors
Where:
■ icap_bind_address is the Network Prevent for Web bind address to which the server listens.
This address can be specified with the Icap.BindAddress Advanced Setting.
■ icap_bind_port is the port at which the server listens. This port is set on the Server >
Configure page.
Where host_ip and port are the proxy system IP and port address from which a connect attempt
to Network Prevent for Web was performed. If the host is not listed in the Icap.AllowHosts
Advanced setting, it is unable to form a connection.
■ com.vontu.icap.log.IcapAccessLogHandler.count = 5
A Network Prevent for Web access log is similar to a proxy server’s web access log. The “start”
log message format is:
Managing log files 353
About log event codes
Table 15-7 lists the fields. The values of fields that are enclosed in quotes in this example are
quoted in an actual message. If field values cannot be determined, the message displays -
or "" as a default value.
Fields Explanation
time_stamp Time that Network Prevent for Web receives the request.
icap_status_code ICAP response code that Network Prevent for Web sends by for this
request.
referrer Header value from the request that contains the URI from which this request
came.
processing_time Request processing time in milliseconds. This value is the total of the
(milliseconds) receiving, content inspection, and sending times.
Table 15-7 Network Prevent for Web access log fields (continued)
Fields Explanation
action_code An integer representing the action that Network Prevent for Web takes.
Where the action code is one of the following:
■ 0 = UNKNOWN
■ 1 = ALLOW
■ 2 = BLOCK
■ 3 = REDACT
■ 4 = ERROR
■ 5 = ALLOW_WITHOUT_INSPECTION
■ 6 = OPTIONS_RESPONSE
■ 7 = REDIRECT
icap_method_code An integer representing the ICAP method that is associated with this
request. Where the ICAP method code is one of the following:
■ -1 = ILLEGAL
■ 0 = OPTIONS
■ 1 = REQMOD
■ 2 = RESPMOD
■ 3 = LOG
traffic_source_code An integer that represents the source of the network traffic. Where the
traffic source code is one of the following:
■ 1 = WEB
■ 2 = UNKNOWN
Note: Trace logging produces a large amount of data and therefore requires a large amount
of free disk storage space. Trace logging should be used only for debugging an issue because
the data that is written in the file is in clear text.
■ com.vontu.mta.log.SmtpOperationalLogHandler.count = 5
At various log levels, components in the com.vontu.mta.rp package output varying levels of
detail. The com.vontu.mta.rp.level setting specifies log levels in the
RequestProcessorLogging.properties file which is stored in the
FileReaderLogging.properties file. This file is in the c:\Program
Files\Symantec\DataLossPrevention\DetectionServer\15.5\Protect\config (Windows)
or /opt/Symantec/DataLossPrevention/DetectionServer/15.5/Protect/config (Linux)
directory. For example, com.vontu.mta.rp.level = FINE specifies the FINE level of detail.
Table 15-8 describes the Network Prevent for Email log levels.
Level Guidelines
INFO General events: connect and disconnect notices, information on the messages that are
processed per connection.
FINEST Complete message content, deepest execution tracing, and error tracing.
Table 15-9 Status codes for Network Prevent for Email operational log
Code Description
Core Events
The RequestProcessor attempts to re-establish its connection with the FileReader for detection.
Core Errors
Connectivity Events
Table 15-9 Status codes for Network Prevent for Email operational log (continued)
Code Description
Connectivity Errors
Table 15-9 Status codes for Network Prevent for Email operational log (continued)
Code Description
Message Events
Where:
■ Recipient_count is the total number of addressees in the To, CC, and BCC fields.
■ Response is the Network Prevent for Email response which can be one of: PASS, BLOCK,
BLOCK_AND_REDIRECT, REDIRECT, MODIFY, or ERROR.
■ Thee status is an Enhanced Status code.
See “Network Prevent for Email originated responses and codes” on page 359.
■ The rtime is the time in seconds for Network Prevent for Emailto fully receive the message
from the sending MTA.
■ The dtime is the time in seconds for Network Prevent for Email to perform detection on
the message.
■ The mtime is the total time in seconds for Network Prevent for Email to process the
message Message Errors.
Message Errors
Managing log files 359
About log event codes
Table 15-9 Status codes for Network Prevent for Email operational log (continued)
Code Description
250 2.0.0 Ok: Carry on. Success code that Network Prevent for Email uses.
221 2.0.0 Service The normal connection termination code that Network Prevent
closing. for Email generates if a QUIT request is received when no
forward MTA connection is active.
451 4.3.0 Error: This “general, transient” error response is issued when a
Processing (potentially) recoverable error condition arises. This error
error. response is issued when a more specific error response is not
available. Forward connections are sometimes closed, and
their unexpected termination is occasionally a cause of a code
451, status 4.3.0. However sending connections should remain
open when such a condition arises unless the sending MTA
chooses to terminate.
Managing log files 360
About log event codes
421 4.3.0 Fatal: This “general, terminal” error response is issued when a fatal,
Processing unrecoverable error condition arises. This error results in the
error. immediate termination of any sender or receiver connections.
Closing
connection.
421 4.4.1 Fatal: That an attempt to connect the forward MTA was refused or
Forwarding otherwise failed to establish properly.
agent
unavailable.
421 4.4.2 Fatal: Closing connection. The forwarded MTA connection is lost in
Connection a state where further conversation with the sending MTA is
lost to not possible. The loss usually occurs in the middle of message
forwarding header or body buffering. The connection is terminated
agent. immediately.
451 4.4.2 Error: The forward MTA connection was lost in a state that may be
Connection recoverable if the connection can be re-established. The
lost to sending MTA connection is maintained unless it chooses to
forwarding terminate.
agent.
421 4.4.7 Error: The last command issued did not receive a response within
Request the time window that is defined in the
timeout RequestProcessor.DefaultCommandTimeout. (The time
exceeded. window may be from RequestProcessor.DotCommandTimeout
if the command issued was the “.”). The connection is closed
immediately.
421 4.4.7 Error: The connection was idle (no commands actively awaiting
Connection response) in excess of the time window that is defined in
timeout RequestProcessor.DefaultCommandTimeout.
exceeded.
Managing log files 361
About log event codes
501 5.5.2 Fatal: A fatal violation of the SMTP protocol (or the constraints that
Invalid are placed on it) occurred. The violation is not expected to
transmission change on a resubmitted message attempt. This message is
request. only issued in response to a single command or data line that
exceeds the boundaries that are defined in
RequestProcessor.MaxLineLength.
550 5.7.1 User This combination of code and status indicates that a Blocking
Supplied. response rule has been engaged. The text that is returned is
supplied as part of the response rule definition.
Note that a 4xx code and a 4.x.x enhanced status indicate a temporary error. In such cases
the MTA can resubmit the message to the Network Prevent for Email Server. A 5xx code and
a 5.x.x enhanced status indicate a permanent error. In such cases the MTA should treat the
message as undeliverable.
See “About log files” on page 333.
Chapter 16
Using Symantec Data Loss
Prevention utilities
This chapter includes the following topics:
■ About DBPasswordChanger
Name Description
DBPasswordChanger Changes the encrypted password that the Enforce Server uses to connect to the Oracle
database.
Name Description
sslkeytool Generates custom authentication keys to improve the security of the data that is transmitted
between the Enforce Server and detection servers. The custom authentication keys must be
copied to each Symantec Data Loss Prevention server.
See the topic "About the sslkeytool utility and server certificates" in the Symantec Data Loss
Prevention Installation Guide.
SQL Preindexer Indexes an SQL database or runs an SQL query on specific data tables within the database.
This utility is designed to pipe its output directly to the Remote EDM Indexer utility.
Remote EDM Indexer Converts a comma-separated or tab-delimited data file into an exact data matching index.
The utility can be run on a remote machine to provide the same indexing functionality that is
available locally on the Enforce Server.
This utility is often used with the SQL Preindexer. The SQL Preindexer can run an SQL query
and pass the resulting data directly to the Remote EDM Indexer to create an EDM index.
Name Description
Service_Shutdown.exe This utility enables an administrator to turn off both the agent and the watchdog services on
an endpoint. (As a tamper-proofing measure, it is not possible for a user to stop either the
agent or the watchdog service.)
See “Shutting down the agent and the watchdog services on Windows endpoints” on page 2492.
Vontu_sqlite3.exe This utility provides an SQL interface that enables you to view or modify the encrypted
database files that the Symantec DLP Agent uses. Use this tool when you want to investigate
or make changes to the Symantec Data Loss Prevention files.
See “Inspecting the database files accessed by the agent” on page 2493.
Logdump.exe This tool lets you view the Symantec DLP Agent extended log files, which are hidden for
security reasons.
Name Description
Start_agent This utility enables an administrator to start agents running on Mac endpoints that have been
shut down using the shutdown task.
See “Starting DLP Agents that run on Mac endpoints” on page 2499.
About DBPasswordChanger
Symantec Data Loss Prevention stores encrypted passwords to the Oracle database in a file
that is called DatabasePassword.properties, located in C:\Program
Files\Symantec\DataLossPrevention\EnforceServer\15.5\Protect\config (Windows)
or /opt/Symantec/DataLossPrevention/EnforceServer/15.5/Protect/config (Linux).
Because the contents of the file are encrypted, you cannot directly modify the file. The
DBPasswordChanger utility changes the stored Oracle database passwords that the Enforce
Server uses.
Before you can use DBPasswordChanger to change the password to the Oracle database
you must:
■ Shut down the Enforce Server.
■ Change the Oracle database password using Oracle utilities.
See “Example of using DBPasswordChanger” on page 365.
DBPasswordChanger syntax
The DBPasswordChanger utility uses the following syntax:
All command-line parameters are required. The following table describes each command-line
parameter.
See “Example of using DBPasswordChanger” on page 365.
Using Symantec Data Loss Prevention utilities 365
About DBPasswordChanger
Parameter Description
C:\Program Files\Symantec\DataLossPrevention
\EnforceServer\15.5\Protect\config (Windows) or
/opt/Symantec/DataLossPrevention/
EnforceServer/15.5/Protect/config (Linux).
DBPasswordChanger \Symantec\DataLossPrevention\EnforceServer\15.5\Protect\config\Datab
protect_oracle
■ Chapter 25. Detecting content using Exact Match Data Identifiers (EMDI)
■ Chapter 29. Detecting content using Form Recognition - Sensitive Image Recognition
■ Chapter 44. Supported Office Open XML formats for high-performance content extraction
■ Policy components
■ Policy templates
■ Solution packs
■ Policy groups
■ Policy deployment
■ Policy severity
■ Data Profiles
■ User Groups
violations are based on your compliance requirements. The Enforce Server administration
console provides an intuitive, centralized, Web-based interface for authoring policies.
See “Workflow for implementing policies” on page 378.
Table 17-1 describes the policy authoring features provided by Symantec Data Loss Prevention.
Feature Description
Intuitive policy The policy builder interface supports Boolean logic for detection configuration.
building
You can combine different detection methods and technologies in a single policy.
Decoupled The system stores response rules and policies as separate entities.
response rules
You can manage and update response rules without having to change policies; you can reuse
response rules across policies.
Fine-grained policy The system provides severity levels for policy violations.
reporting
You can report the overall severity of a policy violation by the highest severity.
Centralized data The system stores data and group profiles separate from policies.
and group profiling
This separation enables you to manage and update profiles without changing policies.
Policy sharing The system supports policy template import and export.
Role-based access The system provides role-based access control for various user and administrative functions.
control
You can create roles for policy authoring, policy administration, and response rule authoring.
Policy components
A valid policy has at least one detection or group rule with at least one match condition.
Response rules are optional policy components.
Policy components describes Data Loss Prevention policy components.
Policy name Required The policy name must be unique within the Policy Group
Policy rule Required A valid policy must contain at least one rule that declares at least one
match condition.
Data Profile May be Exact Data Matching (EDM), Indexed Document Matching (IDM), Vector
required Machine Learning (VML), and Form Recognition policies all require data
profiles.
User group May be A policy requires a User Group only if a group method in the policy
required requires it.
Policy description Optional A policy description helps users identify the purpose of the policy.
Policy label Optional A policy label helps Veritas Data Insight business users identify the
purpose of the policy when using the Self-Service Portal.
Response Rule Optional A policy can implement one or more response rules to report and
remediate incidents.
Policy exception Optional A policy can contain one or more exceptions to exclude data from
matching.
Compound match Optional A policy rule or exception can implement multiple match conditions.
conditions
See “Compound conditions” on page 394.
Policy templates
Symantec Data Loss Prevention provides policy templates to help you quickly deploy detection
policies in your enterprise. You can share policies across systems and environments by
importing and exporting policy rules and exceptions as templates.
Using policy templates saves you time and helps you avoid errors and information gaps in
your policies because the detection methods are predefined. You can edit a template to create
a policy that precisely suits your needs. You can also export and import your own policy
templates.
Some policy templates are based on well-known sets of regulations, such as the Payment
Card Industry Security Standard, Gramm-Leach-Bliley, California SB1386, and HIPAA. Other
policy templates are more generic, such as Customer Data Protection, Employee Data
Protection, and Encrypted Data. Although the regulation-based templates can help address
the requirements of the relevant regulations, consult with your legal counsel to verify compliance.
See “Creating a policy from a template” on page 397.
Table 17-3 describes the system-defined policy templates provided by Symantec Data Loss
Prevention.
US Regulatory Enforcement See “US Regulatory Enforcement policy templates” on page 400.
General Data Protection Regulation See “General Data Protection Regulation (GDPR) policy templates”
on page 402.
International Regulatory Enforcement See “International Regulatory Enforcement policy templates” on page 403.
Customer and Employee Data Protection See “Customer and Employee Data Protection policy templates”
on page 404.
Confidential or Classified Data Protection See “Confidential or Classified Data Protection policy templates”
on page 405.
Network Security Enforcement See “Network Security Enforcement policy templates” on page 406.
Introduction to policies 372
Solution packs
Acceptable Use Enforcement See “Acceptable Use Enforcement policy templates” on page 407.
Imported Templates See “Policy template import and export” on page 377.
Solution packs
Symantec Data Loss Prevention provides solution packs for several industry verticals. A
solution pack contains configured policies, response rules, user roles, reports, protocols, and
the incident statuses that support a particular industry or organization. For a list of available
solution packs and instructions, refer to chapter 4, "Importing a solution pack" in the Symantec
Data Loss Prevention Installation Guide. You can import one solution pack to the Enforce
Server.
Once you have imported the solution pack, start by reviewing its policies. By default the solution
pack activates the policies it provides.
See “Manage and add policies” on page 432.
Policy groups
You deploy policies to detection servers using policy groups. Policy groups limit the policies,
incidents, and detection mechanisms that are accessible to specific users.
Each policy belongs to one policy group. When you configure a policy, you assign it to a policy
group. You can change the policy group assignment, but you cannot assign a policy to more
than one policy group. You deploy policy groups to one or more detection servers.
The Enforce Server is configured with a single policy group called the Default Policy Group.
The system deploys the default policy group to all detection servers. If you define a new policy,
the system assigns the policy to the default policy group, unless you create and specify a
different policy group. You can change the name of the default policy group. A solution pack
creates several policy groups and assigns policies to them.
After you create a policy group, you can link policies, Discover targets, and roles to the policy
group. When you create a Discover target, you must associate it with a single policy group.
When you associate a role with particular policy groups, you can restrict users in that role.
Policies in that policy group detect incidents and report them to users in the role that is assigned
to that policy group.
The relationship between policy groups and detection servers depends on the server type.
You can deploy a policy group to one or more Network Monitor, Network Prevent, or Endpoint
Servers. Policy groups that you deploy to an Endpoint Server apply to any DLP Agent that is
Introduction to policies 373
Policy deployment
registered with that server. The Enforce Server automatically associates all policy groups with
all Network Discover Servers.
For Network Monitor and Network Prevent, each policy group is assigned to one or more
Network Monitor Servers, Network Prevent for Email Servers, or Network Prevent for Web
Servers. For Network Discover, policy groups are assigned to individual Discover targets. A
single detection server may handle as many policy groups as necessary to scan its targets.
For Endpoint Monitor, policy groups are assigned to the Endpoint Server and apply to all
registered DLP Agents.
See “Manage and add policy groups” on page 435.
See “Creating and modifying policy groups” on page 436.
Policy deployment
You can use policy groups to organize and deploy your policies in different ways. For example,
consider a situation in which your detection servers are set up across a system that spans
several countries. You can use policy groups to ensure that a detection server runs only the
policies that are valid for a specific location.
You can dedicate some of your detection servers to monitor internal network traffic and dedicate
others to monitor network exit points. You can use policy groups to deploy less restrictive
policies to servers that monitor internal traffic. At the same time, you can deploy stricter policies
to servers that monitor traffic leaving your network.
You can use policy groups to organize policies and incidents by business units, departments,
geographic regions, or any other organizational unit. For example, policy groups for specific
departments may be appropriate where security responsibilities are distributed among various
groups. In such cases, policy groups provide for role-based access control over the viewing
and editing of incidents. You deploy policy groups according to the required division of access
rights within your organization (for example, by business unit).
You can use policy groups for detection-server allocation, which may be more common where
security departments are centralized. In these cases, you would carefully choose the detection
server allocation for each role and reflect the server name in the policy group name. For
example, you might name the groups Inbound and Outbound, United States and International,
or Testing and Production.
In more complex environments, you might consider some combination of the following policy
groups for deploying policies:
■ Sales and Marketing - US
■ Sales and Marketing - Europe
■ Sales and Marketing - Asia
■ Sales and Marketing - Australia, New Zealand
Introduction to policies 374
Policy severity
■ Human Resources - US
■ Human Resources - International
■ Research and Development
■ Customer service
Lastly, you can use policy groups to test policies before deploying them in production, to
manage legacy policies, and to import and export policy templates.
See “Policy groups” on page 372.
See “About role-based access control” on page 109.
Policy severity
When you configure a detection rule, you can select a policy severity level. You can then use
response rules to take action based on a severity level. For example, you can configure a
response rule to take action after a specified number of "High" severity violations.
See “About response rule conditions” on page 1752.
The default severity level is set to "High," unless you change it. The default severity level
applies to any condition that the detection rule matches. For example, if the default severity
level is set to "High," every detection rule violation is labeled with this severity level. If you do
not want to tag every violation with a specific severity, you can define the criteria by which a
severity level is established. In this case the default behavior is overridden. For example, you
can define the "High" severity level to be applied only after a specified number of condition
matches have occurred.
See “Defining rule severity” on page 420.
In addition, you can define multiple severity levels to layer severity reporting. For example,
you can set the "High" severity level after 100 matches, and the medium severity level to apply
after 50 matches.
Author Response Add, configure, and manage response rules (but do not add them to policies).
Rules
See “About response rule authoring privileges” on page 1757.
Data Profiles
Data Profiles are user-defined configurations that you create to implement Exact Data Matching
(EDM), Indexed Document Matching (IDM), Form Recognition, and Vector Machine Learning
(VML) policy conditions.
See “Data Loss Prevention policy detection technologies” on page 383.
Table 17-6 describes the types of Data Profiles that the system supports.
Introduction to policies 376
User Groups
Exact Data Profile An Exact Data Profile is used for Exact Data Matching (EDM) policies. The Exact Data Profile
contains data that has been indexed from a structured data source, such as a database,
directory server, or CSV file. The Exact Data Profile runs on the detection server. If an EDM
policy is deployed to an endpoint, the DLP Agent sends the message to the detection server
for evaluation (two-tier detection).
See “About the Exact Data Profile and index” on page 528.
See “About two-tier detection for EDM on the endpoint” on page 533.
Indexed Document An Indexed Document Profile is used for Indexed Document Matching (IDM) policies. The
Profile Indexed Document Profile contains data that has been indexed from a collection of confidential
documents. The Indexed Document Profile runs on the detection server. If an IDM policy is
deployed to an endpoint, the DLP Agent sends the message to the detection server for
evaluation (two-tier detection).
Vector Machine A Vector Machine Learning Profile is used for Vector Machine Learning (VML) policies. The
Learning Profile Vector Machine Learning Profile contains a statistical model of the features (keywords)
extracted from content that you want to protect. The VML profile is loaded into memory by
the detection server and DLP Agent. VML does not require two-tier detection.
Form Recognition A Form Recognition Profile is used for Form Recognition policies. The Form Recognition
Profile Profile contains blank images of forms you want to detect.
When you configure a profile, yoo specify a numeric value to represent the Fill Threshold.
This number is a value from 1-10. 1 represents a form that has been filled out minimally and
10 a form that is completely filled in. If the Fill Threshold is met or exceeded, an incident is
opened.
User Groups
You define User Groups on the Enforce Server. User Groups contain user identity information
that you populate by synchronizing the Enforce Server with a group directory server (Microsoft
Active Directory).
You must have at least policy authoring or server administrator privileges to define User Groups.
You must define the User Groups before you synchronize users.
Introduction to policies 377
Policy template import and export
Once you define a User Group, you populate it with users, groups, and business units from
your directory server. After the user group is populated, you associate it with the User/Sender
and Recipient detection rules or exceptions. The policy only applies to members of that User
Group.
See “Introducing synchronized Directory Group Matching (DGM)” on page 935.
See “Configuring directory server connections” on page 156.
See “Configuring User Groups” on page 936.
Policy metadata (name, The name of the template has to be less than 60 characters or YES
description, label) it does not appear in the Imported Templates list.
Described Content Matching If the template contains only DCM methods, it imports as YES
(DCM) rules and exceptions exported without changes.
Exact Data Matching (EDM) If the template contains multiple EDM or IDM match conditions, YES
and Indexed Document only one is exported.
Matching (IDM) conditions
If the template contains an EDM and an IDM condition, the
system drops the IDM.
Introduction to policies 378
Workflow for implementing policies
User Group User group methods are maintained on import only if the user NO
groups exist on the target before import.
Policy Group Policy groups do not export. On import you can select a local NO
policy group, otherwise the system assigns the policy to the
Default Policy group.
Response Rules You must define and add response rules to policies from the NO
local Enforce Server instance.
Data Profiles On import you must reference a locally defined Data Profile, NO
otherwise the system drops any methods that require a Data
Profile.
Custom data identifiers Modified and custom data identifiers do not export. NO
Action Description
Familiarize yourself with the different types of detection See “Detecting data loss” on page 381.
technologies and methods that Symantec Data Loss
See “Data Loss Prevention policy detection technologies”
Prevention provides, and considerations for authoring
on page 383.
data loss prevention policies.
See “Policy matching conditions” on page 386.
Develop a policy detection strategy that defines the type See “Develop a policy strategy that supports your data
of data you want to protect from data loss. security objectives” on page 451.
Introduction to policies 379
Viewing, printing, and downloading policy details
Action Description
Review the policy templates that ship with Symantec See “Policy templates” on page 371.
Data Loss Prevention, and any templates that you import
See “Solution packs” on page 372.
manually or by solution pack.
Create policy groups to control how your policies are See “Policy groups” on page 372.
accessed, edited, and deployed.
See “Policy deployment” on page 373.
To detect exact data or content or similar unstructured See “Data Profiles” on page 375.
data, create one or more Data Profiles.
To detect exact identities from a synchronized directory See “User Groups” on page 376.
server (Active Directory), configure one or more User
Groups.
Configure conditions for detection and group rules and See “Creating a policy from a template” on page 397.
exceptions.
Test and tune your policies. See “Test and tune policies to improve match accuracy”
on page 453.
Add response rules to the policy to take action when See “About response rules” on page 1738.
the policy is violated.
Manage the policies in your enterprise. See “Manage and add policies” on page 432.
Action Description
View and print details for a single policy. See “Viewing and printing policy details”
on page 444.
Download details for all policies. See “Downloading policy details” on page 444.
Chapter 18
Overview of policy detection
This chapter includes the following topics:
■ Exception conditions
■ Compound conditions
Technology Description
Exact Data Matching (EDM) Use EDM to detect personally identifiable information.
Exact Match Data Identifiers Use EMDI to detect structured data, especially personally-identifiable information.
(EMDI) EMDI provides better matching performance and greater memory efficiency than EDM.
Indexed Document Matching Use IDM to detect exact files and file contents, and derivative content.
(IDM)
See “Introducing Indexed Document Matching (IDM)” on page 612.
Form Recognition Use Form Recognition to detect images of forms that belong to a gallery associated
with a Form Recognition policy.
Directory Group Matching Use DGM to detect exact identities synchronized from a directory server or profiled
(DGM) from a database.
Technology Description
Described Content Matching Use DCM to detect message content and context, including:
(DCM)
■ Data Identifiers to match content using precise patterns and data validators.
See “Introducing data identifiers” on page 717.
■ Keywords to detect content using key words, key phrases, and keyword dictionaries.
See “Introducing keyword matching” on page 838.
■ Regular Expressions to detect characters, patterns, and strings.
See “Introducing regular expression matching” on page 852.
■ File properties to detect files by type, name, size, and custom type.
See “Introducing file property detection” on page 900.
■ User, sender, and recipient patterns to detect described identities.
See “Introducing described identity matching” on page 925.
■ Protocol signatures to detect network traffic.
See “Introducing protocol monitoring for network” on page 912.
■ Destinations, devices, and protocols to detect endpoint events.
See “Introducing endpoint event detection” on page 915.
Technology Description
Custom policy detection Data Loss Prevention provides methods for customizing and extending detection,
methods including:
See “Configuring the Content Matches Regular Expression condition” on page 854.
Content Matches Keyword Match described content using keywords, key phrases, and keyword dictionaries
Content Matches Data Match described content using Data Identifier patterns and validators.
Identifier
See “Introducing data identifiers” on page 717.
See “Configuring the Content Matches data identifier condition” on page 737.
Content Matches Match described content using Information Centric Tagging tagged files and emails.
Classification
See “Introducing classification matching” on page 858.
Table 18-4 lists the content matching conditions that require a Data Profile and index.
Overview of policy detection 388
Policy matching conditions
Content Matches Exact Data Match exact data profiled from a structured data source such as a database or CSV
From an Exact Data Profile file.
(EDM)
See “Introducing Exact Data Matching (EDM)” on page 525.
See “Configuring the Content Matches Exact Data policy condition for EDM”
on page 551.
Note: This condition requires two-tier detection on the endpoint. See “About two-tier
detection for EDM on the endpoint” on page 533.
Content Matches Document Match files and file contents exactly or partially using fingerprinting
Signature From an Indexed
See “Introducing Indexed Document Matching (IDM)” on page 612.
Document Profile (IDM)
See “Configuring the Content Matches Document Signature policy condition”
on page 646.
Note: This condition requires two-tier detection on the endpoint. See “About the
Indexed Document Profile” on page 615.
Detect using Vector Machine Match file contents with features similar to example content you have trained.
Learning profile (VML)
See “Introducing Vector Machine Learning (VML)” on page 664.
See “Configuring the Detect using Vector Machine Learning Profile condition”
on page 679.
Message Attachment or File Match specific file formats and document attachments.
Type Match
See “About file type matching” on page 900.
See “Configuring the Message Attachment or File Type Match condition” on page 904.
Overview of policy detection 389
Policy matching conditions
Message Attachment or File Match files or attachments over or under a specified size.
Size Match
See “About file size matching” on page 902.
See “Configuring the Message Attachment or File Size Match condition” on page 905.
Message Attachment or File Match files or attachments that have a specific name or match wildcards.
Name Match
See “About file name matching” on page 903.
Message/Email Properties and Classify Microsoft Exchange email messages based on specific message attributes
Attributes (MAPI attributes).
Custom File Type Signature Match custom file types based on their binary signature using scripting.
See “Enabling the Custom File Type Signature condition in the policy console”
on page 908.
Protocol Monitoring Match incidents on the network transmitted using a specified protocol, including
SMTP, FTP, HTTP/S, IM, and NNTP.
See “Configuring the Protocol Monitoring condition for network detection” on page 913.
Condition Description
Protocol or Endpoint Match endpoint messages transmitted using a specified transport protocol or when
Monitoring data is moved or copied to a particular destination.
Endpoint Device Class or ID Match endpoint events occurring on specified hardware devices.
Endpoint Location Match endpoint events depending if the DLP Agent is on or off the corporate network.
Sender/User Matches Pattern Match message senders and users by email address, user ID, IM screen name,
and IP address.
Recipient Matches Pattern Match message recipients by email or IP address, or Web domain.
Sender/User based on a Match message senders and users from a synchronized directory server.
Directory Server Group
See “Introducing synchronized Directory Group Matching (DGM)” on page 935.
Sender/User based on a Match message senders and users from a profiled directory server.
Directory from: an Exact Data
See “Introducing profiled Directory Group Matching (DGM)” on page 942.
Profile
See “Configuring the Sender/User based on a Profiled Directory condition”
on page 944.
Note: This condition requires two-tier detection on the endpoint. See “About two-tier
detection for profiled DGM” on page 942.
Recipient based on a Directory Match message recipients from a synchronized directory server.
Server Group
See “Introducing synchronized Directory Group Matching (DGM)” on page 935.
Recipient based on a Directory Match message recipients from a profiled directory server.
from: an Exact Data Profile
See “Configuring Exact Data profiles for DGM” on page 943.
See “Configuring the Recipient based on a Profiled Directory condition” on page 945.
Note: This condition requires two-tier detection on the endpoint. See “About two-tier
detection for profiled DGM” on page 942.
The content-based conditions support cross-component matching. You can configure the DCM
content conditions to match across all message components. The EDM condition matches on
message envelope, body, and attachments. The document conditions match on the message
body and attachments, except File Type and Name which only match on the attachment.
Protocol, endpoint, and identity conditions match on the entire message, as does any condition
evaluated by the DLP Agent. The subject component only applies to SMTP email or NNTP
messages.
Table 18-9 summarizes the component matching supported by each match condition type.
Classification
Exception conditions
Symantec Data Loss Prevention provides policy exceptions to exclude messages and message
components from matching. You can use exception conditions to refine the scope of your
detection and group rules.
See “Use a limited number of exceptions to narrow detection scope” on page 455.
Warning: Do not use multiple compound exceptions in a single policy. Doing so can cause
detection to run out of memory. If you find that the policy needs multiple compound exceptions
to produce matches, you should reconsider the design of the matching conditions.
The system evaluates an inbound message or message component against policy exceptions
before policy rules. If the exception supports cross-component matching (content-based
exceptions), the exception can be configured to match on individual message components.
Otherwise, the exception matches on the entire message.
If an exception is met, the system ejects the entire message or message component containing
the content that triggered the exception. The ejected message or message component is no
longer available for evaluation against policy rules. The system does not discard only the
matched content or data item; it discards the entire message or message component that
contained the excepted item.
Note: Symantec Data Loss Prevention does not support match-level exceptions, only component
or message-level exceptions.
For example, consider a policy that has a detection rule with one condition and an exception
with one condition. The rule matches messages containing Microsoft Word attachments and
generates an incident for each match. The exception excludes from matching messages from
[email protected]. An email from [email protected] that contains a Word attachment is
excepted from matching and does not trigger an incident. The detection exception condition
excluding [email protected] messages takes precedence over the detection rule match
condition that would otherwise match on the message.
See “Policy detection execution” on page 394.
You can implement any condition as an exception, except the EDM condition Content Matches
Exact Data From. In addition, Network Prevent for Web does not support synchronized DGM
exceptions. You can implement IDM as an exception, but the exception excludes exact files
from matching, not file contents. To exclude file contents, you "whitelist" it. VML can be used
as an exception if the content is from the same category.
See “Adding an exception to a policy” on page 424.
See “CAN-SPAM Act policy template” on page 1563.
Overview of policy detection 394
Compound conditions
See “White listing file contents to exclude from partial matching” on page 627.
Compound conditions
A valid policy must declare at least one rule that defines at least one match condition. The
condition matches input data to detect data loss. A rule with a single condition is a simple rule.
Optionally, you can declare multiple conditions within a single detection or group rule. A rule
with multiple conditions is a compound condition.
For compound conditions, each condition in the rule must match to trigger a violation. Thus,
for a single policy that declares one rule with two conditions, if one condition matches but the
other does not, detection does not report a match. If both conditions match, detection reports
a match, assuming that the rule is set to count all matches. In programmatic terms, two or
more conditions in the same rule are ANDed together.
Like rules, you can declare multiple conditions within a single exception. In this case, all
conditions in the exception must match for the exception to apply.
See “Policy detection execution” on page 394.
See “Use compound conditions to improve match accuracy” on page 455.
See “Exception conditions” on page 393.
Compound conditions AND If a single rule or exception in a policy contains two or more
match conditions, all conditions must match.
Rules or exceptions of same OR If there are two detection rules in a single policy, or two group
type rules in a single policy, or two exceptions of the same type
(detection or group), the rules or exceptions are independent
of each other.
Rules of different type AND If one or more detection rules is combined with one or more
group rules in a single policy, the rules are dependent.
Exceptions of different type OR If one or more detection exceptions is combined with one or
more group exceptions in a single policy, the exceptions are
independent.
Note: You cannot combine an Endpoint Prevent: Notify or Block response rule with two-tier
match conditions, including Exact Data Matching (EDM), Directory Group Matching (DGM),
and Indexed Document Matching (IDM) when two-tier detection is enabled. If you do, the
system displays a warning for both the detection condition and the response rule.
Exact Data Matching (EDM) Content Matches Exact Data from See “Introducing Exact Data Matching
an Exact Data Profile (EDM)” on page 525.
Profiled Directory Group Matching Sender/User based on a Directory See “Introducing profiled Directory
(DGM) from an Exact Data Profile Group Matching (DGM)” on page 942.
Indexed Document Matching (IDM) Content Matches Document See “Introducing Indexed Document
Signature from an Indexed Document Matching (IDM)” on page 612.
Profile
See “Two-tier IDM detection”
on page 615.
Note: Two-tier detection for IDM only
applies if it is enabled on the Endpoint
Server (two_tier_idm = on). If Endpoint
IDM is enabled (two_tier_idm = off),
two-tier detection is not used.
Chapter 19
Creating policies from
templates
This chapter includes the following topics:
Action Description
Add a policy from a template. See “Adding a new policy or policy template” on page 412.
Choose the template you want to At the Manage > Policies > Policy List > New Policy - Template List screen the
use. system lists all policy templates.
System-provided template categories:
Click Next to configure the policy. For example, select the Webmail policy template and click Next.
Choose a Data Profile (if If the template relies on one or more Data Profiles, the system prompts you to
prompted). select each:
■ Exact Data Profile
See “Choosing an Exact Data Profile” on page 409.
■ Indexed Document Profile
See “Choosing an Indexed Document Profile” on page 411.
If you do not have a Data Profile, you can either:
■ Cancel the policy definition process, define the profile, and resume creating the
policy from the template.
■ Click Next to configure the policy.
On creation of the policy, the system drops any rules or exceptions that rely on
the Data Profile.
Action Description
Edit the policy name or If you intend to modify a system-defined template, you may want to change the
description (optional). name so you can distinguish it from the original.
Note: The Policy Label field is reserved for the Veritas Data Insight Self-Service
Portal.
Select a policy group (if If you have defined a policy group, select it from the Policy Group list.
necessary).
See “Creating and modifying policy groups” on page 436.
If you have not defined a policy group, the system deploys the policy to the Default
Policy Group.
Edit the policy rules or exceptions The Configure Policy screen displays the rules and exceptions (if any) provided
(if necessary). by the policy.
You can modify, add, and remove policy rules and exceptions to meet your
requirements.
Save the policy and export it Click Save to save the policy.
(optional).
You can export policy detection as a template for sharing or archiving.
Test and tune the policy Test and tune the policy using data the policy should and should not detect.
(recommended).
Review the incidents that the policy generates. Refine the policy rules and
exceptions as necessary to reduce false positives and false negatives.
Add response rules (optional). Add response rules to the policy to report and remediate violations.
Export Administration Regulations (EAR) Enforces the U.S. Department of Commerce Export Administration
Regulations (EAR).
FACTA 2003 (Red Flag Rules) Enforces sections 114 and 315 (or Red Flag Rules) of the Fair
and Accurate Credit Transactions Act (FACTA) of 2003.
See “FACTA 2003 (Red Flag Rules) policy template” on page 1577.
HIPAA and HITECH (including PHI) This policy enforces the US Health Insurance Portability and
Accountability Act (HIPAA).
International Traffic in Arms Regulations (ITAR) This policy enforces the US Department of State ITAR provisions.
Medicare and Medicaid (including PHI) This policy detects protected health information (PHI) associated
with the United States Medicare and Medicaid programs.
NASD Rule 2711 and NYSE Rules 351 and 472 This policy protects the name(s) of any companies that are involved
in an upcoming stock offering.
See “NASD Rule 2711 and NYSE Rules 351 and 472 policy
template” on page 1700.
NASD Rule 3010 and NYSE Rule 342 This policy monitors brokers-dealers communications.
See “NASD Rule 3010 and NYSE Rule 342 policy template”
on page 1702.
NERC Security Guidelines for Electric Utilities This policy detects the information that is outlined in the North
American Electric Reliability Council (NERC) security guidelines
for the electricity sector.
Office of Foreign Assets Control (OFAC) This template detects communications involving targeted OFAC
groups.
OMB Memo 06-16 and FIPS 199 Regulations This template detects information that is classified as confidential.
See “OMB Memo 06-16 and FIPS 199 Regulations policy template”
on page 1707.
Payment Card Industry Data Security Standard This template detects credit card number data.
SEC Fair Disclosure Regulation This template detects data disclosure of material financial
information.
US Intelligence Control Markings (CAPCO) and This template detects authorized terms to identify classified
DCID 1/7 information in the US Federal Intelligence community.
Table 19-3
Policy template Description
General Data Protection Regulations (Banking and This policy protects personal identifiable information related
Finance) to banking and finance.
General Data Protection Regulation (Digital Identity) This policy protects personal identifiable information related
to digital identity.
General Data Protection Regulation (Government This policy protects personal identifiable information related
Identification) to government identification.
General Data Protection Regulation (Healthcare and This policy protects personal identifiable information related
Insurance) to healthcare and insurance.
General Data Protection Regulation (Personal Profile) This policy protects personal identifiable information related
to personal profile data.
General Data Protection Regulation (Travel) This policy protects personal identifiable information related
to travel.
Data Protection Act 1998 This policy protects personal identifiable information.
EU Data Protection Directives This policy detects personal data specific to the EU directives.
Human Rights Act 1998 This policy enforces Article 8 of the act for UK citizens.
See “Human Rights Act 1998 policy template” on page 1694.
Canadian Social Insurance Numbers This policy detects patterns indicating Canadian social insurance
numbers.
Credit Card Numbers This policy detects patterns indicating credit card numbers.
Individual Taxpayer Identification Numbers This policy detects IRS-issued tax processing numbers.
(ITIN)
See “Individual Taxpayer Identification Numbers (ITIN) policy template”
on page 1695.
SWIFT Codes This policy detects codes banks use to transfer money across
international borders.
Table 19-5 Customer and Employee Data Protection policy templates (continued)
UK National Health Service Number This policy detects personal identification numbers issued by the NHS.
US Social Security Numbers This policy detects patterns indicating social security numbers.
Encrypted Data This policy detects the use of encryption by a variety of methods.
See “Encrypted Data policy template” on page 1575.
Merger and Acquisition Agreements This policy detects information and communications about upcoming merger
and acquisition activity.
Price Information This policy detects specific SKU and pricing information.
Proprietary Media Files This policy detects various types of video and audio files.
Symantec DLP Awareness and This policy detects any communications that refer to Symantec DLP or
Avoidance other data loss prevention systems and possible avoidance of detection.
Common Spyware Upload Sites This policy detects access to common spyware upload Web sites.
See “Common Spyware Upload Sites policy template” on page 1564.
Network Security This policy detects evidence of hacking tools and attack planning.
Illegal Drugs This policy detects conversations about illegal drugs and controlled
substances.
Media Files This policy detects various types of video and audio files.
Restricted Files This policy detects various file types that are generally inappropriate to send
out of the company.
Violence and Weapons This policy detects violent language and discussions about weapons.
Yahoo Message Board Activity This policy detects Yahoo message board activity.
See “Yahoo Message Board Activity policy template” on page 1732.
Yahoo and MSN Messengers on Port This policy detects Yahoo IM and MSN Messenger activity.
80
See “Yahoo and MSN Messengers on Port 80 policy template” on page 1733.
Columbian Personal Data Protection Law 1581 This policy detects violations of the Columbian Personal
Data Protection Law 1581.
Note: When the system prompts you to select an Exact Data Profile, the display lists the data
columns to include in the profile to provide the highest level of accuracy. If data fields in your
Exact Data Profile are not represented in the selected policy template, the system displays
those fields for content matching when you define the detection rule
Table 19-10 Policy templates that implement Exact Data Matching (EDM)
Customer Data Protection See “Customer Data Protection policy template” on page 1567.
Data Protection Act 1988 See “Data Protection Act 1998 policy template” on page 1568.
Creating policies from templates 410
Choosing an Exact Data Profile
Table 19-10 Policy templates that implement Exact Data Matching (EDM) (continued)
Employee Data Protection See “Employee Data Protection policy template” on page 1574.
EU Data Protection Directives See “Data Protection Directives (EU) policy template” on page 1570.
Export Administration Regulations (EAR) See “Export Administration Regulations (EAR) policy template”
on page 1576.
FACTA 2003 (Red Flag Rules) See “FACTA 2003 (Red Flag Rules) policy template” on page 1577.
General Data Protection Regulations See “General Data Protection Regulation (Banking and Finance)”
(Banking and Finance) on page 1583.
General Data Protection Regulations See “General Data Protection Regulation (Digital Identity)” on page 1617.
(Digital Identity)
General Data Protection Regulations See “General Data Protection Regulation (Government Identification)”
(Government Identification) on page 1618.
General Data Protection Regulations See “General Data Protection Regulation (Healthcare and Insurance)”
(Healthcare and Insurance) on page 1656.
General Data Protection Regulations See “General Data Protection Regulation (Personal Profile)” on page 1672.
(Personal Profile)
General Data Protection Regulations See “General Data Protection Regulation (Travel)” on page 1675.
(Travel)
HIPAA and HITECH (including PHI) See “HIPAA and HITECH (including PHI) policy template” on page 1690.
Human Rights Act 1998 See “Human Rights Act 1998 policy template” on page 1694.
International Traffic in Arms Regulations See “International Traffic in Arms Regulations (ITAR) policy template”
(ITAR) on page 1696.
Payment Card Industry Data Security See “Payment Card Industry (PCI) Data Security Standard policy
Standard template” on page 1709.
State Data Privacy See “SEC Fair Disclosure Regulation policy template” on page 1719.
Creating policies from templates 411
Choosing an Indexed Document Profile
Table 19-11 Policy templates that implement Indexed Document Matching (IDM)
CAN-SPAM Act (IDM exception) See “CAN-SPAM Act policy template” on page 1563.
NASD Rule 2711 and NYSE Rules 351 See “NASD Rule 2711 and NYSE Rules 351 and 472 policy template”
and 472 on page 1700.
NERC Security Guidelines for Electric See “NERC Security Guidelines for Electric Utilities policy template”
Utilities on page 1703.
SEC Fair Disclosure Regulation See “SEC Fair Disclosure Regulation policy template” on page 1719.
Proprietary Media Files See “Proprietary Media Files policy template” on page 1713.
■ Configuring policies
Configuring policies
The Manage > Policies > Policy List > Configure Policy screen is the home page for
configuring policies.
Table 20-1 describes the workflow for configuring policies.
Action Description
Define a new policy, or edit an existing policy. Add a new blank policy.
Enter a policy Name and Description. The policy name must be unique in the policy group you deploy
the policy to.
Action Description
Select the Policy Group from the list where the The Default Policy Group is selected if there is no policy group
policy is to be deployed. configured.
Set the Status for the policy. You can enable (default setting) or disable a policy. A disabled
policy is deployed but is not loaded into memory to detect
incidents.
Add a rule to the policy, or edit an existing rule. Click Add Rule to add a rule.
Configure the rule with one or more conditions. For a valid policy, you must configure at least one rule that
declares at least one condition. Compound conditions and
exceptions are optional.
Optionally, add one or more policy exceptions, or Click Add Exception to add it.
edit an existing exception.
See “Adding an exception to a policy” on page 424.d
Save the policy configuration. Click Save to save the policy configuration to the Enforce Server
database.
Export the policy as a template. Optionally, you can export the policy rules and exceptions as a
template.
Add one or more response rules to the policy. You configure response rules independent of policies.
Note: Exceptions are added separate from rules. See “Adding an exception to a policy”
on page 424.
Content Matches Exact Data Exact Data Profile See “About the Exact Data Profile and index”
on page 528.
Content Matches Document Indexed Document See “Introducing Indexed Document Matching (IDM)”
Signature Profile on page 612.
Content Matches Data Identifier Data Identifier See “Introducing data identifiers” on page 717.
Content Matches Classification ICT See “Overview of steps to tie Information Centric
Tagging to Data Loss Prevention” on page 228.
Detect using Vector Machine VML Profile See “Introducing Vector Machine Learning (VML)”
Learning on page 664.
Contextual Attributes (Cloud Cloud Detection Service See “Introducing contextual attributes for cloud
Applications and API Detection or API Detection applications” on page 948.
Appliance only) Appliance
Message Attachment or File See “About file type matching” on page 900.
Type Match
Message Attachment or File See “About file size matching” on page 902.
Size Match
Message Attachment or File See “About file name matching” on page 903.
Name Match
Custom File Type Signature Rule enabled See “About custom file type identification” on page 901.
Protocol Monitoring Custom protocols (if any) See “Introducing protocol monitoring for network”
on page 912.
Configuring policies 417
Configuring policy rules
Endpoint Device Class or ID Custom device(s) See “About endpoint device detection” on page 917.
Form Recognition
Detect using Form Recognition Form Recognition Profile See “About Form Recognition detection” on page 695.
Profile
See “Configuring the Form Recognition detection rule”
on page 699.
Sender/User based on a Exact Data Profile See “Introducing profiled Directory Group Matching
Directory from: (DGM)” on page 942.
Recipient based on a Directory See “Configuring Exact Data profiles for DGM”
from: on page 943.
Step 1 Add a rule to a policy, or modify See “Adding a rule to a policy” on page 415.
a rule.
To modify an existing rule, select the rule in the policy builder interface at
the Configure Policy – Edit Rule screen.
Configuring policies 418
Configuring policy rules
Step 2 Name the rule, or modify a In the General section of the rule, enter a name in the Rule Name field,
name. or modify the name of an existing rule.
Step 3 Set the rule severity. In the Severity section of the rule, select or modify a "Default" severity
level.
In addition to the default severity, you can add multiple severity levels to
a rule.
Step 4 Configure the match condition. In the Conditions section of the rule, you configure one or more match
conditions for the rule. The configuration of a condition depends on its
type.
Step 5 Configure match counting (if If the rule calls for it, configure how you want to count matches.
required).
See “Configuring match counting” on page 421.
Step 6 Select components to match on If the rule is content-based, select one or more available content rules to
(if available). match on.
Step 7 Add and configure one or more To define a compound rule, Add another match condition from the Also
additional match conditions Match list.
(optional).
Configure the additional condition according to its type (Step 4).
Step 8 Save the policy configuration. When you are done cofiguring the rule, click OK.
This action returns you to the Configure Policy screen where you can
Save the policy.
Table 20-4 lists each of the available match conditions and provides links to topics for
configuring each condition.
Configuring policies 419
Configuring policy rules
Rule Description
Content Matches Regular See “Configuring the Content Matches Regular Expression condition”
Expression on page 854.
Content Matches Exact Data from See “Configuring the Content Matches Exact Data policy condition
an Exact Data Profile for EDM” on page 551.
Content Matches Keyword See “Configuring the Content Matches Keyword condition”
on page 844.
Content Matches Document See “Configuring the Content Matches Document Signature policy
Signature condition” on page 646.
Content Matches Data Identifier See “Configuring the Content Matches data identifier condition”
on page 737.
Detect using Vector Machine See “Configuring the Detect using Vector Machine Learning Profile
Learning profile condition” on page 679.
Content Matches Classification See “Configuring the Content Matches Classification condition”
on page 863.
Detect using Form Recognition See “Configuring the Form Recognition detection rule” on page 699.
profile
C Context
Contextual Attributes (Cloud See “Introducing contextual attributes for cloud applications”
Applications and API Detection on page 948.
Appliance only)
Message Attachment or File Type See “Configuring the Message Attachment or File Type Match
Match condition” on page 904.
Message Attachment or File Size See “Configuring the Message Attachment or File Size Match
Match condition” on page 905.
Message Attachment or File Name See “Configuring the Message Attachment or File Name Match
Match condition” on page 906.
Custom File Type Signature See “Configuring the Custom File Type Signature condition”
on page 908.
Rule Description
Network Monitoring See “Configuring the Protocol Monitoring condition for network
detection” on page 913.
Endpoint Monitoring See “Configuring the Endpoint Monitoring condition” on page 918.
Endpoint Device Class or ID See “Configuring the Endpoint Device Class or ID condition”
on page 920.
Endpoint Location See “Configuring the Endpoint Location condition” on page 919.
Sender/User Matches Pattern See “Configuring the Sender/User Matches Pattern condition”
on page 927.
Recipient Matches Pattern See “Configuring the Recipient Matches Pattern condition”
on page 930.
Sender/User based on a Directory See “Configuring the Sender/User based on a Directory Server
Server Group Group condition” on page 939.
Sender/User based on a Directory See “Configuring the Sender/User based on a Profiled Directory
from an Exact Data Profile condition” on page 944.
Recipient based on a Directory See “Configuring the Recipient based on a Directory Server Group
Server Group condition” on page 940.
Recipient based on a Directory from See “Configuring the Recipient based on a Profiled Directory
an Exact Data Profile condition” on page 945.
Check for Simple This configuration reports a match count of 1 if there are one or more matches; it
existence does not count multiple matches. For example, 10 matches are one incident.
Compound This configuration reports a match count of 1 if there are one or more matches
and ALL conditions in the rule or exception are set to check for existence.
Configuring policies 422
Configuring match counting
Count all Simple This configuration reports a match count of the exact number of matches detected
matches by the condition. For example, 10 matches count as 10 incidents.
Compound This configuration reports a match count of the sum of all condition matches in
the rule or exception. The default is one incident per condition match and applies
if any condition in the rule or exception is set to count all matches.
For example, if a rule has two conditions and one is set to count all matches and
detects four matches, and the other condition is set to check for existence and
detects six matches, the reported match count is 10. If a third condition in the rule
detects a match, the match count is 11.
Only report You can change the default one incident per match count by specifying the
incidents with minimum number of matches required to report an incident.
at least _
For example, in a rule with two conditions, if you configure one condition to count
matches
all matches and specify five as the minimum number of matches for each condition,
a sum of 10 matches reported by the two conditions generates two incidents. You
must be consistent and select this option for each condition in the rule or exception
to achieve this behavior.
Note: The count all matches setting applies to each message component you
match on. For example, consider a policy where you specify a match count of 3
and configure a keyword rule that matches on all four message components
(default setting for this condition). If a message is received with two instances of
the keyword in the body and one instance of the keyword in the envelope, the
system does not report this as a match. However, if three instances of the keyword
appear in an attachment (or any other single message component), the system
would report it as a match.
Count all unique Only count Unique match counting is available for Data Identifiers, keyword matching, and
matches unique regular expression matching.
matches
See “About unique match counting” on page 734.
Condition Description
Content Matches Regular See “Introducing regular expression matching” on page 852.
Expression
See “Configuring the Content Matches Regular Expression condition” on page 854.
Condition Description
Content Matches Document See “Configuring the Content Matches Document Signature policy condition”
Signature (IDM) on page 646.
Content Matches Data Identifier See “Introducing data identifiers” on page 717.
See “Configuring the Content Matches data identifier condition” on page 737.
Recipient Matches Pattern See “Introducing described identity matching” on page 925.
Component Description
Envelope If the condition supports matching on the Envelope component, select it to match on the message
metadata. The envelope contains the header, transport information, and the subject if the message
is an SMTP email.
If the condition does not support matching on the Envelope component, this option is grayed out.
If the condition matches on the entire message, the Envelope is selected and cannot be deselected,
and the other components cannot be selected.
Subject Certain detection conditions match on the Subject component for some types of messages.
■ SMTP (email) messages from Network Monitor or Network Prevent for Email.
■ NNTP messages from Network Monitor.
To match on the Subject component, you must select (check) the Subject component and uncheck
(deselect) the Envelope component for the policy rule. If you select both components, the system
matches the subject twice because the message subject is included in the envelope as part of the
header.
Configuring policies 424
Adding an exception to a policy
Component Description
Body If the condition matches on the Body message component, select it to match on the text or content
of the message.
Attachment(s) If the condition matches on the Attachment(s) message component, select it to detect content in
files sent by, downloaded with, or attached to the message.
Note: You can create exceptions for all policy conditions, except the EDM condition Content
Matches Exact Data From. In addition, Network Prevent for Web does not support
synchronized DGM exceptions.
Content
Content Matches Regular See “Introducing regular expression matching” on page 852.
Expression
Content Matches Document Indexed Document See “Choosing an Indexed Document Profile” on page 411.
Signature Profile
Content Matches Data Data Identifier See “Introducing data identifiers” on page 717.
Identifier
See “Selecting a data identifier breadth” on page 739.
Detect using Vector Machine VML Profile See “Configuring VML policy exceptions” on page 680.
Learning profile
See “Configuring VML profiles and policy conditions”
on page 668.
Context
Contextual Attributes (Cloud Cloud Detection See “Introducing contextual attributes for cloud applications”
Applications and API Service or API on page 948.
Detection Appliance only) Detection
Appliance
File Properties
Message Attachment or File See “About file type matching” on page 900.
Type Match
Message Attachment or File See “About file size matching” on page 902.
Size Match
Message Attachment or File See “About file name matching” on page 903.
Name Match
Custom File Type Signature Condition enabled See “About custom file type identification” on page 901.
Custom script
added
Endpoint Device Class or ID See “About endpoint device detection” on page 917.
Form Recognition
Detect using Form Form Recognition See “About Form Recognition detection” on page 695.
Recognition Profile Profile
See “Configuring the Form Recognition exception rule”
on page 700.
Group (identity)
Sender/User Matches Pattern See “Introducing described identity matching” on page 925.
Sender/User based on a User Group See “Introducing synchronized Directory Group Matching
Directory Server Group (DGM)” on page 935.
Sender/User based on a Exact Data Profile See “Introducing profiled Directory Group Matching (DGM)”
Directory from: on page 942.
Recipient based on a Directory See “Configuring Exact Data profiles for DGM” on page 943.
from:
Step 1 Add a new policy exception, or See “Adding an exception to a policy” on page 424.
edit an existing exception.
Select an existing policy exception to modify it.
Step 2 Name the exception, or edit an In the General section, enter a unique name for the exception, or modify
existing name or description. the name of an existing exception.
Note: The exception name is limited to 60 characters.
Step 3 Select the components to apply If the exception is content-based, you can match on the entire message
the exception to (if available). or on individual message components.
■ Entire Message
This option applies the exception to the entire message.
■ Matched Components Only
This option applies the exception to each message component you
select from the Match On options in the Conditions section of the
exception.
Step 4 Configure the exception condition. In the Conditions section of the Configure Policy - Edit Exception
screen, define the condition for the policy exception. The configuration
of a condition depends on the exception type.
Step 5 Add one or more additional You can add conditions until the exception is structured as desired.
conditions to the exception
See “Configuring compound match conditions” on page 429.
(optional).
To add another condition to an exception, select the condition from the
Also Match list.
Step 6 Save and manage the policy. Click OK to complete the exception definition process.
Table 20-10 lists the exception conditions that you can configure, with links to configuration
details.
Configuring policies 428
Configuring policy exceptions
Exception Description
Content
Content Matches Regular Expression See “Configuring the Content Matches Regular Expression condition”
on page 854.
Content Matches Keyword See “Configuring the Content Matches Keyword condition” on page 844.
Content Matches Document Signature See “Configuring the Content Matches Document Signature policy
condition” on page 646.
Content Matches Data Identifier See “Configuring the Content Matches data identifier condition”
on page 737.
Detect using Vector Machine Learning See “Configuring VML policy exceptions” on page 680.
Profile
Context
Contextual Attributes (Cloud See “Introducing contextual attributes for cloud applications”
Applications and API Detection on page 948.
Appliance only)
File Properties
Message Attachment or File Type Match See “Configuring the Message Attachment or File Type Match
condition” on page 904.
Message Attachment or File Size Match See “Configuring the Message Attachment or File Size Match condition”
on page 905.
Message Attachment or File Name Match See “Configuring the Message Attachment or File Name Match
condition” on page 906.
Custom File Type Signature See “Configuring the Custom File Type Signature condition”
on page 908.
Network Protocol See “Configuring the Protocol Monitoring condition for network
detection” on page 913.
Endpoint Protocol or Destination See “Configuring the Endpoint Monitoring condition” on page 918.
Endpoint Device Class or ID See “Configuring the Endpoint Device Class or ID condition”
on page 920.
Endpoint Location See “Configuring the Endpoint Location condition” on page 919.
Configuring policies 429
Configuring compound match conditions
Exception Description
Form Recognition
Detect using Form Recognition profile See “Configuring the Form Recognition exception rule” on page 700.
Group (identity)
Sender/User Matches Pattern See “Configuring the Sender/User Matches Pattern condition”
on page 927.
Recipient Matches Pattern See “Configuring the Recipient Matches Pattern condition” on page 930.
Sender/User based on a Directory Server See “Configuring the Sender/User based on a Directory Server Group
Group condition” on page 939.
Recipient based on a Directory Server See “Configuring the Recipient based on a Directory Server Group
Group condition” on page 940.
Sender/User based on a Directory from See “Configuring the Sender/User based on a Profiled Directory
an EDM Profile condition” on page 944.
Recipient based on a Directory from and See “Configuring the Recipient based on a Profiled Directory condition”
EDM Profile on page 945.
Step 1 Modify or configure an You can add one or more additional match conditions to a policy rule at the
existing policy rule or Configure Policy – Edit Rule screen.
exception.
You can add one or more additional match conditions to a rule or exception
at the Configure Policy – Edit Rule or Configure Policy – Edit Exception
screen.
Step 2 Select an additional match Select the additional match condition from the Also Match list.
condition.
This list appears at the bottom of the Conditions section for an existing rule
or exception.
Step 3 Review the available The system lists all available additional conditions you can add to a policy
conditions. rule or exception.
Step 4 Add the additional Click Add to add the additional match condition to the policy rule or exception.
condition.
Once added, you can collapse and expand each condition in a rule or
exception.
Step 5 Configure the additional See “Configuring policy rules” on page 417.
condition.
See “Configuring policy exceptions” on page 426.
Step 6 Select the same or any If the condition supports component matching, specify where the data must
component to match. match to generate or except an incident.
Same Component – The matched data must exist in the same component
as the other condition(s) that also support component matching to trigger a
match.
Any Component – The matched data can exist in any component that you
have selected.
Step 6 Repeat this process to You can add as many conditions to a rule or exception as you need.
additional match conditions
All conditions in a single rule or exception must match to trigger an incident,
to the rule or exception.
or to trigger the exception.
Step 7 Save the policy. Click OK to close the rule or exception configuration screen.
■ Policy Note: To import a policy as a template, the policy name must be less than
■ Rule 60 characters, otherwise it does not appear in the Imported Templates
■ Exception list.
■ Group
■ Condition
■ Exact Data
■ Indexed Document
■ Vector Machine Learning
■ Form Recognition
■ Importing policies
■ Exporting policies
■ Cloning policies
■ Troubleshooting policies
Action Description
Modify a policy Click the policy name or edit icon to modify an existing policy.
Activate a policy Select the policy or policies you want to activate, then click Activate in the policy list
toolbar.
Make a policy inactive Select the policy or policies you want to make inactive, then click Suspend in the policy
list toolbar.
Note: By default, all solution pack policies are activated on installation of the solution
pack.
Sort policies Click any column header to sort the policy list.
Filter policies You can filter your policy list by Status, Name, Description, or Policy Group.
To filter your policy list, click Filter in the policy list toolbar, then select or enter your filter
criteria in the appropriate column or columns.
To remove filters from your policy list, click Clear in the policy list toolbar.
Remove a policy Select the policy or policies you want to remove, then click Delete in the policy list toolbar.
You can also click the red X icon at the end of the policy row to delete an individual
policy.
Note: You cannot remove a policy that has active incidents.
Import and export policies You can import and export policies using the Import and Export buttons in the policy
list toolbar.
Export and import policy You can export and import policy templates for reuse when authoring new policies.
templates
See “Importing policy templates” on page 441.
Action Description
Download policy details Click Download Details in the policy list toolbar to download details for the selected
policies in the Policy List. Symantec Data Loss Prevention exports the policy details
as HTML files in a ZIP archive. Open the archive to view and print policy details.
View and print policy details To view policy details for a single policy, click the printer icon at the end of the policy
row. To print the policy details, use the print feature of your web browser.
Clone a policy Select the policy or policies you want to clone, then click Clone in the policy list toolbar.
Assign policies to a policy You can assign individual or multiple policies to a policy group from the policy list page.
group
Select the policy or policies you want to assign to a policy group, then click Assign
Group in the policy list toolbar. Select the policy group from the drop-down list.
Table 21-2 lists and describes the display fields at the Policy List screen.
Column Description
Status The status column displays one of three states for the policy:
■ Misconfigured Policy:
The policy icon is a yellow caution sign.
See “Policy components” on page 370.
■ Active Policy:
The policy icon is green. An active policy can detect incidents.
■ Suspended Policy
The policy icon is red. A suspended policy is deployed but does not detect incidents.
Policy Group View and sort by the policy group to which the policy is deployed.
Column Description
Last Modified View and sort by the date the policy was last updated.
See “Policy authoring privileges” on page 375.
Action Description
Modify a policy group To modify an existing policy group, click the name of the group.
Remove a policy group Select the policy group then click Delete.
Note: If you delete a policy group, you delete any policies that are assigned to that group.
Find a policy group You can search for a policy group by applying entering a search term in the Search bar.
You can filter your results by Name, Description, or Servers by selecting the filter then
clicking Apply Filter.
View policies in a group To view the policies deployed to an existing policy group, navigate to the System > Servers
and Detectors > Policy Groups > Configure Policy Group screen.
Column Description
Column Description
Available Servers and The detection server or cloud detector to which the policy group is deployed.
Detectors
See “Policy deployment” on page 373.
Last Modified The date the policy group was last modified.
Note: The Policies in this Group section of the Polices Group screen lists all the policies in
the policy group. You cannot edit these entries. When you create a new policy group, this
section is blank. After you deploy one or more policies to a policy group (during policy
configuration), the Policies in this Group section displays each policy in the policy group.
Importing policies
You can export policies from an Enforce Server and import them to another Enforce Server.
This feature makes it easier to move policies from one environment to another. For example,
you can export policies from your test environment and import them into your production
environment.
■ When you import a policy, you can choose whether or not to import its response rules if
those rules conflict with existing response rules on the target system.
■ The Policy Import Preview page will display warnings about any policy elements that will
be created or overwritten when you import the policy.
■ You can only import one policy at a time.
To import a policy
1 Navigate to Manage > Policies > Policy List.
2 Click Import.
The Import Policy page appears.
3 Click Browse to select the exported policy file you want to import.
4 Click Import Policy.
The Policy import preview page appears. This page will warn you of any policy elements
that may be overwritten when you import this policy. If the policy you are importing includes
any response rules among the elements that may be overwritten, you can exclude those
response rules from import on this page.
5 Click Proceed with import.
The policy is imported. If the policy has any unresolved references, the Policy References
Check page appears.
You can resolve any unresolved policy references on this page.
See “About policy references” on page 438.
Policy group where no detection server is specified: Select detection servers for the policy group.
Directory connection with missing credentials: Provide the credentials for the directory connection.
EDM profile with missing source file and index: Specify the correct data source file.
IDM profile with missing import path and file name: Specify the correct data source.
Remote IDM profile with missing credentials: Provide the credentials for the remote IDM profile.
VML profile with trained profile and related data Provide the trained profile and its related data, train
missing: and accept the VML profile.
Form Recognition profile with missing gallery ZIP Provide the gallery ZIP archive.
archive:
Endpoint quarantine response rule with missing Provide the credentials for the endpoint quarantine
saved credentials: response rule.
Response rule with a missing Server FlexResponse Deploy the Server FlexResponse JAR file on the
plug-in: target system.
Exporting policies
You can export your policy data to an XML file to easily share policies between Enforce Servers.
■ Policy rules, including Form Recognition, EDM, IDM, and VML definitions
■ Endpoint locations and devices
■ Sender and recipient patterns
■ Response rules
■ Data identifiers
■ Custom protocols
Exported policies do not include the following items:
■ Credentials
■ Form Recognition, EDM, IDM, or VML indexes
■ Form Recognition, EDM or IDM data source files
■ VML training files
■ FlexResponse plug-ins
To export policies
1 Navigate to Manage > Policies > Policy List.
2 Take one of the following actions:
■ To export a single policy, click the export icon for that policy.
■ To export multiple policies to a ZIP archive, select the policies you want to export, then
click Export.
3 Symantec Data Loss Prevention exports your policy or policies using the following naming
conventions:
■ For single policies, the naming convention is
ENFORCEHOSTNAME-POLICYNAME-DATE-TIME.XML.
Cloning policies
You can clone policies from the Policy List page.
Cloned policies are exact copies of the original policy. They include the following items:
■ Modified policy name, description, and policy group.
Cloned policies appear in the Policy List as Copy N of original policy name.
■ Policy rules, including Form Recognition, EDM, IDM, and VML definitions
Administering policies 441
Importing policy templates
For information about importing and exporting policies and policy templates, see these topics:
See “Exporting policies” on page 439.
See “Importing policies” on page 437.
See “Exporting policy detection as a template” on page 442.
See “Importing policy templates” on page 441.
Note: Smart response rules are executed manually and are not deployed with policies.
3 Select the response rule you want to add from those available in the drop-down menu.
Policies and response rules are configured separately. To add a response rule to a policy,
the response rule must first be defined and saved independently.
See “Implementing response rules” on page 1758.
4 Click Add Response Rule to add the response rule to the policy.
5 Repeat the process to add additional response rules to the policy.
6 Save the policy when you are done adding response rules.
7 Verify that the policy status is green after adding the response rule to the policy.
See “Manage and add policies” on page 432.
Note: If the policy status is a yellow caution sign, the policy is misconfigured. The system does
not support certain pairings of detection rules and automated response rule actions. See
Table 81-2 on page 2276.
Remove a If you attempt to delete a policy that has If you want to delete a policy, you must first delete all
policy associated incidents, the system does incidents that are associated with that policy from the
not let you remove the policy. Enforce Server.
Table 21-6 Guidelines for removing policies and policy groups (continued)
Remove a If you attempt to delete a policy group Before you delete a policy group, remove any policies from
policy group that contains one or more policies, the that group by either deleting them or assigning them to
system displays an error message. And, different policy groups.
the policy group is not deleted.
See “Manage and add policy groups” on page 435.
contains the policy name, description, status, policy group, and last modified date of all selected
policies in the download, as well as links to the policy details.
You must have the Author Policies privilege for the policies you want to download.
See “Policy authoring privileges” on page 375.
See “Viewing, printing, and downloading policy details” on page 379.
To download policy details
1 Navigate to Manage > Policies > Policy List, select the policy or policies you want, then
click Download Details.
2 In the Open File dialog box, click select Save File, then click OK.
3 To view details for a policy, extract the files from the ZIP archive, then open the file you
want to view. Use the index file to search through the downloaded policies by policy name,
description, status, policy group, or last modified date.
The Policy Snapshot screen appears.
4 To print the policy details, use the Print command in your web browser from the Policy
Snapshot screen.
Troubleshooting policies
Table 21-7 lists log files to consult for troubleshooting policies.
SymantecDLPDetectionServer.log Logs when policies and profiles are sent from the Enforce Server to
detection servers and endpoint servers. Displays JRE errors.
FileReader.log Logs when an index file is loaded into memory. For EDM, look for the
line "loaded database profile." For IDM look for the line: "loaded
document profile."
Indexer.log Logs the operations of the Indexer process to generate EDM and IDM
indexes.
Table 21-8 Reindexing requirements for EDM and IDM data profiles
Exact Data Matching (EDM) If you have existing Exact Data profiles supporting See “Updating EDM indexes to the
EDM policies and you want to use new EDM latest version” on page 574.
■ Multi-token matching
features, before upgrading the detection server(s)
■ Proportional proximity
you must:
range
■ Reindex each structured data source using
the latest EDM indexer, and
■ Load each index into a newly-generated Exact
Data profile.
Table 21-9 Policy templates updated in Data Loss Prevention version 12.5
General Data Protection Data identifiers This policy protects personal identifiable information
Regulations (Banking and related to banking and finance.
Keyword lists
Finance)
See “General Data Protection Regulation (Banking
and Finance)” on page 1583.
General Data Protection Data identifiers This policy protects personal identifiable information
Regulation (Digital Identity) related to digital identity.
Keyword lists
See “General Data Protection Regulation (Digital
Identity)” on page 1617.
General Data Protection Data identifiers This policy protects personal identifiable information
Regulation (Government related to government identification.
Keyword lists
Identification)
See “General Data Protection Regulation
(Government Identification)” on page 1618.
General Data Protection Data identifiers This policy protects personal identifiable information
Regulation (Healthcare and related to healthcare and insurance.
Keyword lists
Insurance)
See “General Data Protection Regulation (Healthcare
and Insurance)” on page 1656.
Administering policies 448
Updating policies after upgrading to the latest version
Table 21-9 Policy templates updated in Data Loss Prevention version 12.5 (continued)
General Data Protection Data identifiers This policy protects personal identifiable information
Regulation (Personal Profile) related to personal profile data.
Keyword lists
See “General Data Protection Regulation (Personal
Profile)” on page 1672.
General Data Protection Data identifiers This policy protects personal identifiable information
Regulation (Travel) related to travel.
Keyword lists
See “General Data Protection Regulation (Travel)”
on page 1675.
Chapter 22
Best practices for authoring
policies
This chapter includes the following topics:
■ Use the appropriate match condition for your data loss prevention objectives
Develop a policy strategy that supports your data security See “Develop a policy strategy that supports your data
objectives. security objectives” on page 451.
Use a limited number of policies to get started. See “Use a limited number of policies to get started”
on page 451.
Use policy templates but modify them to meet your See “Use policy templates but modify them to meet your
requirements. requirements” on page 452.
Use policy groups to manage policy lifecycle. See “Use policy groups to manage policy lifecycle”
on page 457.
Use the appropriate match condition for your data loss See “Use the appropriate match condition for your data
prevention objectives. loss prevention objectives” on page 452.
Test and tune policies to improve match accuracy. See “Test and tune policies to improve match accuracy”
on page 453.
Start with high match thresholds to reduce false positives. See “Start with high match thresholds to reduce false
positives” on page 454.
Use a limited number of exceptions to narrow detection See “Use a limited number of exceptions to narrow
scope. detection scope” on page 455.
Use compound conditions to improve match accuracy. See “Use compound conditions to improve match
accuracy” on page 455.
Author policies to limit the potential effect of two-tier See “Author policies to limit the potential effect of two-tier
detection. detection” on page 456.
Follow detection-specific best practices. See “Follow detection-specific best practices” on page 457.
Best practices for authoring policies 451
Develop a policy strategy that supports your data security objectives
Approach Description
Information-driven With this approach you start by identifying specific data items and data combinations you
want to protect. Examples of such data may include fields profiled from a database, a list of
keywords, a set of users, or a combination of these elements. You then group similar data
items together and create policies to identify and protect them. This approach works best
when you have limited access to the data or no particular concerns about a given regulation.
Regulation-driven With this approach you begin with a policy template based on the regulations with which you
must comply. Examples of such templates may include HIPAA or FACTA. Also, begin with
a large set of data (such as customer or employee data). Use the high-level requirements
stipulated by the regulations as the basis for this approach. Then, decide what sensitive data
items and documents in your enterprise meet these requirements. These data items become
the conditions for the detection rules and exceptions in your policies.
requirements. Having too many policies can impact the performance of the system and can
lead to too many false positives.
See “Test and tune policies to improve match accuracy” on page 453.
Words and phrases, such as "Confidential" or Keywords Exact words, phrases, proximity
"Proprietary"
Network and endpoint communications Protocol and Endpoint Protocols, destinations, monitoring
Determined by the identity of the user, sender, Synchronized DGM Exact identity from LDAP server
recipient
Profiled DGM Exact profiled identity
Describes a document, such as author, title, date, Content-based conditions File type metadata
etc.
As your policies mature, it is important to continuously test and tune them to ensure ongoing
accuracy.
See “Follow detection-specific best practices” on page 457.
False positives Policy rules too False positives create high costs in time and resources that are required to
general or broad investigate and resolve apparent incidents that are not actual incidents. Since
many organizations do not have the capacity to manage excess false positives,
it is important that your policies define contextual rules to improve accuracy.
False Policy rules too False negatives obscure gaps in security by allowing data loss, the potential for
negatives tight or narrow financial losses, legal exposure, and damage to the reputation of an organization.
False negatives are especially dangerous because you do not know you have
lost sensitive data.
For example, a policy that contains a keyword match on the word "confidential"
but also contains a condition that excludes all Microsoft Word documents would
be too narrow and be suspect to false negatives because it would likely miss
detecting many actual incidents contained in such documents
See “Start with high match thresholds to reduce false positives” on page 454.
See “Use a limited number of exceptions to narrow detection scope” on page 455.
See “Use compound conditions to improve match accuracy” on page 455.
Caution: Too many compound exceptions in a policy can cause system performance issues.
You should avoid the use of compound exceptions as much as possible.
It is important to understand how exception conditions work so you can use them properly.
Exception conditions disqualify messages from creating incidents. Exception conditions are
checked first by the detection server before match conditions. If the exception condition matches,
the system immediately discards the entire message or message component that met the
exception. There is no support for match-level exceptions. Once the message or message
component is discarded by meeting an exception, the data is no longer available for policy
evaluation.
See “Exception conditions” on page 393.
See “Use compound conditions to improve match accuracy” on page 455.
Exact Data Matching (EDM) For EDM policies, consider including Data Identifier rules OR'd with EDM rules.
For example, for a policy that uses an EDM condition to match social security
numbers, you could add a second rule that uses the SSN Data Identifier condition.
The Data Identifier does not require two-tier detection and is evaluated locally by
the DLP Agent. If the DLP Agent is not connected to the Endpoint Server when
the DLP Agent receives the data, the DLP Agent can still perform SSN pattern
matching based on the Data Identifier condition.
See “Combine Data Identifiers with EDM rules to limit the impact of two-tier
detection” on page 610.
For example policy configurations, each of the policy templates that provide EDM
conditions also provide corresponding Data Identifier conditions.
Indexed Document Matching For IDM policies that match file contents, consider using VML rules OR'd with IDM
(IDM) rules. VML rules do not require two-tier detection and are executed locally by the
DLP Agent. If you do not need to match file contents exactly, you may want to use
VML instead of IDM.
See “Use the appropriate match condition for your data loss prevention objectives”
on page 452.
If you are only concerned with file matching, not file contents, consider using
compound file property rules instead of IDM. File property rules do not require
two-tier detection.
See “Use compound file property rules to protect design and multimedia files”
on page 909.
Directory Group Matching (DGM) For the synchronized DGM Recipient condition, consider including a Recipient
Matches Pattern condition OR'd with the DGM condition. The pattern condition
does not require two-tier detection and is evaluated locally by the DLP Agent.
Data identifiers See “Best practices for using data identifiers” on page 833.
Keywords See “Best practices for using keyword matching” on page 849.
Regular expressions See “Best practices for using regular expression matching” on page 855.
Non-English language See “Best practices for detecting non-English language content” on page 867.
detection
File properties See “Best practices for using file property matching” on page 909.
Network protocols See “Best practices for using network protocol matching” on page 914.
Endpoint events See “Best practices for using endpoint detection” on page 923.
Described identities See “Best practices for using described identity matching” on page 932.
Synchronized DGM See “Best practices for using synchronized DGM” on page 941.
Profiled DGM See “Best practices for using profiled DGM” on page 946.
Metadata detection See “Best practices for using metadata detection” on page 991.
Chapter 23
Increasing the Inspection
Content Size
This chapter includes the following topics:
EDAR 150 MB
Discover
Discover Sharepoint 2 GB
Web Prevent
Increasing the maximum inspection size limit for files means that larger files are inspected.
Inspection of larger files takes longer and requires more memory for the inspection to complete.
Also, timeout limits increase, so the detection engine takes longer to timeout in the case of
detection failures.
Depending on the content inspection size you choose, certain advanced settings are
automatically adjusted. The Inspection Content Size feature only shows the inspection size
options that you can enable based on your existing system memory.
Note: To complete the update, you must restart the service after you have increased the
maximum inspection size limit using the slider or edited any properties files.
The behavior of the "Increasing the maximum inspection size limit" feature is enabled or
disabled depending on many factors:
■ For a new detection server, the slider is disabled by default and the box is not checked.
■ For a new Agent, the slider is enabled at 30 MB by default and the box is checked.
■ Memory limits on the server are different from memory limits on the agent.
■ You cannot use the slider to increase the maximum inspection size limit if the detection
server is not connected an Enforce Server.
Note: The maximum inspection size limit for the DLP cloud services is not
customer-configurable. These limits are enumerated in the Service Description for the DLP
cloud services. This feature is only available for detection servers, appliances, and the DLP
Agent.
Increasing the Inspection Content Size 461
Increasing the inspection content size
Table 23-2 System Events for changes in Advanced Settings for larger files.
Table 23-2 System Events for changes in Advanced Settings for larger files. (continued)
If you choose a setting of 500 MB or greater on the detection server, Symantec recommends
that you enable external storage for incident attachments (blob externalization). To enable
external storage for incident attachments during installation or upgrade, see "External storage
for incident attachments,” in the Symantec Data Loss Prevention Installation Guide and
Symantec Data Loss Prevention Upgrade Guide. You can find the Symantec Data Loss
Prevention Installation Guide at the Symantec Support Center at
https://www.symantec.com/docs/doc9257.html. You can find the Symantec Data Loss
Prevention Upgrade Guide at the Symantec Support Center at
https://www.symantec.com/docs/doc9258.html.
To enable external storage for incident attachments after installation or upgrade, see "About
the incident attachment external storage directory" in the Symantec Data Loss Prevention
System Maintenance Guide. You can find the Symantec Data Loss Prevention System
Maintenance Guide at the Symantec Support Center at
https://www.symantec.com/docs/doc9267.html.
Chapter 24
Installing remote indexers
This chapter includes the following topics:
Note: The indexer that is available on the Enforce Server administration console does not
require separate installation. It is installed when you install the Enforce Server.
If you install a remote indexer on Windows, you can perform a Silent Mode installation, or you
run the graphical user interface method to install.
See “Installing a remote indexer on Windows” on page 464.
On Linux, you install RPM files, then you configure the installation. You can configure the
installation using the Silent Mode method or by running a command prompt to enter
configuration parameters.
See “Installing a remote indexer on Linux” on page 466.
You can install the Remote EDM, the Remote EMDI, and the Remote IDM Indexer on all
supported Windows and Linux platforms. See the Symantec Data Loss Prevention System
Requirements Guide for platform details.
Installing remote indexers 464
Installing a remote indexer on Windows
Note: You must be logged on as administrator (Windows) or root (Linux) to install the remote
indexers. There is an issue with the permissions that are needed to run the remote indexers.
You need to follow a workaround procedure to assure that users other than administrator or
root can run the remote indexers.
Note: The following instructions assume that the indexer installer (Indexers.msi) has been
copied from the Enforce Server to a local directory on the remote computer. The Indexers.msi
file is included in your software download (DLPDownloadHome) directory. It should have been
copied to a local directory on the Enforce Server during the Enforce Server installation process.
Using the graphical user interface method to install does not generate log information. To
generate log information, run the installation using the following command:
C:\msiexec /i Indexers.msi /L*v c:\indexers_install.log
You can complete the installation using Silent Mode. Enter values with information specific to
your installation for the following:
Command Description
C:\ProgramData\Symantec\DataLossPrevention
\Indexer\.
Table 24-1 Indexer Silent Mode installation parameters for Windows (continued)
Command Description
The following is an example of what the completed command might look like:
Note: Using the graphical user interface method to install does not generate log information.
To generate log information, run the installation using the following command:
C:\msiexec /i Indexers.msi /L*v c:\indexer_install.log
Symantec recommends that you use the default destination directory. References to the
"installation directory" in Symantec Data Loss Prevention documentation are to this default
location.
7 In the JRE Directory panel, accept the default JRE location (or click Browse to locate
it), and click Next.
8 In the FIPS Cryptography Mode panel, select whether to disable or enable FIPS
encryption.
9 Click Next.
10 Click Install.
See “About the Remote EDM Indexer” on page 586.
Installing remote indexers 466
Installing a remote indexer on Linux
Note: The following instructions assume that the Indexers.zip file has been copied into the
/opt/temp/ directory on the server computer.
6 Run the following command to install all RPM files in the folder:
rpm -ivh *.rpm
Command Description
The following is an example of what the completed command might look like:
./IndexersConfigurationUtility -silent
-jreDirectory=/opt/Symantec/DataLossPrevention/Server\ JRE/1.8.0_181/
-fipsOption=Disabled
2 Run the remote indexer configuration utility. Use the following command to launch the
utility:
./IndexersConfigurationUtility
■ EMDI Troubleshooting
Before you proceed with EMDI, it's important for you to have a good understanding of data
identifiers and how they are used in Symantec Data Loss Prevention.
See “About using EMDI to protect content” on page 469.
EMDI EDM
EMDI can support EDM detection scenarios that involve matching There is no requirement that EDM
against two or more columns of a data source when at least one of must match against a column that
those columns matches a data identifier. EMDI supports both system can be represented by a data
and custom data identifiers. identifier.
EMDI scans an entire data source, within the stated limits. By default, EDM scans only the first
30,000 tokens for inspected
content, though this limit can be
increased.
EMDI performs matching locally on the DLP Agent, so there is no EDM is only available on the DLP
need to implement two-tier detection. Agent in two-tier detection mode.
Available on all channels, including detection servers, appliances, EDM is available on detection
the cloud, and DLP Agents (including disconnected DLP Agents). servers, appliances, and the cloud.
EDM is only available on the
endpoint in two-tier detection mode.
Supports blocking, user notification, and encryption on the DLP EDM is only available on the DLP
Agent. Agent in two-tier detection mode.
When operating in two-tier detection
mode, the DLP Agent does not
support synchronous response
actions such as blocking, user
notification, or encryption.
Detecting content using Exact Match Data Identifiers (EMDI) 472
Introducing Exact Match Data Identifiers (EMDI)
EMDI EDM
The memory footprint for EMDI is 1/5 of the memory footprint for EDM memory footprint is about 5
EDM for the same indexed data source. times that of the memory footprint
for EMDI.
EMDI supports up to 4 million rows x 32 columns per index up to EDM supports hundreds of millions
128 million cells per index. of rows x 32 columns up to 6 billion
cells per index.
EMDI has a stringent security model that makes it suitable for profile EDM profiles are never deployed
deployment on the DLP Agent. on the DLP Agent.
There is no natural language processing for Chinese, Japanese, EDM supports natural language
and Korean for EMDI matching. processing for Chinese, Japanese,
and Korean.
You can use either EMDI or EDM for some exact matching cases that have at least two source
columns and where one column has values that can be expressed with a data identifier. The
following recommendations detail when it is better to use EMDI rather than EDM, and vice
versa.
See “About the Exact Match Data Identifier profile and index” on page 473.
The data source file must contain at least one key column that contains largely unique values
that can be expressed as a data identifier. The parameters affecting the uniqueness of the
key columns can be edited in the Indexer.properties file located at \Program
Files\Symantec\Data Loss
Prevention\EnforceServer\15.5\Protect\config\Indexer.properties (Windows)
or/Symantec/DataLossPrevention/EnforceServer/15.5/Protect/config/Indexer.properties
(Linux).
Non-configurable limits for EMDI: The same value can appear no more than five times in a
key column in a given EMDI index. This is a different number than
EMDI.MaxDuplicateCellsPercentage, which instead indicates the total number of duplicates
in the index.
See “Best practices for using EMDI” on page 517.
Note: The format for the data source file should be a text-based format using commas,
semicolons, pipes, or tabs as delimiters. You should avoid using a spreadsheet format for the
data source file (such as XLS or XLSX) because such programs use scientific notation to
render numbers.
See “About cleansing the Exact Match Data Identifier source file” on page 474.
1 Prepare the data source file for indexing. See “Preparing the Exact Match Data Identifier
source for indexing” on page 478.
2 Ensure that you have specified a key See “About EMDI and key columns” on page 470.
column that can be matched by a highly
variable data identifier. Ensure that the
key column contains reasonably unique
data.
4 Remove incomplete and duplicate See “About cleansing the Exact Match Data Identifier
records. Do not fill empty cells with fake source file” on page 474.
data.
5 Remove improper characters. See “Remove ambiguous character types from the
EMDI data source file” on page 520.
6 Verify that the data source file is below See “Preparing the Exact Match Data Identifier
the error threshold. The error threshold source for indexing” on page 478.
is the maximum percentage of rows that
contain errors before indexing stops.
1 Create the data source file. Export the source data from the database (or other data repository) to
a tabular text file with delimited fields.
See “About the Exact Match Data Identifier source file” on page 473.
See “Creating the Exact Match Data Identifier source file” on page 477.
2 Prepare the data source file for Cleanse the data source file.
indexing.
See “Cleanse the EMDI data source file of blank columns and duplicate
rows” on page 519.
3 Upload the data source file to the You can copy or upload the data source file to the Enforce Server, or
Enforce Server. access it remotely.
See “Uploading the Exact Match Data Identifier source files to the
Enforce Server” on page 480.
4 Edit an existing data identifier or See “Adding an EMDI check to a built-in or custom data identifier
create a new custom data condition in a policy” on page 487.
identifier to add EMDI as a
validator.
5 Create an Exact Match Data An Exact Match Data Identifier profile is required to use Exact Match
Identifier profile. Data Identifier matching. The Exact Match Data Identifier profile
specifies the data source, data field types, and the indexing schedule.
See “Creating and modifying the Exact Match Data Identifier profiles”
on page 483.
Detecting content using Exact Match Data Identifiers (EMDI) 477
Configuring Exact Match Data Identifier profiles
6 Mark each column in the data Use the slider to mark each index column (data source field) as Ignore,
source as Ignore, Optional, or Optional, or Required. Each index must contain at least one required
Required, in the data source. ("key") column that is mapped to a system data identifier or custom
data identifier. It must also contain at least one optional column.
See “Creating and modifying the Exact Match Data Identifier profiles”
on page 483.
7 Enable the policy as an Exact After the policy is created, it must be enabled as an Exact Match Data
Match Data Identifier check. Identifier Check for data identifier validation.
8 Index the data source, or Schedule the indexing to keep the index in sync with the data source.
schedule indexing.
See “About EMDI index scheduling” on page 475.
See “Creating the Exact Match Data Identifier source file” on page 477.
Table 25-5 Create the exact match data identifier source file
Step Description
1 Export the data you want to protect from a database or other tabular data format, such as an Excel
spreadsheet, to a tabular text file. The data source file you create must be a tabular text file that contains
rows of data from the original source. Each row from the original source is included as a row in the data
source file. Delimit columns using a tab, a comma, a semi-colon, or a pipe. Pipe is preferred. Comma
should not be used if your data source fields contain numbers.
The data source file cannot exceed 32 columns or 4 million rows. If you plan to upload the data source
file to the Enforce Server, browser capacity limits the data source size to 2 GB. For file sizes larger than
this size you can copy the file to the Enforce Server using FTP/S, SCP, SFTP, CIFS, or NFS.
Detecting content using Exact Match Data Identifiers (EMDI) 478
Configuring Exact Match Data Identifier profiles
Table 25-5 Create the exact match data identifier source file (continued)
Step Description
2 For all EMDI implementations, make sure that the data source contains at least one column of unique
data values (Required column) and one Optional column. Three or more columns (including one Required
column) are recommended.
3 Prepare the exact match data identifier source file for indexing.
See “Preparing the Exact Match Data Identifier source for indexing” on page 478.
See See “Preparing the Exact Match Data Identifier source for indexing” on page 478. for
instructions.
The following data fields are often unique: The following data fields are not unique:
When you index an EMDI profile, the Enforce Server keeps track of empty cells and any
misplaced data which count as errors. For example, an error may be a name that appears in
a column for phone numbers. Errors can constitute a certain percentage of the data in the
profile (five percent, by default). If this default error threshold is met, Symantec Data Loss
Prevention stops indexing. It then displays an error to warn you that your data may be
unorganized or corrupted.
To prepare the exact match data identifier source for EMDI indexing
1 Make sure that the data source file is formatted as follows:
■ The data source must have at least two columns and at least one column that can be
mapped to a data identifier. One of the columns should contain unique values. For
example, credit card numbers, driver’s license numbers, or account numbers (as
opposed to first and last names, which are generic).
See “Ensure data source has at least one column of unique data (EDM)” on page 602.
■ Verify that you have delimited the data source using commas, pipes ( | ), tabs, or
semicolons. If the data source file uses commas as delimiters, remove any commas
that do not serve as delimiters.
See “Do not use the comma delimiter if the data source has number fields (EDM)”
on page 605.
■ Verify that data values are not enclosed in quotes.
■ Remove single-character and abbreviated data values from the data source. For
example, remove the column name and all values for a column in which the possible
values are Y and N. You should also remove values such as "CA" for California, or
other abbreviations for states.
■ Remove columns with frequently repeating values.
■ Optionally, remove any columns that contain numeric values with fewer than five digits,
as these can cause false positives in production deployments.
See “Remove ambiguous character types from the data source file (EDM)” on page 604.
■ A field delimiter should not appear in a field value.
■ Eliminate duplicate records.
See “Cleanse the data source file of blank columns and duplicate rows (EDM)”
on page 603.
2 Once you have prepared the exact match data identifier source file, proceed with the next
step in the EMDI process: upload the exact data source file to the Enforce Server for
profiling the data you want to protect.
See “Uploading the Exact Match Data Identifier source files to the Enforce Server” on page 480.
Detecting content using Exact Match Data Identifiers (EMDI) 480
Configuring Exact Match Data Identifier profiles
Uploading the Exact Match Data Identifier source files to the Enforce
Server
After you have prepared the data source file for indexing, load it to the Enforce Server so the
data source can be indexed.
See “Creating and modifying the Exact Match Data Identifier profiles” on page 483.
Listed here are the options you have for making the data source file available to the Enforce
Server. Consult with your database administrator to determine the best method for your needs.
Table 25-7 Uploading the exact match data identifier source file to the Enforce Server for
indexing
Upload Data Source Data source If you have a smaller data source file (less than 50 MB), upload the data source
to Server Now file is less than file to the Enforce Server using the Enforce Server administration console.
50 MB. When creating the Exact Match Data Identifier Profile, you can specify the
file path or browse to the directory and upload the data source file.
Note: Due to browser capacity limits, the maximum file size that you can upload
is 2 GB. However, uploading any file over 50 MB is not recommended, since
files over this size can take a long time to upload. If your data source file is
over 50 MB, consider copying the data source file to the datafiles directory
using the next option.
Reference Data Data source If you have a large data source file (over 50 MB), copy it to the datafiles
Source on Manager file is over 50 directory on the host where the Enforce Server is installed.
Host MB.
On Windows this directory is located at
C:\ProgramData\Symantec\DataLossPrevention
\ServerPlatformCommon\15.5\Protect\datafiles.
/var/Symantec/DataLossPrevention/
ServerPlatformCommon/15.5/datafiles.
This option is convenient because it makes the data file available through a
drop-down list during configuration of the Exact Match Data Identifier Profile.
If it is a large file, use a third-party solution (such as Secure FTP) to transfer
the data source file to the Enforce Server.
Note: Ensure that the Enforce Server user (usually called "protect") has modify
permissions (on Windows) or rw permissions (on Linux) for all files in the
datafiles directory.
Detecting content using Exact Match Data Identifiers (EMDI) 481
Configuring Exact Match Data Identifier profiles
Table 25-7 Uploading the exact match data identifier source file to the Enforce Server for
indexing (continued)
Use This File Name Data source You may want to create an EMDI profile before you have created the exact
file is not yet match data identifier source file. In this case you can create a profile template
created. and specify the name of the data source file you plan to create. This option lets
you define EMDI policies using the EMDI profile template before you index the
data source. The policies do not operate until the data source is indexed.
When you have created the data source file you place it in the
\ProgramData\Symantec\DataLossPrevention
\ServerPlatformCommon\15.5\Protect\datafiles
directory on Windows or
/var/Symantec/DataLossPrevention/
ServerPlatformCommon/15.5/Protect/datafiles
on Linux and index the data source immediately on save or schedule indexing.
See “Creating and modifying the Exact Match Data Identifier profiles”
on page 483.
Detecting content using Exact Match Data Identifiers (EMDI) 482
Configuring Exact Match Data Identifier profiles
Table 25-7 Uploading the exact match data identifier source file to the Enforce Server for
indexing (continued)
Use This File Name Data source is In some environments it may not be secure or feasible to copy or upload the
to be indexed data source file to the Enforce Server. In this situation you can index the data
and
remotely and source remotely using the Remote EMDI Indexer.
Load Externally copied to the
See “Remote EMDI indexing” on page 504.
Generated Index Enforce
Server. This utility lets you index an exact match data identifier source on a computer
other than the Enforce Server host. This feature is useful when you do not want
to copy the data source file to the same computer as the Enforce Server. As
an example, consider a situation where the originating department wants to
avoid the security risk of copying the data to an extra-departmental host. In
this case you can use the Remote EMDI Indexer.
First you create an EMDI profile template where you choose the Use this File
Name and the Number of Columns options. You must specify the name of
the exact match data identifier source file and the number of columns it contains.
See “Creating an EMDI profile template for remote indexing” on page 508.
You then use the Remote EMDI Indexer to remotely index the data source and
copy the index files to the Enforce Server host and load the externally generated
index. The Load Externally Generated Index option is only available after
you have defined and saved the profile. Remote indexes are loaded on Windows
from these directories:
\ProgramData\Symantec\DataLossPrevention
\EnforceServer\15.5\Protect\index
/var/Symantec\DataLossPrevention/EnforceServer/15.5/Protect/index
See “Uploading the Exact Match Data Identifier source files to the Enforce
Server” on page 480.
Policies > Data Identifiers page or on the Manage > Data Profiles > Exact Data > Add
Exact Match Data Identifier Profile page.
See “Creating and modifying the Exact Match Data Identifier profiles” on page 483.
Note: If you use the Remote EMDI Indexer to generate the Exact Match Data Identifier profile,
refer to See “Creating an EMDI profile template for remote indexing” on page 508.
See “Uploading the Exact Match Data Identifier source files to the Enforce Server”
on page 480.
■ Use This File Name
Select this option if you have not yet created the data source file but want to configure
EMDI policies using a placeholder EMDI profile. Enter the file name of the data source
you plan to create, including the Number of Columns it is to have. When you do
create the data source, you must copy it to the datafiles directory.
Note: Use this option with caution. Be sure to remember to create the data source file
and copy it to the datafiles directory. Name the data source file exactly the same
as the name you enter here and include the exact number of columns you specify
here.
7 If the first row of your data source contains Column Names, select Read first row as
column names.
8 Specify the Error Threshold, which is the maximum percentage of rows that contain
errors before indexing stops.
A data source error is either an empty cell, a cell with the wrong type of data, or extra
cells in the data source. For example, a name in a column for phone numbers is an error.
If errors exceed a certain percentage of the overall data source (by default, 5%), the
system quits indexing and displays an indexing error message. The index is not created
if the data source has more invalid records than the error threshold value allows. Although
you can change the threshold value, more than a small percentage of errors in the data
source can indicate that the data source is corrupt, is in an incorrect format, or cannot be
read. If you have a significant percentage of errors (10% or more), stop indexing and
cleanse the data source.
See “Preparing the Exact Match Data Identifier source for indexing” on page 478.
9 Select the Column Separator Char (delimiter) that you have used to separate the values
in the data source file. The delimiters you can use are tabs, commas, semicolons, or
pipes.
Detecting content using Exact Match Data Identifiers (EMDI) 485
Configuring Exact Match Data Identifier profiles
10 Select one of the following encoding values for the content to analyze, which must match
the encoding of your data source:
■ ISO-8859-1 (Latin-1) (default value)
Standard 8-bit encoding for Western European languages using the Latin alphabet.
■ UTF-8
Use this encoding for all languages that use the Unicode 4.0 standard (all single- and
double-byte characters), including those in East Asian languages.
■ UTF-16
Use this encoding for all languages that use the Unicode 4.0 standard (all single- and
double-byte characters), including those in East Asian languages.
Note: Make sure that you select the correct encoding. The system does not prevent you
from creating an EMDI profile using the wrong encoding. The system only reports an error
at run-time when the EMDI policy attempts to match inbound data. To make sure that you
select the correct encoding, after you click Next, verify that the column names appear
correctly. If the column names do not look correct, you chose the wrong encoding.
11 Click Next to go to the second Add Exact Match Data Identifier Profile screen.
See “Scheduling EMDI profile indexing” on page 485.
■ Monitor results and modify your indexing schedule accordingly. If performance is good and
you want more timely updates, schedule more frequent data updates and indexing.
The Indexing section lets you index the Exact Match Data Identifier profile as soon as you
save it (recommended). You can also index on a regular schedule as follows:
Table 25-8 Scheduling indexing for Exact Match Data Identifier Profiles
Parameter Description
Submit Indexing Select this option to index the Exact Match Data Identifier profile.
Job on Save
Submit Indexing Select this option to schedule an indexing job. The default option is No Regular Schedule. If you
Job on Schedule want to index according to a schedule, select a desired schedule period, as described.
Index Once On – Enter the date to index the document profile in the format MM/DD/YY. You can also click the
date widget and select a date.
Until – Select this check box to specify a date in the format MM/DD/YY when the indexing should
stop. You can also click the date widget and select a date.
Index Weekly Day of the week – Select the day(s) to index the document profile.
Until – Select this check box to specify a date in the format MM/DD/YY when the indexing should
stop. You can also click the date widget and select a date.
Index Monthly Day – Enter the number of the day of each month you want the indexing to occur. The number
must be 1 through 28.
Until – Select this check box to specify a date in the format MM/DD/YY when the indexing should
stop. You can also click the date widget and select a date.
See “Associating data identifiers with your data source (EMDI)” on page 486.
3 Click Finish.
After Symantec Data Loss Prevention finishes indexing, it deletes the original data source
from the Enforce Server. After you index a data source, you cannot change its schema.
If you change column designations for a data source after you index it, you must create
a new EMDI profile.
You can add Exact Match Data Identifier validators to existing data identifier policies.
See “Adding an EMDI check to a built-in or custom data identifier condition in a policy”
on page 487.
the EMDI index. If the Required column matches and there are enough Optional column
matches within the proximity window, then an EMDI match is generated.
A multi-token cell is a cell in the index that contains multiple words separated by spaces,
leading or trailing punctuation, or alternative Latin and Chinese, Japanese, or Korean language
characters. The sub-token parts of a multi-token cell obey the same rules as single-token cells:
they are normalized according to their pattern where normalization can apply. Messages and
files that are inspected must match a multi-token cell exactly, including whitespace and
punctuation (assuming the default settings).
For example, an indexed cell containing the string "Bank of America" is a multi-token comprising
three sub-token parts. During detection, "bank of america" (normalized) matches the multi-token
cell, but "bank america" does not.
See “Characteristics of multi-token cells for EMDI” on page 489.
Characteristic Description
The number of tokens in a single cell is limited to 100 With CJK tokens, each character is treated as a single
tokens. token and the number of CJK characters is limited to 100.
If more than 100 tokens are found in a single cell during
indexing, indexing is terminated.
Whitespace in Latin multi-token cells is considered, but See “Multi-token with spaces for EMDI” on page 490.
multiple white spaces are normalized to 1.
Punctuation immediately preceding and following a token See “Multi-token with punctuation for EMDI” on page 491.
or sub-token is always ignored.
See “Additional examples for multi-token cells with
punctuation for EMDI” on page 492.
For proximity range checking the sub-token parts of a See “Proximity matching example for EMDI” on page 496.
multi-token are counted as single tokens.
Cell contains space. Bank of America Bank of America Cell with spaces is
multi-token.
Cell contains multiple Bank of America Bank of America Multiple spaces are
spaces. normalized to one.
Cells contain space between EMDI 傠傫 EMDI 傠傫 White spaces between Latin
Latin and CJK characters. and CJK characters are
EMDI傠傫
ignored.
See “Multi-token with mixed language characters for EMDI” on page 490.
Table 25-11 Multi-token cell with Latin and CJK characters examples for EMDI
Cell includes Latin and CJK ABC傠傫 ABC傠傫 Mixed Latin-CJK cell is
characters with no spaces. multi-token.
傠傫ABC 傠傫ABC
Whitespace between Latin
Also matches with:
and CJK characters is
ABC 傠傫 ignored.
傠傥 ABC
Table 25-11 Multi-token cell with Latin and CJK characters examples for EMDI (continued)
Cell includes Latin and CJK ABC 傠傫 ABC 傠傫 Multiple spaces are ignored.
with one or more spaces.
傠傥 ABC 傠傥 ABC
ABC傠傫
傠傫ABC
The WIP setting operates at detection-time to alter how matches are reported. For most EMDI
policies you should not change the WIP setting. For a few limited situations, such as account
numbers or addresses, you may need to set IncludePunctuationInWords = false depending
on your detection requirements.
See “Multi-token punctuation characters (EDM)” on page 569.
Table 25-12 lists and explains how multi-token matching works with punctuation.
Detecting content using Exact Match Data Identifiers (EMDI) 492
Using multi-token matching with EMDI
a.b a.b TRUE Yes The indexed content and the detected content are
exactly the same.
a.b ab TRUE No The indexed content and the detected content are
different.
ab a.b TRUE No The indexed content and the detected content are
different.
FALSE Yes The detected content is treated as "a b" and is therefore
a match.
ab ab TRUE Yes The indexed content and the detected content are
exactly the same.
FALSE Yes The indexed content and the detected content are
exactly the same.
See “Additional examples for multi-token cells with punctuation for EMDI” on page 492.
Table 25-13 Additional use cases for multi-token cells with punctuation for EMDI
Cell contains a physical 346 Guerrero St., Apt. #2 346 Guerrero St., Apt. #2 The indexed content is a
address with punctuation. multi-token cell.
346 Guerrero St Apt 2
Both match because the
punctuation comes at the
beginning or end of the
sub-token parts and is
therefore ignored.
Cell contains Asian 傠傫##傠傫 傠傫##傠傫 (if WIP true) The indexed content is a
language characters (CJK) single token cell.
with indexed internal
During detection, Asian
punctuation.
language characters (CJK)
with internal punctuation are
affected by the WIP setting.
Thus, in this example 傠傫
##傠傫 matches only if the
WIP setting is true.
Table 25-13 Additional use cases for multi-token cells with punctuation for EMDI (continued)
Cell contains mix of Latin DLP##EMDI 傠傫##傠傥 DLP##EMDI##傠傫##傠傥 The indexed content is a
and CJK characters with (if WIP true) multi-token cell.
internal punctuation.
DLP##EMDI 傠傫##傠傥 (if During detection,
WIP true) punctuation between the
Latin and characters and the
Asian characters is treated
as a single whitespace.
Leading and trailing
punctuation is ignored.
Table 25-13 Additional use cases for multi-token cells with punctuation for EMDI (continued)
Cell contains mix of Latin DLP EMDI 傠傫 傠傥 DLP EMDI 傠傫 傠傥 The indexed content is a
and CJK characters with multi-token cell.
DLP#EMDI 傠傫#傠傥 (if
internal punctuation.
WIP false) During detection,
punctuation between the
DLP#EMDI##傠傫#傠傥 (if
Latin characters and the
WIP false)
Asian characters is treated
as a single whitespace.
Leading and trailing
punctuation is ignored.
Thus, it matches as indexed.
Apostrophe '
Tilde ~
Exclamation point !
Ampersand &
Dash -
Period (dot) .
Detecting content using Exact Match Data Identifiers (EMDI) 496
Using multi-token matching with EMDI
Table 25-14 Characters treated as punctuation for indexing for EMDI (continued)
Question mark ?
At sign @
Dollar sign $
Percent sign %
Asterisk *
Caret symbol ^
Open parenthesis (
Close parenthesis )
Open bracket [
Close bracket ]
Open brace {
Close brace }
Forward slash /
Back slash \
Pound sign #
Equal sign =
Plus sign +
searches for matches. EMDI proximity matching is designed to reduce false positives by
ensuring that matched terms are proximate.
EMDI supports up to 50 tokens before and after the data identifier match. This limit can be
modified during policy creation. No dependency exists on the number of columns in the policy.
Table 25-15 shows a proximity matching example based on the default proximity radius setting.
In this example, the detected content produces one unique token set match, described as
follows:
■ The proximity range window is 100 tokens (50 tokens before and after the matching data
identifier pattern).
■ The total number of tokens from "Stevens" to the first token of "Bank of America" is within
100 tokens.
■ "Bank of America" is a multi-token. Each sub-token part of a multi-token is counted as a
single token for proximity purposes.
■ If a multi-token begins within the proximity window, it is matched even if it ends after the
proximity window. For example, "Bank of America" is matched if "Bank" is in the proximity
window, even if "of America" is not within the window.
Detecting content using Exact Match Data Identifiers (EMDI) 498
Memory requirements for EMDI
Table 25-16 Workflow for determining memory requirements for EMDI indexes
1 Determine the memory See “Determining requirements for both local indexers and
that is required to index remote indexers for EMDI” on page 500.
the data source.
2 Determine the memory See “Detection server memory requirements for EMDI”
that is required to load the on page 501.
index on the detection
server or the endpoint.
3 Increase the detection See “Increasing the memory for the detection server (File
server or endpoint Reader) for EMDI” on page 503.
memory according to your
See Properties file settings for EMDI on page 515.
calculations.
Detecting content using Exact Match Data Identifiers (EMDI) 500
Memory requirements for EMDI
Table 25-16 Workflow for determining memory requirements for EMDI indexes (continued)
See “Overview of configuring memory and indexing the data source for EMDI” on page 500.
Table 25-17 Memory requirements for indexing the data source for EMDI
1 Estimate the memory requirements See “Determining requirements for both local indexers and
for the indexer. remote indexers for EMDI” on page 500.
2 Increase the indexer memory. The next step is to increase the memory allocated to the
indexer. The procedure for increasing the indexer memory
differs depending on whether you use the EMDI indexer local
to the Enforce Server or the Remote EMDI Indexer.
3 Restart the Symantec DLP Manager You must restart this service after you have changed the
service. memory allocation.
4 Index the data source. The last step is to index the data source. You need to index
before you calculate remaining memory requirements.
See “Determining requirements for both local indexers and remote indexers for EMDI”
on page 500.
that is required depends on the number of required and optional columns as well as the number
of cells. In the following examples,
R – Number of required columns
P – Number of optional columns
B – Bytes per cell
The general formula is: B = 4 * R * P / (P+1)
Example 1
For an index with 5 million cells (1 million rows x 5 columns), 1 required column, and 4 optional
columns:
The formula is: B = 4 * 1 * 4/5 = 3.2 bytes x cell
The total memory that is required for this index = 5 million * 3.2 = 16 MB
Example 2
For an index with 40 million cells (4 million rows x 10 columns), 1 required column, and 9
optional columns:
The formula is: B = 4 * 1 * 9/10 = 3.6 bytes x cell
The total memory that is required for this index = 40 million * 3.6 = 144 MB
Example 3
For an index with 128M cells (4M rows x 32 columns), 1 required column, and 31 option
columns:
The formula is B = 4 * 1 * 31/32 = 3.875 bytes x cell
The total memory that is required for this index = 128 million * 3.875 = 496 MB
See “Detection server memory requirements for EMDI” on page 501.
To load the index, the detection server needs, on average, 3.5 bytes per cell for system memory
plus 1 GB Java heap memory for each message chain in the detection server. The following
examples show scenarios for a customer who has three indexes that are all under the same
schedule.
For Java heap memory requirements, the formula is:
Java heap memory requirement = the number of message chains * 1 GB.
For system memory requirements, the general formula is:
System memory requirement = number of cells * 3.5 bytes.
The Java heap memory settings for a detection server are set in the Enforce Server
administration console at the Server Detail - Advanced Server Settings page, using the
BoxMonitor.FileReaderMemory property. The format is -Xrs -Xms1200M -Xmx4G. You don't
need to change the system memory setting, but make sure that the detection server has
enough free memory available.
Note: When you update this setting, only change the -Xmx value in this property. For example,
only change "4G." to a new value, and leave all other values the same.
The examples in Table 25-18 show the settings for five different situations.
Table 25-18 EMDI detection server Java heap memory settings and additional system
memory examples
system memory
requirement:
5 million * 3.2 = 16 MB
Detecting content using Exact Match Data Identifiers (EMDI) 503
Memory requirements for EMDI
Table 25-18 EMDI detection server Java heap memory settings and additional system
memory examples (continued)
system memory
requirement:
5 * 40 million * 3.6 =
720 MB
10 * 128 million =
3.875 = 4960 MB
See “Increasing the memory for the detection server (File Reader) for EMDI” on page 503.
Increasing the memory for the detection server (File Reader) for
EMDI
This topic provides instructions for increasing the File Reader memory allocation for a detection
server. These instructions assume that you have performed the necessary calculations.
See “Determining requirements for both local indexers and remote indexers for EMDI”
on page 500.
To increase the memory for detection server processing
1 In the Enforce Server administration console, navigate to the Server Detail - Advanced
Server Settings screen for the detection server where the EMDI index is deployed or to
be deployed.
2 Locate the following setting: BoxMonitor.FileReaderMemory.
Detecting content using Exact Match Data Identifiers (EMDI) 504
Remote EMDI indexing
3 Change the -Xmx4G value in the following string to match the calculations you have made.
-Xrs -Xms1200M -Xmx4G -XX:PermSize=128M -XX:MaxPermSize=256M
For example: -Xrs -Xms1200M -Xmx11G -XX:PermSize=128M -XX:MaxPermSize=256M
4 Save the configuration and restart the detection server.
See “Profile size limitations on the DLP Agent for EMDI ” on page 504.
Note: By default, deployment of EMDI profiles to DLP Agents is set to false. To enable EMDI
deployments to DLP Agents, set EMDI.EnabledOnAgents property in the Protect.properties
file to true for each DLP Agent.
The Remote EMDI Indexer is a standalone tool that lets you index the data source file directly
on the data source host.
See “System requirements for remote EMDI indexing” on page 505.
Prevention System Requirements and Compatibility Guide for more information about operating
system support.
The SQL Preindexer supports Oracle databases and requires a relatively clean data source.
See “About the SQL Preindexer and EMDI” on page 505.
The RAM requirements for using the Remote EMDI Indexer vary according to the size of the
data source being indexed.
See “Memory requirements for EMDI” on page 498.
Step 1 Install the Remote EMDI See “About installing the Remote EMDI indexer” on page 507.
Indexer on a computer that
is not part of the Symantec
Data Loss Prevention
system.
Step 2 Create an Exact Match Data On the Enforce Server, generate an EMDI Profile template using the *.emdi
Identifier profile on the file name extension and specifying the exact number of columns to be indexed.
Enforce Server to use with
See “Creating an EMDI profile template for remote indexing” on page 508.
the Remote EMDI Indexer.
Step 3 Copy the Exact Match Data Download the profile template from the Enforce Server and copy it to the
Identifier Profile file to the remote data source host computer.
computer where the Remote
See “Downloading and copying the EMDI profile file to a remote system”
EMDI Indexer resides.
on page 509.
Step 4 Run the Remote EMDI If you have a cleansed data source file, use the RemoteEMDIIndexer with
Indexer and create the index the -data, -profile, and -result options.
files.
If the data source is an Oracle database, use the SqlPreindexer and the
RemoteEMDIIndexer to index the data source directly with the -alias
(oracle DB host), -username and -password credentials, and the -query
string or -query_path.
Step 5 Copy the index files from the Copy the resulting *.pdx and *.rdx files from the remote machine to the
remote machine to the Enforce Server host on Windows at
Enforce Server. C:\ProgramData\Symantec\DataLossPrevention
\ServerPlatformCommon\15.5\index or on Linux at
/var/Symantec/DataLossPrevention
/ServerPlatformCommon/15.5/index.
See “Copying and loading remote EDM index files to the Enforce Server”
on page 594.
Step 6 Load the index files into the Update the EMDI profile by loading the externally generated index.
Enforce Server.
Submit the profile for indexing.
See “Copying and loading remote EDM index files to the Enforce Server”
on page 594.
Step 7 Troubleshoot any problems Verify that indexing is started and completes.
that occur during the
Check the system events for Code 2926 ("Created Exact Data Profile" and
indexing process.
"Data source saved").
Step 8 Create policy with EMDI You should see the column data for defining the EMDI condition.
condition.
See “Configuring the Content Matches Exact Data policy condition for EDM”
on page 551.
10 Click Next to map the column headings from the data source to the profile.
11 At least one field must be selected as Required and mapped to a Data Identifier. At least
one field must be Optional.
12 Do not select any Indexing option available at this screen, since you intend to index
remotely.
13 Click Finish to complete the profile creation process.
■ ExternalEmdiDataSource.<DataSourceName>.<EmdiDataSourceID>.rdx
Detecting content using Exact Match Data Identifiers (EMDI) 510
Remote EMDI indexing
The number of .rdx files depends upon on how many columns you selected as key columns
when you created a profile.
For example, if you choose two columns, such as the CCN and SSN, you get two .rdx files.
Remote EMDI Indexer with data Specify data source file, EMDI profile, Use when you have a cleansed data
source file. output directory. source file; use for upgrading to DLP
15.5.
Remote EMDI Indexer with SQL Query DB and pipe output to stdin of Requires Oracle DB and clean data.
Preindexer Remote EMDI Indexer.
See “Remote indexing examples using
SQL Preindexer (EDM)” on page 593.
For example:
RemoteEMDIIndexer -data=C:\EMDIIndexDirectory\CustomerData.dat
-profile=C:\EMDIIndexDirectory\RemoteEMDIProfile.emdi
-result=C:\EMDIIndexDirectory\
This command generates an EMDI index using the local data source tabular text file
CustomerData.dat and the local RemoteEMDIProfile.emdi file that you generated and copied
from the Enforce Server to the remote host, where \EMDIIndexDirectory is the directory for
placing the generated index files.
When the generation of the indexes is successful, the utility displays the message "Successfully
created index" as the last line of output.
The remote EMDI indexer creates one .pdx file and one or more .rdx files:
Detecting content using Exact Match Data Identifiers (EMDI) 511
Remote EMDI indexing
■ ExternalEmdiDataSource.<DataSourceName>.pdx
■ ExternalEmdiDataSource.<DataSourceName>.<EmdiDataSourceID>.rdx
The number of .rdx files depends upon on how many columns you selected as key columns
when you created a profile.
For example, if you choose two columns, such as the CCN and SSN, you get two .rdx files.
See “Remote EDM Indexer command options” on page 597.
If you are on Linux, change users to “SymantecDLP” before running the Remote EMDI Indexer.
The installation program creates the “SymantecDLP” user.
The Remote EMDI Indexer provides a command line interface. The syntax for running the
utility is as follows:
-data Data source to be indexed Specifies the data source to be indexed. If this option is not
(stdin) specified, the utility reads data from stdin.
Required if you use a Required if using data source file and not the SQL Preindexer.
tabular text file.
Detecting content using Exact Match Data Identifiers (EMDI) 512
Remote EMDI indexing
-encoding Character encoding of data Specifies the character encoding of the data to index. The
to be indexed (ISO-8859-1). default is ISO-8859-1.
-ignore_date Ignore expiration date of the Overrides the expiration date of the Exact Data Profile if the
EMDI profile. profile has expired. By default, an Exact Data Profile expires
after 30 days.
-profile File containing the EMDI Specifies the Exact Match Data Identifier profile to use. This
profile profile is selected by clicking the download link on the Exact
Match Data Identifier screen in the Enforce Server
Required
administration console
-result Directory to place the Specifies the directory where the index files are generated.
resulting indexes.
Required
-verbose Display verbose output Displays a statistical summation of the indexing operation
when the index is complete.
For example:
With this command the SQL Preindexer utility connects to the Oracle database and runs the
SQL query to retrieve name and salary data from the employee table. The SQL Preindexer
Detecting content using Exact Match Data Identifiers (EMDI) 513
Remote EMDI indexing
returns the result of the query to stdout (the command console). The SQL query must be in
quotes. The Remote EMDI Indexer command runs the utility and reads the query result from
the stdin console. The Remote EMDI Indexer indexes the data using the
ExportEMDIProfile.emdi profile as specified by the profile file name and local file path.
When the generation of the indexes is successful, the utility displays the message "Successfully
created index" as the last line of output.
In addition, the utility places the following generated index files in the EMDIIndexDirectory
-result directory:
■ ExternalEmdiDataSource.<DataSourceName>.pdx
■ ExternalEmdiDataSource.<DataSourceName>.<EmdiDataSourceID>.rdx
The number of .rdx files depends upon on how many columns you selected as key columns
when you created a profile.
For example, if you choose two columns, such as the CCN and SSN, you get two .rdx files.
Here is an example using SQL Preindexer and Remote EMDI Indexer commands:
Here the SQL Preindexer command queries the CUST.customer_account table in the database
for the account_id, amount_owed, and available_credit records. The result is piped to the
Remote EMDI Indexer which generates the index files based on the CustomerData.emdi
profile. The -verbose option is used for troubleshooting.
As an alternative to the -query SQL string you can use the -query_path option and specify
the file path and name for the SQL query (*.sql). If you do not specify a query or a query path
the entire DB is queried.
Copying and loading EMDI remote index files to the Enforce Server
The system creates one .pdx file and one or more .rdx files in the -result directory when
you remotely index a data source:
■ ExternalEmdiDataSource.<DataSourceName>.pdx
■ ExternalEmdiDataSource.<DataSourceName>.<EmdiDataSourceID>.rdx
Detecting content using Exact Match Data Identifiers (EMDI) 514
Remote EMDI indexing
One .rdx file is created for every key column. For example, the .rdx file can be
ExternalEmdiDataSource.MyProfile.3.rdx.
After you create the index file on a remote machine, you must copy the file to the Enforce
Server, load it into the previously created remote EMDI profile, and submit the indexing job.
See “Creating an EMDI profile template for remote indexing” on page 508.
To copy and load the files on the Enforce Server
1 Go to the directory where the index files were generated. (This directory is the one specified
in the -result option.)
2 Copy all of the index files with .pdx and .rdx extensions to the index directory on the
Enforce Server. This directory is located at
C:\ProgramData\Symantec\DataLossPrevention\ServerPlatformCommon\15.5\index
(Windows) or /var/Symantec/DataLossPrevention/ServerPlatformCommon/15.5/index
(Linux).
3 From the Enforce Server administration console, navigate to the Manage > Policies >
Exact Data screen.
This screen lists all the Exact Match Data Identifier profiles in the system.
4 Click the name of the Exact Match Data Identifier profile you used with the Remote EMDI
Indexer.
5 To load the new index files, go to the Data Source section of the Exact Data Profile and
select Load Externally Generated Index.
6 In the Indexing section, select Submit Indexing Job on Save.
As an alternative to indexing immediately on save, you can set up a job on the remote
machine to run the Remote EMDI Indexer on a schedule. The job should also copy the
generated files to the index directory on the Enforce Server. You can then schedule loading
the updated index files on the Enforce Server from the profile by selecting Load Externally
Generated Index and Submit Indexing Job on Schedule and configuring an indexing
schedule.
See “Use scheduled indexing to automate profile updates (EDM)” on page 607.
7 Click Save.
You may encounter errors when you index large amounts of data. Often the set of data contains
a data record that is incomplete, inconsistent, or inaccurate. Data rows that contain more
columns than expected or incorrect column data types often cannot be properly indexed and
are unrecognized.
The SQL Preindexer can be configured to provide a summary of information about the indexing
operation when it completes. To do so, specify the verbose option when running the SQL
Preindexer.
To see the rows of data that the Remote EMDI Indexer did not index, adjust the configuration
in the Indexer.properties file using the following procedure.
To record those data rows that were not indexed
1 Locate the Indexer.properties file at \Program Files\Symantec\Data Loss
Prevention\Indexer\15.5\Protect\config\Indexer.properties (Windows) or
/Symantec/DataLossPrevention/Indexer/15.5/Protect/config/Indexer.properties
(Linux).
2 Open the file in a text editor.
3 Locate the create_error_file property and change the “false” setting to “true.”
4 Save and close the Indexer.properties file.
The Remote EMDI Indexer logs errors in a file with the same name as the data file being
indexed and the .err suffix.
The rows of data that are listed in the error file are not encrypted. Safeguard the error file
to minimize any security risk from data exposure.
See “About the SQL Preindexer for EDM” on page 586.
Protect.properties
C:\Program Files\Symantec\DataLossPrevention\
EnforceServer\15.5\Protect\config\Protect.properties
(Windows)
/opt/Symantec/DataLossPrevention/EnforceServer/
15.5/Protect/config/Protect.properties (Linux)
C:\Program Files\Symantec\DataLossPrevention
\DetectionServer\15.5\Protect\config\Protect.properties
(Windows)
/opt/Symantec/DataLossPrevention/DetectionServer
/15.5/Protect/config/Protect.properties (Linux)
Indexer.properties
C:\Program Files\Symantec\DataLossPrevention\
EnforceServer\15.5\Protect\config\Indexer.properties
(Windows)
opt/Symantec/DataLossPrevention/EnforceServer/15.5
/Protect/config/Indexer.properties (Linux)
Detecting content using Exact Match Data Identifiers (EMDI) 517
Best practices for using EMDI
ProfileIndexConfiguration
C:\Program Files\Symantec\DataLossPrevention\
EnforceServer\15.5\Protect\config\ProfileIndex
Configuration.properties (Windows)
/opt/Symantec/DataLossPrevention/EnforceServer/
15.5/Protect/config/ProfileIndexConfiguration.properties
(Linux)
C:\Program Files\Symantec\DataLossPrevention\
DetectionServer\15.5\Protect\config\ProfileIndex
Configuration.properties (Windows)
/opt/Symantec/DataLossPrevention/EnforceServer/
15.5/Protect/config/ProfileIndexConfiguration.properties
(Linux)
Never use any personally identifiable information See “Never use a personal identifier as an optional
(PII) as an optional column. column in EMDI” on page 519.
Use three or more columns in a match. See “Use three or more columns in a match for
EMDI” on page 519.
Don’t use EMDI validators as both optional and See “Don’t use EMDI validators as both optional
required for a given data identifier in a policy. and required for a given data identifier in a policy”
on page 519.
Use additional validators with EMDI where possible. See “Use additional validators with EMDI where
possible” on page 519.
Limit the required number of columns to no more See “Limit the required number of columns to two
than two or three. or three for EMDI” on page 519.
When matching with only a single optional column, See “When matching with only a single optional
avoid adding low-variability values as optional column, avoid adding low-variability values as
columns. optional columns with EMDI” on page 519.
Use full disk encryption on endpoint deployments. See “Use full disk encryption on EMDI endpoint
deployments” on page 519.
Eliminate duplicate rows and blank columns before See “Cleanse the EMDI data source file of blank
indexing. columns and duplicate rows” on page 519.
To reduce false positives, avoid single characters, See “Remove ambiguous character types from the
quotes, abbreviations, numeric fields with fewer EMDI data source file” on page 520.
than 5 digits, and dates.
Clean up your data source for multi-token cell See “Clean up your EMDI data source for
matching. multi-token matching” on page 521.
Use the pipe (|) character to delimit columns in your See “Do not use the comma delimiter if the EMDI
data source. data source has number fields” on page 521.
Ensure that the EMDI data source is clean for See “Ensure that the EMDI data source is clean for
indexing. indexing” on page 522.
Include the column headers as the first row of the See “Include column headers as the first row of the
data source file. EMDI data source file” on page 522.
Check the system alerts to tune Exact Match Data See “Check the EMDI system alerts to tune profile
Identifier profiles. accuracy” on page 522.
Automate profile updates with scheduled indexing. See “Use scheduled indexing to automate EMDI
profile updates” on page 523.
Detecting content using Exact Match Data Identifiers (EMDI) 519
Best practices for using EMDI
Don’t use EMDI validators as both optional and required for a given
data identifier in a policy
Do not use an EMDI validator in-line in a policy for a data identifier condition when the data
identifier has already been configured to use an EMDI validator.
Cleanse the EMDI data source file of blank columns and duplicate
rows
The data source file should be as clean as possible before you create the EMDI index, otherwise
the resulting profile may create false positives.
Detecting content using Exact Match Data Identifiers (EMDI) 520
Best practices for using EMDI
When you create the data source file, avoid including empty cells or blank columns. Blank
columns or fields count as errors when you generate the EMDI profile. A data source error is
either an empty cell or a cell with the wrong type of data (a name appearing in a phone number
column). The error threshold is the maximum percentage of rows that contain errors before
indexing stops. If the errors exceed the error threshold percentage for the profile (by default,
5%), the system stops indexing and displays an indexing error message.
The best practice is to remove blank columns and empty cells from the data source file, rather
than increasing the error threshold. Keep in mind that if you have many empty cells, it may
require a 100% error threshold for the system to create the profile. If you specify 100% as the
error threshold, the system indexes the data source without checking for errors.
In addition, do not fill empty cells or blank fields with fake data so that the error threshold is
met. Adding fake or "null" data to the data source file reduces the accuracy of the EMDI profile
and is discouraged. Content you want to monitor should be legitimate and not null.
See “Do not use the comma delimiter if the EMDI data source has number fields” on page 521.
Remove ambiguous character types from the EMDI data source file
You cannot have extraneous spaces, punctuation, and inconsistently populated fields in the
data source file. You can use tools such as Stream Editor (sed) and AWK to remove these
items from your data source file or files before indexing them.
Table 25-24 list characters to avoid in the data source file.
Table 25-24 Characters to avoid in the EMDI data source file (continued)
Do not use the comma delimiter if the EMDI data source has number
fields
Of the four types of column delimiters that you can choose from for separating the fields in the
data source file (pipe, tab, semicolon, or comma), the pipe, semicolon, or tab (default) are
recommended. The comma delimiter is ambiguous and should not be used, especially if one
Detecting content using Exact Match Data Identifiers (EMDI) 522
Best practices for using EMDI
or more fields in your data source contain numbers. If you use a comma-delimited data source
file, make sure there are no commas in the data set other than those used as column delimiters.
Note: The system also treats the pound sign, equals sign, plus sign, and colon characters as
separators, but you should not use these because like the comma their meaning is ambiguous.
Include column headers as the first row of the EMDI data source file
When you extract the source data to the data source file, you should include the column
headers as the first row in the data source file. Including the column headers makes it easier
for you to identify the data you want to use in your policies.
The column names reflect the column mappings that were created when the exact data profile
was added. If there is an unmapped column, it is called Col X, where X is the column number
(starting with 1) in the original data profile.
EMDI Troubleshooting
Scan the following problems and solutions before you call Symantec support. Also, follow
EMDI Best Practices to avoid problems in your EMDI deployment.
See “Best practices for using EMDI” on page 517.
The EMDI index doesn’t get published to the Endpoint Agent and
the EnabledOnAgents setting is true
Solution: Verify that the EMDI.MaxEndpointProfileMemoryInMB parameter in the
Protect.properties file on each endpoint server is set to a value larger than the index size.
Detecting content using Exact Match Data Identifiers (EMDI) 524
EMDI Troubleshooting
administration console, or remotely using the Remote EDM Indexer. During the indexing
process, the system indexes the data by accessing and extracting the text-based content,
normalizing it, and securing it using a nonreversible hash. You can schedule indexing on a
regular basis after you have pulled current data from the data source to ensure that the EDM
index reflects the current data.
Once you have profiled the data, you configure the Content Matches Exact Data condition
to match individual pieces of the indexed data. For increased accuracy you can configure the
condition to match combinations of data fields from a particular record. The EDM policy condition
matches on data coming from the same row or record of data. For example, you can configure
the EDM policy condition to look for any three of First Name, Last Name, SSN, Account Number,
or Phone Number occurring together in a message and corresponding to a record from your
customer database.
Once the policy is deployed to one or more detection servers, cloud detection services, or
appliances, the system can detect the data fields (or records) that you have profiled in either
structured or unstructured format. For example, you could deploy the EDM policy to a Network
Discover Server and scan data repositories for confidential data matching data records in the
index. Your could also deploy the EDM policy to a Network Prevent for Email Server to detect
records in email communications and attachments, such as Microsoft Word files. If the
attachment is a spreadsheet, such as Microsoft Excel, the EDM policy can detect the presence
of confidential records there as well.
See “About the Exact Data Profile and index” on page 528.
You create an Exact Data Profile and index the data source file. When you configure the profile,
you map the data field columns to system-defined patterns and validate the data. You then
configure the EDM policy condition that references the Exact Data Profile. In this example, the
condition matches if a message contains all five data fields.
The detection server reports a match if it detects the following in any inbound message:
Bob Smith 123-45-6789 05/26/99 $42500
But, a message containing the following does not match because that record is not in the
index:
Betty Smith 000-00-0000 05/26/99 $42500
If you limited the condition to matching only the Last Name, SSN, and Salary column fields,
the following message is a match because it meets the criteria:
Robert, Smith, 123-45-6789, 05/29/99, $42500
Finally, the following message contents do not match because the value for the SSN is not
present in the profile:
Bob, Smith, 415-789-0000, 05/26/99, $42500
See “Configuring Exact Data profiles for EDM” on page 534.
■ You can use a WHERE clause in the EDM rule and matches that do not satisfy the WHERE
clause are ignored. For example, you can use a WHERE clause to only match on records
where the customer's country is the United States.
■ You can use Data Owner Exception to ignore detection based on the sender or recipient's
email address or domain. Data owner exception lets you tag or authorize a specific field
in an Exact Data Profile as the data owner. At run-time if the sender or recipient of the data
is authorized as a data owner, the condition does not trigger a match and the data is sent
or received by the data owner.
■ You can use profiled Directory Group Matching (DGM) to match on senders or recipients
of data based on email address or Windows user name.
■ Proximity matching range that is proportional to the number of required matches set in the
policy condition.
■ Full support for single- and multi-token cell indexing and matching. A multi-token is a cell
that is indexed that contains two or more words. Since a single CJK (Chinese, Japanese,
Korean) character is regarded as a token, two or more CJK characters are regarded as a
multi-token.
See “Creating and modifying Exact Data Profiles for EDM” on page 541.
See “Memory requirements for EDM” on page 579.
Note: The format for the data source file should be a text-based format using commas,
semicolons, pipes, or tabs as delimiters. In general you should avoid using a spreadsheet
format for the data source file (such as XLS or XLSX) because such programs use scientific
notation to render numbers.
Detecting content using Exact Data Matching (EDM) 530
Introducing Exact Data Matching (EDM)
Columns 32 The data source file cannot have more than 32 columns. If it does, the system
does not index it.
Cells 6 billion The data source file cannot have more than 6 billion data cells. If it does, the
system does not index it.
Table 26-2 Workflow for cleansing the data source file for EDM
1 Prepare the data source file for indexing. See “Preparing the exact data source file for indexing
for EDM” on page 537.
2 Ensure that the data source has at least See “Ensure data source has at least one column
one column that is unique data. of unique data (EDM)” on page 602.
3 Remove incomplete and duplicate See “Cleanse the data source file of blank columns
records. Do not fill empty cells with and duplicate rows (EDM)” on page 603.
bogus data.
4 Remove improper characters. See “Remove ambiguous character types from the
data source file (EDM)” on page 604.
5 Verify that the data source file is below See “Preparing the exact data source file for indexing
the error threshold. The error threshold for EDM” on page 537.
is the maximum percentage of rows that
contain errors before indexing stops.
About using System Fields for data source validation with EDM
Column headings in your data source are useful for visual reference. However, they do not
tell Symantec Data Loss Prevention what kind of data the columns contain. To do this, you
Detecting content using Exact Data Matching (EDM) 531
Introducing Exact Data Matching (EDM)
use the Field Mappings section of the Exact Data Profile to specify mappings between fields
in your data source. You can also use field mappings to specify fields that the system recognizes
in the system-provided policy templates. The Field Mappings section also gives you advanced
options for specifying custom fields and validating the data in those fields.
See “Mapping Exact Data Profile fields for EDM” on page 545.
Consider the following example use of field mappings. Your company wants to protect employee
data, including employee social security numbers. You create a Data Loss Prevention policy
based on the Employee Data Protection template. The policy requires an exact data index
with fields for social security numbers and other employee data. You prepare your data source
and then create the Exact Data Profile. To validate the data in the social security number
field, you map this column field in your index to the "Social Security Number" system field
pattern. The system then validates all data in that field using the Social Security Number
validator to ensure that each data item is a social security number.
Using the system-defined field patterns to validate your data is critical to the accuracy of your
EDM policies. If there is no system-defined field pattern that corresponds to one or more data
fields in your index, you can define custom fields and choose the appropriate validator to
validate the data.
See “Map data source column to system fields to leverage validation (EDM)” on page 605.
Note: You must reindex after upgrading to the latest version of Symantec Data Loss Prevention.
See “Use scheduled indexing to automate profile updates (EDM)” on page 607.
About the Content Matches Exact Data From condition for EDM
The Content Matches Exact Data From an Exact Data Profile condition is the detection
component you use to implement EDM policy conditions. When you define this condition, you
select the EDM profile on which the condition is based. You also select the columns you want
to use in your condition, as well as any WHERE clause limitations.
Note: You cannot use the Content Matches Exact Data From an Exact Data Profile condition
as a policy exception. Symantec Data Loss Prevention does not support the use of the EDM
condition as a policy exception.
See “Configuring the Content Matches Exact Data policy condition for EDM” on page 551.
See “Configuring Data Owner Exception for EDM policy conditions” on page 554.
on the Endpoint Server to see if any EDM indexes are loaded. Look for the line "loaded database
profile."
See “Troubleshooting policies” on page 445.
1 Create the data source file. Export the source data from the database (or other data repository) to
a tabular text file with delimited fields.
If you want to except data owners from matching, you need to include
specific data items in the data source file.
See “Creating the exact data source file for EDM” on page 535.
See “Creating the exact data source file for profiled DGM for EDM”
on page 537.
Detecting content using Exact Data Matching (EDM) 535
Configuring Exact Data profiles for EDM
2 Prepare the data source file for Cleanse the data source file.
indexing.
See “Preparing the exact data source file for indexing for EDM”
on page 537.
3 Upload the data source file to the You can copy or upload the data source file to the Enforce Server, or
Enforce Server. access it remotely.
See “Uploading exact data source files for EDM to the Enforce Server”
on page 539.
4 Create an Exact Data Profile. An Exact Data Profile is required to implement Exact Data Matching
(EDM) policies. The Exact Data Profile specifies the data source, data
field types, and the indexing schedule.
See “Creating and modifying Exact Data Profiles for EDM” on page 541.
5 Map and validate the data fields. You map the source data fields to system or custom data types that
the system validates. For example, a social security number data field
needs to be nine digits.
See “About using System Fields for data source validation with EDM”
on page 530.
See “Mapping Exact Data Profile fields for EDM” on page 545.
6 Index the data source, or Schedule the indexing to keep the index in sync with the data
schedule indexing. source.See “About index scheduling for EDM” on page 531.
See “Scheduling Exact Data Profile indexing for EDM” on page 548.
7 Configure and tune one or more See “Configuring the Content Matches Exact Data policy condition for
Content Matches Exact Data EDM” on page 551.
policy conditions.
Step Description
1 Export the data you want to protect from a database or other tabular data format, such as an Excel
spreadsheet, to a tabular text file. The data source file you create must be a tabular text file that contains
rows of data from the original source. Each row from the original source is included as a row in the data
source file. Delimit columns using a tab, a comma, or a pipe. Pipe is preferred. Comma should not be
used if your data source fields contain numbers.
You must maintain all the structured data that you exported from the source database table or table-like
format in one data source file. You cannot split the data source across multiple files.
The data source file cannot exceed 32 columns, 4,294,967,294 rows, or 6 billion cells. If you plan to
upload the data source file to the Enforce Server, browser capacity limits the data source size to 2 GB.
For file sizes larger than this size you can copy the file to the Enforce Server using FTP/S, SCP, SFTP,
CIFS, or NFS.
■ Unique data
For all EDM implementations, make sure that the data source contains at least one column of unique
data.
See “Ensure data source has at least one column of unique data (EDM)” on page 602.
■ Data Owner Exception
Make sure that the data source contains the email address field or domain field, if you plan to use
data owner exceptions.
See “Creating the exact data source file for Data Owner Exception for EDM” on page 536.
■ Directory Group Matching
Make sure that the data source includes one or more sender/recipient identifying fields.
See “Creating the exact data source file for profiled DGM for EDM” on page 537.
See “Preparing the exact data source file for indexing for EDM” on page 537.
Creating the exact data source file for Data Owner Exception for
EDM
To implement Data Owner Exception and ignore data owners from detection, you must explicitly
include each user's email address or domain address in the Exact Data Profile. Each expected
domain (for example, symantec.com) must be explicitly added to the Exact Data Profile. The
system does not automatically match on subdomains (for example, support.symantec.com).
Each subdomain must be explicitly added to the Exact Data Profile.
Detecting content using Exact Data Matching (EDM) 537
Configuring Exact Data profiles for EDM
To implement the data owner exception feature, you must include either or both of the following
fields in your data source file:
■ Email address, such as [email protected]
■ Domain address, such as symantec.com
See “About Data Owner Exception for EDM” on page 532.
See “Configuring Data Owner Exception for EDM policy conditions” on page 554.
Creating the exact data source file for profiled DGM for EDM
Profiled DGM leverages Exact Data Matching (EDM) technology to precisely detect identities.
Identity-related attributes may include an IP address, email address, user name, business
unit, department, manager, title, or employment status. Other attributes may be whether that
employee has provided consent to be monitored, or whether the employee has access to
sensitive information. To implement profiled DGM, you must include at least one required data
field in your data source.
See “About the Exact Data Profile and index” on page 528.
Table 26-5 lists the required fields for profiled DGM. The data source file must contain at least
one of these fields.
Field Description
Email address If you use an email address column field in the data source file, the email address appears in
the Directory EDM drop-down list at the incident snapshot screen.
Windows user name If you use a Windows user name field in your data source, the data must be in the following
format: domain\user; for example: ACME\john_smith.
Microsoft Office
Communicator name
Preparing the exact data source file for indexing for EDM
Once you create the exact data source file, you must prepare it so that you can efficiently index
the data you want to protect.
Detecting content using Exact Data Matching (EDM) 538
Configuring Exact Data profiles for EDM
When you index an exact data profile, the Enforce Server keeps track of empty cells and any
misplaced data which count as errors. For example, an error may be a name that appears in
a column for phone numbers. Errors can constitute a certain percentage of the data in the
profile (five percent, by default). If this default error threshold is met, Symantec Data Loss
Prevention stops indexing. It then displays an error to warn you that your data may be
unorganized or corrupt.
To prepare the exact data source for EDM indexing
1 Make sure that the data source file is formatted as follows:
■ If the data source has more than 200,000 rows, verify that it has at least two columns
of data. One of the columns should contain unique values. For example, credit card
numbers, driver’s license numbers, or account numbers (as opposed to first and last
names, which are generic).
See “Ensure data source has at least one column of unique data (EDM)” on page 602.
■ Verify that you have delimited the data source using pipes ( | ) or tabs. If the data
source file uses commas as delimiters, remove any commas that do not serve as
delimiters.
See “Do not use the comma delimiter if the data source has number fields (EDM)”
on page 605.
■ Verify that data values are not enclosed in quotes.
■ Remove single-character and abbreviated data values from the data source. For
example, remove the column name and all values for a column in which the possible
values are Y and N.
■ Optionally, remove any columns that contain numeric values with less that five digits,
as these can cause false positives in production.
See “Remove ambiguous character types from the data source file (EDM)” on page 604.
■ Verify that numbers, such as credit card or social security, are delimited internally by
dashes, or spaces, or none at all. Make sure that you do not use a data-field delimiter
such as a comma as an internal delimiter in any such numbers. For example:
123-45-6789, or 123 45 6789, or 123456789 are valid, but not 123,45,6789.
See “Do not use the comma delimiter if the data source has number fields (EDM)”
on page 605.
■ Eliminate duplicate records, which can cause duplicate incidents in production.
See “Cleanse the data source file of blank columns and duplicate rows (EDM)”
on page 603.
■ Do not index common values. EDM works best with values that are unique. Think
about the data you want to index (and thus protect). Is this data truly valuable? If the
value is something common, it is not useful as an EDM value. For example, suppose
that you want to look for "US states." Since there are only 50 states, if your exact data
Detecting content using Exact Data Matching (EDM) 539
Configuring Exact Data profiles for EDM
profile has 300,000 rows, the result is a lot of duplicates of common values. Symantec
Data Loss Prevention indexes all values in the exact data profile, regardless of if the
data is used in a policy or not. It is good practice to use values that are less common
and preferably unique to get the best results with EDM.
See “Ensure data source has at least one column of unique data (EDM)” on page 602.
2 Once you have prepared the exact data source file, proceed with the next step in the EDM
process: upload the exact data source file to the Enforce Server for profiling the data you
want to protect.
See “Uploading exact data source files for EDM to the Enforce Server” on page 539.
Uploading exact data source files for EDM to the Enforce Server
After you have prepared the data source file for indexing, load it to the Enforce Server so the
data source can be indexed.
See “Creating and modifying Exact Data Profiles for EDM” on page 541.
Listed here are the options you have for making the data source file available to the Enforce
Server. Consult with your database administrator to determine the best method for your needs.
Table 26-6 Uploading the data source file for EDM to the Enforce Server for indexing
Upload Data Source Data source file is If you have a smaller data source file (less than 50 MB), upload the data
to Server Now less than 50 MB source file to the Enforce Server using the Enforce Server administration
console (web interface). When creating the Exact Data Profile, you can
specify the file path or browse to the directory and upload the data source
file.
Note: Due to browser capacity limits, the maximum file size that you can
upload is 2 GB. However, uploading any file over 50 MB is not
recommended since files over this size can take a long time to upload. If
your data source file is over 50 MB, consider copying the data source file
to the datafiles directory using the next option.
Detecting content using Exact Data Matching (EDM) 540
Configuring Exact Data profiles for EDM
Table 26-6 Uploading the data source file for EDM to the Enforce Server for indexing
(continued)
Reference Data Data source file is If you have a large data source file (over 50 MB), copy it to the datafiles
Source on Manager over 50 MB. directory on the host where Enforce is installed.
Host
■ On Windows this directory is located at
C:\ProgramData\Symantec\DataLossPrevention
\ServerPlatformCommon\15.5\Protect\datafiles.
■ On Linux this directory is located at
/var/Symantec/DataLossPrevention
/ServerPlatformCommon/15.5/datafiles.
This option is convenient because it makes the data file available through
a drop-down list during configuration of the Exact Data Profile. If it is a
large file, use a third-party solution (such as Secure FTP) to transfer the
data source file to the Enforce Server.
Note: Ensure that the Enforce user (usually called "protect") has modify
permissions (on Windows) or rw permissions (on Linux) for all files in the
datafiles directory.
Use This File Name Data source file is You may want to create an EDM profile before you have created the data
not yet created. source file. In this case you can create a profile template and specify the
name of the data source file you plan to create. This option lets you define
EDM policies using the EDM profile template before you index the data
source. The policies do not operate until the data source is indexed. When
you have created the data source file you place it in the
\ProgramData\Symantec\DataLossPrevention
\ServerPlatformCommon\15.5\Protect\datafiles directory
(Windows) or /var/Symantec/DataLossPrevention
/ServerPlatformCommon/15.5/Protect/datafiles (Linux) and
index the data source immediately on save or schedule indexing.
See “Creating and modifying Exact Data Profiles for EDM” on page 541.
Detecting content using Exact Data Matching (EDM) 541
Configuring Exact Data profiles for EDM
Table 26-6 Uploading the data source file for EDM to the Enforce Server for indexing
(continued)
Use This File Name Data source is to In some environments it may not be secure or feasible to copy or upload
be indexed the data source file to the Enforce Server. In this situation you can index
and
remotely and the data source remotely using Remote EDM Indexer.
Load Externally copied to the
See “Remote EDM indexing” on page 585.
Generated Index Enforce Server.
This utility lets you index an exact data source on a computer other than
the Enforce Server host. This feature is useful when you do not want to
copy the data source file to the same computer as the Enforce Server.
As an example, consider a situation where the originating department
wants to avoid the security risk of copying the data to an
extra-departmental host. In this case you can use the Remote EDM
Indexer.
First you create an EDM profile template where you choose the Use this
File Name and the Number of Columns options. You must specify the
name of the data source file and the number of columns it contains.
See “Creating an EDM profile template for remote indexing” on page 589.
You then use the Remote EDM Indexer to remotely index the data source
and copy the index files to the Enforce Server host and load the externally
generated index. The Load Externally Generated Index option is only
available after you have defined and saved the profile. Remote indexes
are loaded from the \Program
Files\Symantec\DataLossPrevention\
EnforceServer\15.5\Protect\index directory on the Enforce
Server host.
See “Copying and loading remote EDM index files to the Enforce Server”
on page 594.
Note: If you are using the Remote EDM Indexer to generate the Exact Data Profile, refer to
the following topic.
Note: Use this option with caution. Be sure to remember to create the data source file
and copy it to the datafiles directory. Name the data source file exactly the same
as the name you enter here and include the exact number of columns you specify
here.
8 If the first row of your data source contains Column Names, select Read first row as
column names.
9 Specify the Error Threshold, which is the maximum percentage of rows that contain
errors before indexing stops.
A data source error is either an empty cell, a cell with the wrong type of data, or extra
cells in the data source. For example, a name in a column for phone numbers is an error.
If errors exceed a certain percentage of the overall data source (by default, 5%), the
system quits indexing and displays an indexing error message. The index is not created
if the data source has more invalid records than the error threshold value allows. Although
you can change the threshold value, more than a small percentage of errors in the data
source can indicate that the data source is corrupt, is in an incorrect format, or cannot be
read. If you have a significant percentage of errors (10% or more), stop indexing and
cleanse the data source.
See “Preparing the exact data source file for indexing for EDM” on page 537.
10 Select the Column Separator Char (delimiter) that you have used to separate the values
in the data source file. The delimiters you can use are tabs, commas, or pipes.
11 Select one of the following encoding values for the content to analyze, which must match
the encoding of your data source:
■ ISO-8859-1 (Latin-1) (default value)
Standard 8-bit encoding for Western European languages using the Latin alphabet.
■ UTF-8
Use this encoding for all languages that use the Unicode 4.0 standard (all single- and
double-byte characters), including those in East Asian languages.
■ UTF-16
Detecting content using Exact Data Matching (EDM) 544
Configuring Exact Data profiles for EDM
Use this encoding for all languages that use the Unicode 4.0 standard (all single- and
double-byte characters), including those in East Asian languages.
Note: Make sure that you select the correct encoding. The system does not prevent you
from creating an EDM profile using the wrong encoding. The system only reports an error
at run-time when the EDM policy attempts to match inbound data. To make sure that you
select the correct encoding, after you click Next, verify that the column names appear
correctly. If the column names do not look correct, you chose the wrong encoding.
16 Check your field mappings against the suggested fields for the policy template you plan
to use. To do so, go to the Check Mappings Against drop-down list, select a template,
and click Check now on the right.
The system displays a list of all template fields that you have not mapped. You can go
back and map these fields now. Alternatively, you may want to expand your data source
to include as many expected fields as possible, and then re-create the exact data profile.
Symantec recommends that you include as many expected data fields as possible.
17 In the Indexing section of the screen, select one of the following options:
■ Submit Indexing Job on Save
Select this option to begin indexing the data source when you save the exact data
profile.
■ Submit Indexing Job on Schedule
Select this option to index the data source according to a specific schedule. Make a
selection from the Schedule drop-down list and specify days, dates, and times as
required.
See “About index scheduling for EDM” on page 531.
See “Scheduling Exact Data Profile indexing for EDM” on page 548.
18 Click Finish.
After Symantec Data Loss Prevention finishes indexing, it deletes the original data source
from the Enforce Server. After you index a data source, you cannot change its schema.
If you change column mappings for a data source after you index it, you must create a
new exact data profile.
After the indexing process is complete you can create new Content Matches Exact Data
conditions that can be added to a rule that references the Exact Data Profile you have
created.
See “Configuring the Content Matches Exact Data policy condition for EDM” on page 551.
Field Description
Data Source Field If you selected the Column Names option at the Add Exact Data Profile screen, this column
lists the values that are found in the first row from the data source. If you did not select this
option, this column lists the columns by generic names (such as Col 1, Col 2, and so on).
Note: If you implement a data owner exception, you must map either or both the email address
and domain fields.
See “Configuring the Content Matches Exact Data policy condition for EDM” on page 551.
A system field value (except None Selected) cannot be mapped to more than one column.
Some system fields have system patterns associated with them (such as social security
number) and some do not (such as last name).
See “Using system-provided pattern validators for EDM profiles” on page 547.
Check mappings Select a policy template from the drop-down list to compare the field mappings against and
against policy then click Check now.
template
All policy templates that implement EDM appear in the drop-down menu, including any you
have imported.
If you plan to use more than one policy template, select one and check it, and then select
another and check it, and so on.
If there are any fields in the policy template for which no data exists in the data source, a
message appears listing the missing fields. You can save the profile anyway or use a different
Exact Data Profile.
Advanced View If you want to customize the schema for the exact data profile, click Advanced View to display
the advanced field mapping options.
Table 26-8 lists and describes the additional columns you can specify in the Advanced View
screen.
See “Scheduling Exact Data Profile indexing for EDM” on page 548.
Finish Click Finish when you are done configuring the Exact Data Profile.
From the Advanced View you map the system and data source fields to system patterns.
System patterns map the specified structure to the data in the Exact Data Profile and enable
efficient error checking and hints for the indexer.
Detecting content using Exact Data Matching (EDM) 547
Configuring Exact Data profiles for EDM
Field Description
Custom Name If you select Custom Name for a System Field, enter a unique name for it and then select a
value for Type. The name is limited to 60 characters.
Type If you select a value other than Custom for a System Field, some data types automatically
select a value for Type. For example, if you select Birth Date for the System Field, Date is
automatically selected as the Type. You can accept it or change it.
Some data types do not automatically select a value for Type. For example, if you select
Account Number for the System Field, the Type remains unselected. You can specify the
data type of your particular account numbers.
See “Using system-provided pattern validators for EDM profiles” on page 547.
Description Click the link (description) beside the Type column header to display a pop-up window
containing the available system data types.
See “Using system-provided pattern validators for EDM profiles” on page 547.
Simple View Click Simple View to return to the Simple View (with the Custom Name and Type columns
hidden).
See “Creating and modifying Exact Data Profiles for EDM” on page 541.
Type Description
Credit Card Number The Credit Card pattern is built around knowledge about various international credit cards,
their registered prefixes, and number of digits in account numbers. The following types of
Credit Cards patterns are validated: MasterCard, Visa, America Express, Diners Club, Discover,
Enroute, and JCB.
Optional spaces in designated areas within credit cards numbers are recognized. Note that
only spaces in generally accepted locations (for example, after every 4th digit in MC/Visa) are
recognized. Note that the possible location of spaces differs for different card types. Credit
card numbers are validated using checksum algorithm. If a number looks like a credit card
number (that is, it has correct number of digits and correct prefix), but does not pass checksum
algorithm, it is not considered a credit card, but just a number.
Email Email is a sequence of characters that looks like the following: [email protected], where
string may contain letters, digits, underscore, dash, and dot, and 'tld' is one of the approved
DNS top-level generic domains, or any two letters (for country domains).
Detecting content using Exact Data Matching (EDM) 548
Configuring Exact Data profiles for EDM
Type Description
Number Number is either float or integer, either by itself or in round brackets (parenthesis).
Percent Percent is a number immediately followed by the percent sign ("%"). No space is allowed
between a number and a percent sign.
Phone Only US and Canadian telephone numbers are recognized. The phone number must start
with any digit but 1, with the exception of numbers that include a country code.
Phone number can be one of the following formats:
All of these cases can be optionally followed by an extension number, preceded by spaces or
dashes. The extension number is 2 to 5 digits preceded by any of the following (case
insensitive): 'x' 'ex' 'ext' 'exten' 'extens' 'extensions' optionally followed by a dot and spaces.
Note: The system does not recognize the pattern XXX-XXX-XXXX as a valid phone number
format because this format is frequently used in other forms of identification. If your data source
contains a column of phone numbers in that format, select None Selected to avoid confusion
between phone numbers and other data.
Postal Code Only US ZIP codes and Canadian Postal Codes are recognized. The US ZIP code is a sequence
of 5 digits, optionally followed by dash, followed by another 4 digits. The Canadian Postal
Code is a sequence like K2B 8C8, that is, "letter-digit-letter-space-digit-letter-digit" where
space(s) in the middle is optional.
Social Security Only US Social Security Numbers are recognized. The SOCIAL SECURITY NUMBER is 3
Number digits, optionally followed by spaces or dashes, followed by 2 digits, optionally followed by
spaces or dashes, followed by 4 digits.
■ Schedule indexing for times of minimal system use. Indexing affects performance throughout
the Symantec Data Loss Prevention system, and large data sources can take time to index.
■ Index a data source as soon as you add or modify the corresponding exact data profile,
and re-index the data source whenever you update it. For example, consider a scenario
whereby every Wednesday at 2:00 A.M. you update the data source. In this case you
should schedule indexing every Wednesday at 3:00 A.M. Do not index data sources daily
as this can degrade performance.
■ If you need to update indexes frequently (for example, daily), Symantec recommend that
you use the Remote EDM Indexer.
■ Monitor results and modify your indexing schedule accordingly. If performance is good and
you want more timely updates, for example, schedule more frequent data updates and
indexing.
The Indexing section lets you index the Exact Data Profile as soon as you save it
(recommended) or on a regular schedule as follows:
Table 26-10 Scheduling indexing for Exact Data Profiles for EDM
Parameter Description
Submit Indexing Select this option to index the Exact Data Profile when you click Save.
Job on Save
Submit Indexing Select this option to schedule an indexing job. The default option is No Regular Schedule. If you
Job on Schedule want to index according to a schedule, select a desired schedule period, as described.
Index Once On – Enter the date to index the document profile in the format MM/DD/YY. You can also click the
date widget and select a date.
Until – Select this check box to specify a date in the format MM/DD/YY when the indexing should
stop. You can also click the date widget and select a date.
Index Weekly Day of the week – Select the day(s) to index the document profile.
Until – Select this check box to specify a date in the format MM/DD/YY when the indexing should
stop. You can also click the date widget and select a date.
Index Monthly Day – Enter the number of the day of each month you want the indexing to occur. The number
must be 1 through 28.
Until – Select this check box to specify a date in the format MM/DD/YY when the indexing should
stop. You can also click the date widget and select a date.
Detecting content using Exact Data Matching (EDM) 550
Configuring Exact Data profiles for EDM
See “Mapping Exact Data Profile fields for EDM” on page 545.
See “Creating and modifying Exact Data Profiles for EDM” on page 541.
Action Description
Add EDM profile Click Add Exact Data Profile to define a new Exact Data Profile.
Edit EDM profile To modify an existing Exact Data Profile, click the name of the profile, or click the pencil icon
at the far right of the profile row.
See “Creating and modifying Exact Data Profiles for EDM” on page 541.
Remove EDM profile Click the red X icon at the far right of the profile row to delete the Exact Data Profile from the
system. A dialog box confirms the deletion.
Note: You cannot edit or remove a profile if another user currently modifies that profile, or if a
policy exists that depends on that profile.
Download EDM Click the download profile link to download and save the Exact Data Profile.
profile
This is useful for archiving and sharing profiles across environments. The file is in the binary
*.edm format.
Refresh EDM profile Click the refresh arrow icon at the upper right of the Exact Data screen to fetch the latest status
status of the indexing process.
If you are in the process of indexing, the system displays the message "Indexing is starting."
The system does not automatically refresh the screen when the indexing process completes.
Column Description
Last Active Version The version of the exact data profile and the name of the detection server that runs the profile.
Detecting content using Exact Data Matching (EDM) 551
Configuring EDM policies
Column Description
Status The current status of the exact data profile, which can be any of the following:
■ Next scheduled indexing (if it is not currently indexing)
■ Sending an index to a detection server
■ Indexing
■ Deploying to servers
In addition, the current status of the indexing process for each detection server, which can be
any of the following:
Error messages The Exact Data screen displays any error messages in red.
For example, if the Exact Data Profile is corrupt or does not exist, the system displays an error
message.
Table 26-13 Configure the Content Matches Exact Data policy condition for EDM
1 Configure an EDM Create a new EDM detection rule in a policy, or modify an existing EDM rule.
policy detection rule.
See “Configuring policies” on page 413.
2 Select the fields to The first thing you do when configuring the EDM condition is select each data
match. field that you want the condition to match. You can select all or deselect all fields
at once. The system displays all the fields or columns that were included in the
index. You do not have to select all the fields, but you should select at least 2 or
3, one of which must be unique, such as social security number, credit card
number, and so forth.
3 Choose the number of Choose the number of the selected fields to match from the drop down menu.
selected fields to match. This number represents the number of fields of those selected that must be present
in a message to trigger a match. You must select at least as many fields to match
as the number of data fields you check. For example, if you choose 2 of the
selected fields from the menu, you must have checked at least two fields present
in a message for detection.
See “Ensure data source has at least one column of unique data (EDM)”
on page 602.
4 Select the WHERE The WHERE clause option matches on the specified field value. You specify a
clause to enter specific WHERE clause value by selecting an exact data field from the menu and by
field values to match entering a value for that field in the adjacent text box. If you enter more than one
(optional). value, separate the values with commas.
See “Use a WHERE clause to detect records that meet specific criteria (EDM)”
on page 609.
For example, consider an Exact Data Profile for "Employees" with a "State" field
containing state abbreviations. In this example, to implement the WHERE clause,
you select (check) WHERE, choose "State" from the drop-down list, and enter
CA,NV in the text box. This WHERE clause then limits the detection server to
matching messages that contain either CA or NV as the value for the State field.
Note: You cannot specify a field for WHERE that is the same as one of the
selected matched fields.
5 Ignore data owners Selecting this option implements Data Owner Exception.
(optional).
See “Configuring Data Owner Exception for EDM policy conditions” on page 554.
Detecting content using Exact Data Matching (EDM) 553
Configuring EDM policies
Table 26-13 Configure the Content Matches Exact Data policy condition for EDM (continued)
6 Exclude data field You can use the exclude data field combinations to specify combinations of data
combinations (optional). values that are exempted from detection. If the data appears in exempted pairs
or groups, it does not cause a match. Excluded combinations are only available
when matching 2 or 3 fields. To enable this option, you must select 2 or 3 fields
to match from the _ of the selected fields menu at the top of the condition
configuration.
See “Leverage exception tuples to avoid false positives (EDM)” on page 609.
7 Select an incident Enter or modify the minimum number of matches required for the condition to
minimum. report an incident.
For example, consider a scenario where you specify 1 of the selected fields for
a social security number field and an incident minimum of 5. In this situation the
engine must detect at least five matching social security numbers in a single
message to trigger an incident.
See “Match count variant examples (EDM)” on page 570.
9 Select one or more Select this option to create a compound condition. All conditions must match for
conditions to also the rule to trigger an incident.
match.
You can Add any available condition from the list.
10 Test and troubleshoot See “Test and tune policies to improve match accuracy” on page 453.
the policy.
See “Troubleshooting policies” on page 445.
Detecting content using Exact Data Matching (EDM) 554
Configuring EDM policies
Note: When you configure DOE for the EDM condition, you cannot select a value for Ignore
Sender/Recipient that is the same as one of the matched fields.
Table 26-14 Configuring the Sender/User based on a Directory from an EDM Profile condition
Parameter Description
Where Select this option to have the system match on the specified field values. Specify the values by
selecting a field from the drop-down list and typing the values for that field in the adjacent text box.
If you enter more than one value, separate the values with commas.
For example, for an Employees directory group profile that includes a Department field, you would
select Where, select Department from the drop-down list, and enter Marketing,Sales in the text
box. If the condition is implemented as a rule, in this example a match occurs only if the sender or
user works in Marketing or Sales (as long as the other input content meets all other detection criteria).
If the condition is implemented as an exception, in this example the system ignores from matching
messages from a sender or user who works in Marketing or Sales.
Is Any Of Enter or modify the information you want to match. For example, if you want to match any sender
in the Sales department, select Department from the drop-down list, and then enter Sales in this
field (assuming that your data includes a Department column). Use a comma-separated list if you
want to specify more than one value.
Table 26-15 Configuring the Recipient based on a Directory from an EDM profile condition
Parameter Description
Where Select this option to have the system match on the specified field values. Specify the values by
selecting a field from the drop-down list and typing the values for that field in the adjacent text box.
If you enter more than one value, separate the values with commas.
For example, for an Employees directory group profile that includes a Department field, you would
select Where, select Department from the drop-down list, and enter Marketing, Sales in the text
box. For a detection rule, this example causes the system to capture an incident only if at least one
recipient works in Marketing or Sales (as long as the input content meets all other detection criteria).
For an exception, this example prevents the system from capturing an incident if at least one recipient
works in Marketing or Sales.
Detecting content using Exact Data Matching (EDM) 556
Configuring EDM policies
Table 26-15 Configuring the Recipient based on a Directory from an EDM profile condition
(continued)
Parameter Description
Is Any Of Enter or modify the information you want to match. For example, if you want to match any recipient
in the Sales department, select Department from the drop-down list, and then enter Sales in this
field (assuming that your data includes a Department column). Use a comma-separated list if you
want to specify more than one value.
See “Enable keyword token verification for CJK” on page 848. describes how to enable and
use token verification for CJK keywords.
Enable EDM token verification for CJK
1 Log on to the Enforce Server as an administrative user.
2 Navigate to the System > Servers and Detectors > Overview > Server/Detector Detail
- Advanced Settings screen for the detection server you want to configure.
See “Advanced server settings” on page 285.
3 Locate the parameter EDM.TokenVerifierEnabled.
4 Change the value to true from false (default).
Setting the server parameter EDM.TokenVerifierEnabled = true enables token validation
for CJK token detection.
5 Save the detection server configuration.
6 Recycle the detection server.
EDM.MaximumNumberOfMatches 100 Defines a top limit on the number of matches returned from each
ToReturn RAM index search. For multi-file indices, this limit is applied to each
sub-index search independently before the search results are
combined. As a result the number of actual matches can exceed
this limit for multiple file indices.
EDM.RunProximityLogic true If true (default), this setting runs the token proximity check. The
free-form text proximity is defined by the setting
EDM.SimpleTextProximityRadius. The tabular text proximity
is defined by belonging to the same table row.
Note: Disabling proximity is not recommended because it can
negatively affect the performance of the system.
EDM.SimpleTextProximityRadius 35 Provides the baseline range for proximity checking a matched token.
This value is multiplied by the number of required matches to equal
the complete proximity check range.
Table 26-18 Advanced Settings for EDM indexing and detection (continued)
MessageChain.NumChains Varies This number varies depending on detection server type. It is either
4 or 8. The number of messages, in parallel, that the filereader
processes. Setting this number higher than 8 (with the other default
settings) is not recommended. A higher setting does not substantially
increase performance and there is a much greater risk of running
out of memory. Setting this to less than 8 (in some cases 1) helps
when processing big files, but it may slow down the system
considerably.
Note: Maximum tokens per multi-token and stopwords are calculated and evaluated respectively
during indexing. TheLexer.MaxTokensPerMultiToken and Lexer Stopword Languages Advanced
Server settings are no longer necessary. The stopword language on Enforce is specified in
the indexer.properties file at C:\Program Files\Symantec\Data Loss
Prevention\Indexer\15.5\Protect\config\Indexer.properties. In English, the property
is stopword_languages = en.
Detecting content using Exact Data Matching (EDM) 560
Using multi-token matching with EDM
Characteristic Description
The number of tokens in a single cell is limited to 200 The number of characters is not limited. In the case of a
tokens. CJK token, each character is treated as a single token and
the number of CJK characters is limited to 200 characters.
Whitespace in Latin multi-token cells is considered, but See “Multi-token with spaces (EDM)” on page 561.
multiple whitespaces are normalized to 1.
Detecting content using Exact Data Matching (EDM) 561
Using multi-token matching with EDM
Characteristic Description
Punctuation immediately preceding and following a token See “Multi-token with punctuation (EDM)” on page 563.
or sub-token is always ignored.
See “Additional examples for multi-token cells with
punctuation (EDM)” on page 564.
For proximity range checking the sub-token parts of a See “Proximity matching example for EDM” on page 572.
multi-token are counted as single tokens.
The system does not consider stopwords when matching See “Multi-token with stopwords (EDM)” on page 562.
multi-tokens. In other words, stopwords are not excluded.
Multi-tokens are more computationally expensive than See “Memory requirements for EDM” on page 579.
single tokens and require additional memory for indexing,
loading, and processing.
Cell contains space Bank of America Bank of America Cell with spaces is
multi-token.
Cells contains multiple Bank of America Bank of America Multiple spaces are
spaces normalized to one.
Cells contain space between EDM 傠傫 EDM 傠傫 White spaces between Latin
Latin and CJK characters and CJK characters are
EDM傠傫
ignored.
Detecting content using Exact Data Matching (EDM) 562
Using multi-token matching with EDM
Table 26-21 Cell contains stopwords or single letter or single digit (EDM)
Cell contains stopword. throw other ball throw other ball Common word ("other") is
filtered out during indexing
but not when it is part of a
multi-token.
Cell contains single letter. throw a ball throw a ball Single letter ("a") is filtered
out, but not when it is part of
a multi-token.
Cell contains single digit. throw 1 ball throw 1 ball Unlike single-letter words
that are stopwords, single
digits are never ignored.
Table 26-22 Multi-token cell with Latin and CJK characters examples (EDM)
Cell includes Latin and CJK ABC傠傫 ABC傠傫 Mixed Latin-CJK cell is
characters with no spaces. multi-token.
傠傫ABC 傠傫ABC
Whitespace between Latin
Also matches with:
and CJK characters is
ABC 傠傫 ignored.
傠傥 ABC
Table 26-22 Multi-token cell with Latin and CJK characters examples (EDM) (continued)
Cell includes Latin and CJK ABC 傠傫 ABC 傠傫 Multiple spaces are ignored.
with one or more spaces.
傠傥 ABC 傠傥 ABC
ABC傠傫
傠傫ABC
The WIP setting operates at detection-time to alter how matches are reported. For most EDM
policies you should not change the WIP setting. For a few limited situations, such as account
numbers or addresses, you may need to set IncludePunctuationInWords = false depending
on your detection requirements.
See “Multi-token punctuation characters (EDM)” on page 569.
Table 26-23 lists and explains how multi-token matching works with punctuation.
a.b a.b TRUE Yes The indexed content and the detected content are
exactly the same.
a.b ab TRUE No The indexed content and the detected content are
different.
ab a.b TRUE No The indexed content and the detected content are
different.
FALSE Yes The detected content is treated as "a b" and is therefore
a match.
ab ab TRUE Yes The indexed content and the detected content are
exactly the same
FALSE Yes The indexed content and the detected content are
exactly the same
Table 26-24 Additional use cases for multi-token cells with punctuation (EDM)
Cell contains a physical 346 Guerrero St., Apt. #2 346 Guerrero St., Apt. #2 The indexed content is a
address with punctuation. multi-token cell.
346 Guerrero St Apt 2
Both match because the
punctuation comes at the
beginning or end of the
sub-token parts and is
therefore ignored.
Detecting content using Exact Data Matching (EDM) 565
Using multi-token matching with EDM
Table 26-24 Additional use cases for multi-token cells with punctuation (EDM) (continued)
Cell contains Asian 傠傫##傠傫 傠傫##傠傫 (if WIP true) The indexed content is a
language characters (CJK) single token cell.
with indexed internal
During detection, Asian
punctuation.
language characters (CJK)
with internal punctuation is
affected by the WIP setting.
Thus, in this example 傠傫
##傠傫 matches only if the
WIP setting is true.
Table 26-24 Additional use cases for multi-token cells with punctuation (EDM) (continued)
Cell contains mix of Latin DLP##EDM 傠傫##傠傥 DLP##EDM##傠傫##傠傥 The indexed content is a
and CJK characters with (if WIP true) multi-token cell.
internal punctuation.
DLP##EDM 傠傫##傠傥 (if During detection,
WIP true) punctuation between the
Latin and Asian characters
is treated as a single
whitespace and leading and
trailing punctuation is
ignored.
Table 26-24 Additional use cases for multi-token cells with punctuation (EDM) (continued)
Cell contains mix of Latin DLP EDM 傠傫 傠傥 DLP EDM 傠傫 傠傥 The indexed content is a
and CJK characters with multi-token cell.
DLP#EDM 傠傫#傠傥 (if
internal punctuation.
WIP false) During detection,
punctuation between the
DLP#EDM##傠傫#傠傥 (if
Latin and Asian characters
WIP false)
is treated as a single
whitespace and leading and
trailing punctuation is
ignored. Thus, it matches as
indexed.
Note: It is a best practice to always validate your index against the recognized system patterns
when the data source includes one or more such column fields. See “Map data source column
to system fields to leverage validation (EDM)” on page 605.
The general rule for system-recognized patterns is that the WIP setting does not apply during
detection. Instead, the rules for that particular pattern apply. In other words, if the pattern is
recognized during detection, the WIP setting is not checked. This is always true if the pattern
Detecting content using Exact Data Matching (EDM) 568
Using multi-token matching with EDM
is a string of characters such as an email address, and if the cell contains a number that
conforms to one of the recognized number patterns (such as CCN or SSN).
In addition, even if the pattern is a generic number such as account number that does not
conform to one of the recognized number patterns, the WIP setting may still not apply. To
ensure accurate matching for generic numbers that do not conform to one of the
system-recognized patterns, you should not include punctuation in these number cells. If the
cell contents conforms to one of the system-recognized patterns, the punctuation rules for that
pattern apply and the WIP setting does not.
See “Do not use the comma delimiter if the data source has number fields (EDM)” on page 605.
See Table 26-25 on page 568. lists and describes examples for detecting system-recognized
data patterns.
Caution: This list is not exhaustive. It is provided for informational purposes only to ensure that
you are aware that data that matches system-defined patterns takes precedence and the WIP
setting is ignored. Before deploying your EDM policies into production, you must test detection
accuracy and adjust the index accordingly to ensure that the data that you have indexed
matches as expected during detection.
Table 26-25 Some special use cases for system-recognized data patterns (EDM)
Table 26-25 Some special use cases for system-recognized data patterns (EDM) (continued)
### #### ### ### #### ### Must match exactly. The
pattern ###-####-### does
not match even if WIP is set
to false.
Apostrophe '
Tilde ~
Exclamation point !
Ampersand &
Dash -
Period (dot) .
Detecting content using Exact Data Matching (EDM) 570
Using multi-token matching with EDM
Question mark ?
At sign @
Dollar sign $
Percent sign %
Asterisk *
Caret symbol ^
Open parenthesis (
Close parenthesis )
Open bracket [
Close bracket ]
Open brace {
Close brace }
Forward slash /
Back slash \
Pound sign #
Equal sign =
Plus sign +
3 1 If EDM.HighlightAllMatchesInProximity
= true, EDM matches all tokens within
the proximity window. The token set for
each row is as follows:
1111-1111-1111-1111 1 3 If EDM.HighlightAllMatchesInProximity
Kathy Stevens 123-45-6789 = false, EDM matches the left-most
2 2 tokens for each profile data row. The
token set for each row is as follows:
3 2: if
EDM.HighlightAllMatchesInProximity Row # 1: 1111-1111-1111-1111 Kathy
= false (default) Stevens
For example, assuming the default radius of 35 and a policy set to match 3 out of 4 column
fields, the proximity range is 105 tokens (3 x 35). If the policy matches 2 out of 3 the proximity
range is 70 tokens (35 x 2).
Warning: While you can decrease the value of the proximity radius, Symantec does not
recomment increasing this value beyond the default (35). Doing so may cause performance
issues. See “Configuring Advanced Settings for EDM policies” on page 557.
Table 26-28 shows a proximity matching example based on the default proximity radius setting.
In this example, the detected content produces 1 unique token set match, described as follows:
■ The proximity range window is 105 tokens (35 x 3).
■ The proximity range window starts at the leftmost match ("Stevens") and ends at the
rightmost match ("123-45-6789").
■ The total number of tokens from "Stevens" to the SSN (including both) is 105 tokens.
■ The stopwords "other" and "a" are counted for proximity range purposes.
■ "Bank of America" is a multi-token. Each sub-token part of a multi-token is counted as a
single token for proximity purposes.
Last_Name | Employer | Match 3 of 3 Radius = 35 Zendrerit inceptos Kathy Stevens lorem ipsum pharetra
SSN tokens (default) convallis leo suscipit ipsum sodales rhoncus, vitae dui
nisi volutpat augue maecenas in, luctus id risus magna
Stevens | Bank of America
arcu maecenas leo quisque. Rutrum convallis tortor
| 123-45-6789
urna morbi elementum hac curabitur morbi, nunc dictum
primis elit senectus faucibus convallis surfrent.
Aptentnour gravida adipiscing iaculis himenaeos,
himenaeos a porta etiam viverra. Class torquent uni
other tristique cubilia in Bank of America. Dictumst
lorem eget ipsum. Hendrerit inceptos other sagittis
quisque. Leo mollis per nisl per felis, nullam cras mattis
augue turpis integer pharetra convallis suscipit
hendrerit? Lubilia en mictumst horem eget ipsum.
Inceptos urna sagittis quisque dictum odio hendrerit
convallis suscipit ipsum wrdsrf 123-45-6789.
Detecting content using Exact Data Matching (EDM) 574
Updating EDM indexes to the latest version
1 Upgrade the Enforce Server Refer to the Symantec Data Loss Prevention Upgrade Guide at
to the latest version. http://www.symantec.com/docs/DOC9258 for details.
The latest Enforce Server can continue to receive incidents from older
detection servers during the upgrade process. Policies and other data cannot
be pushed out to older detection servers. There is one-way communication
only between the latest version of Enforce and previous versions of detection
servers.
2 Create a newly-generated Using the latest Enforce Server administration console, create a new EDM
remote EDM profile profile template for remote EDM indexing.
template.
See “Creating an EDM profile template for remote indexing” on page 589.
Download the *.edm profile template and copy it to the remote data source
host system.
See “Downloading and copying the EDM profile file to a remote system”
on page 591.
3 Install the latest version of Install the latest version of the Symantec Data Loss Prevention Remote EDM
the Remote EDM Indexer on Indexer on the remote data source host so that you can index the data source.
the remote data source host.
See “Remote EDM indexing” on page 585.
4 Calculate the memory that Calculate the memory that is required for indexing before you attempt to index
is required to index the data the data source. The Remote EDM Indexer is allocated sufficient memory to
source and adjust the index most data sources. If you have a very large index you may have to
indexer memory setting. allocate more memory.
5 Index the data source using The result of this process is multiple latest-version compatible *.rdx files
the latest Remote EDM that you can load into the latest version of the Enforce Server.
Indexer.
If you have a data source file prepared, run the Remote EDM Indexer and
index it.
See “Remote indexing examples using data source file (EDM)” on page 592.
If the data source is an Oracle database and the data is clean, use the SQL
Preindexer to pipe the data to the Remote EDM Indexer.
See “Remote indexing examples using SQL Preindexer (EDM)” on page 593.
Detecting content using Exact Data Matching (EDM) 576
Updating EDM indexes to the latest version
Table 26-29 Update process using the Remote EDM Indexer (continued)
6 Calculate the memory that You need to calculate how much RAM the detection server requires to load
is required to load and and process the index at run-time. These calculations are required for each
process the index and adjust EDM index you want to deploy.
the detection server memory
See “Memory requirements for EDM” on page 579.
setting for each EDM
detection server host.
7 Update the EDM profile by Copy the *.pdx and *.rdx files from the remote host to the latest Enforce
loading the latest version of Server host file system.
the index.
Load the index into the EDM profile you created in Step 2.
See “Copying and loading remote EDM index files to the Enforce Server”
on page 594.
8 Upgrade one or more EDM Once you have created the latest-version compliant EDM profiles and
detection servers to the upgraded the Enforce Server, you can then upgrade the detection servers.
latest version.
Refer to the Symantec Data Loss Prevention Upgrade Guide at
http://www.symantec.com/docs/DOC9258 for details.
Make sure that you have calculated and verified the memory requirements
for loading and processing multi-token indexes on the detection server.
9 Test and verify the updated To test the upgraded system and updated index, you can create a new policy
index. that references the updated index.
10 Remove out-of-date EDM Once you have verified the new EDM index and policy, you can retire the
indexes. legacy EDM index and policy.
1 Upgrade the Enforce Refer to the Symantec Data Loss Prevention Upgrade Guide at
Server to the latest http://www.symantec.com/docs/DOC9258 for details.
version.
Do not upgrade the EDM detection servers now.
The Enforce Server can continue to receive incidents from older detection servers during
the upgrade process. Policies and other data cannot be pushed out to older detection
servers (one-way communication only between the current version of Enforce and older
detection servers).
2 Create, prepare, and Copy the data source file to the opt/Symantec/DataLoss
copy the data source Prevention/EnforceServer/15.5/Protect/datafiles (Linux) or ProgramData
file to the 15.5 \Symantec\DataLossPrevention\ServerPlatformCommon\15.5\Protect\datafiles
Enforce Server host. (Windows) directory on the upgraded 15.5 Enforce Server host file system.
See “Creating the exact data source file for EDM” on page 535.
See “Preparing the exact data source file for indexing for EDM” on page 537.
See “Uploading exact data source files for EDM to the Enforce Server” on page 539.
3 Calculate memory the Calculate the memory that is required for indexing before you attempt to index the data
memory that is source.
required to index the
See “Memory requirements for EDM” on page 579.
data source and
update the indexer
memory setting.
4 Create a new Create a new EDM profile using the latest version of the Enforce Server administration
latest-version-compliant console.
EDM profile and index
Choose the option Reference Data Source on Manager Host for uploading the data
the data source file.
source file (assuming that you copied it to the /datafiles directory).
See “Creating and modifying Exact Data Profiles for EDM” on page 541.
5 Calculate the memory You need to calculate how much RAM the detection server requires to load and process
that is required to load the index and run-time. These calculations are required for each EDM index you want
and process the index to deploy and the memory adjustments are cumulative.
at run-time. Adjust the
See “Memory requirements for EDM” on page 579.
memory settings for
each EDM detection
server host.
Detecting content using Exact Data Matching (EDM) 578
Updating EDM indexes to the latest version
6 Upgrade the EDM Once you have created the latest-version-compliant EDM profile you can then upgrade
detection servers to the detection servers.
the latest version.
Refer to the Symantec Data Loss Prevention Upgrade Guide at
http://www.symantec.com/docs/DOC9258 for details.
Make sure that you have calculated and verified the memory requirements for loading
and processing multi-token indexes on the detection server.
7 Test and verify the To test the upgraded system and updated index, you can create a new policy that
updated index. references the updated index.
8 Remove out-of-date Once you have verified the new EDM index and policy, you can retire the legacy EDM
EDM indexes. index and policy.
Note: Indexes that are created for versions earlier than 14.0 do not work with version
14.5 and later.
Enforce Server error 2928 One or more profiles are out of date and must be reindexed.
event
See “Updating EDM indexes to the latest version” on page 574.
Enforce Server error 2928 Check the Manage > Data Profiles > Exact Data page for more details.
event detail The following EDM profiles are out of date: Profile X, Profile XY, and so
on.
System Event error 2928 One or more profiles are out of date and must be reindexed.
Exact Data Profile error N/A This profile is out of date, and must be reindexed.
Detecting content using Exact Data Matching (EDM) 579
Memory requirements for EDM
Table 26-32 Workflow for determining memory requirements for EDM indexes
1 Determine the memory See “Overview of configuring memory and indexing the data
that is required to index source for EDM” on page 580.
the data source.
2 Increase the indexer See “Determining requirements for both local and remote
memory according to your indexers for EDM” on page 580.
calculations.
3 Determine the memory See “Detection server memory requirements for EDM”
that is required to load the on page 582.
index on the detection
server.
Detecting content using Exact Data Matching (EDM) 580
Memory requirements for EDM
Table 26-32 Workflow for determining memory requirements for EDM indexes (continued)
4 Increase the detection See “Increasing the memory for the detection server (File
server memory according Reader) for EDM” on page 584.
to your calculations.
Table 26-33 Memory requirements for indexing the data source for EDM
1 Estimate the memory requirements See “Determining requirements for both local and remote
for the indexer. indexers for EDM” on page 580.
2 Increase the indexer memory. The next step is to increase the memory allocated to the
indexer. The procedure for increasing the indexer memory
differs depending on whether you are using the EDM indexer
local to the Enforce Server or the Remote EDM Indexer.
3 Restart the Symantec DLP Manager You must restart this service after you have changed the
service. memory allocation.
4 Index the data source. The last step is to index the data source. You need to do this
before you calculate remaining memory requirements.
You can schedule indexing for multiple indexes serially (at different times) or in parallel (at the
same time). When indexing serially, you need to allocate memory to accommodate the indexing
of the biggest index. When indexing in parallel, you need to allocate memory to accommodate
the indexing of all indexes that you are creating at that time.
Serial indexing
If you create the indexes serially (no two are created in parallel), the memory requirement for
the biggest index is:
2 billion cells – 0 .5 billion default x 3 bytes = 4.5 GB rounded to 5 GB additional memory.
This memory requirement includes the 2 GB (2048 MB) default memory for the Enforce Server
and the 5 GB additional system memory.
Table 26-34 provides examples for how the data source size affects indexer memory
requirements for serial indexes.
Table 26-34 Examples for indexer memory requirements-serial indexing for EDM
100 million cells 2048 MB (default) No additional RAM is needed for the indexer.
500 million cells 2048 MB (default) No additional RAM is needed for the indexer.
1 billion cells 4 GB If you have a single data source with 1 billion cells (for
example, 10 columns by 100 million rows), you need extra
system memory for 0.5 billion cells (1 billion cells – 0.5 million
default) 0.5 million x 3 bytes, or 1.5 GB of RAM (rounded to
2 GB) to index the data source. This amount is added to the
default indexer RAM allotment.
2 billion cells 7 GB If you have a single data source with 2 billion cells (for
example, 10 columns by 200 million rows), you need extra
system memory for 1.5 billion cells (2 billion cells – 0.5 million
default) 1.5 million x 3 bytes, or 4.5 GB of RAM (rounded to
5 GB) to index the data source.
Note: For CJK language indexes, or indexes that are predominantly multi-token, these formulas
should use a multiplier of 4 bytes instead of 3 bytes. In both of these cases, a 350-million cell
data source is supported by default.
The Java heap memory settings for a detection server are set in the Enforce Server
administration console at the Server Detail - Advanced Server Settings page, using the
BoxMonitor.FileReaderMemory. property. The format is -Xrs -Xms1200M -Xmx4G. You don't
needed to change the system memory setting, but make sure that the detection server has
enough free memory available.
Detecting content using Exact Data Matching (EDM) 583
Memory requirements for EDM
Note: When you update this setting, only change the -Xmx value in this property. For example,
only change "4G." to a new value, and leave all other values the same.
The examples in Table 26-35 show the settings for five different situations.
Table 26-35 EDM detection server Java heap memory settings and addition system memory
examples
2 million * 13 bytes =
25 MB
1 billion * 13 bytes =
12 GB
2 billion * 13 bytes =
24GB
1.2 GB + 12 GB + 24
GB = 37.2 GB
Detecting content using Exact Data Matching (EDM) 584
Memory requirements for EDM
Table 26-35 EDM detection server Java heap memory settings and addition system memory
examples (continued)
5 billion * 13 bytes =
60.5 GB
Increasing the memory for the detection server (File Reader) for
EDM
This topic provides instructions for increasing the File Reader memory allocation for a detection
server. These instructions assume that you have performed the necessary calculations.
To increase the memory for detection server processing
1 In the Enforce Server administration console, navigate to the Server Detail - Advanced
Server Settings screen for the detection server where the EDM index is deployed or to
be deployed.
2 Locate the following setting: BoxMonitor.FileReaderMemory.
Detecting content using Exact Data Matching (EDM) 585
Remote EDM indexing
3 Change the -Xmx4G value in the following string to match the calculations you have made.
-Xrs -Xms1200M -Xmx4G -XX:PermSize=128M -XX:MaxPermSize=256M
For example: -Xrs -Xms1200M -Xmx11G -XX:PermSize=128M -XX:MaxPermSize=256M
4 Save the configuration and restart the detection server.
To compute the additions system memory required to run your indexes, enter the following
information:
1. Obtain the number of cells in each index (you can specify up to 10 indexes).
2. Enter that number into # of cells in Index.
When you change any value, the spreadsheet updates the Required RAM field.
The value in the Required RAM field is the additional system memory that is required to run
the indexes specified.
For example, if copying the confidential data source file to the Enforce Server presents a
potential security or logistical issue, you can use the Remote EDM Indexer to create the
cryptographic index directly on the data source host before moving the index to the Enforce
Server. If you are upgrading to the latest Symantec Data Loss Prevention version you may
want to use the Remote EDM Indexer to update your existing EDM indexes.
See “About the Remote EDM Indexer” on page 586.
See “About the SQL Preindexer for EDM” on page 586.
The Remote EDM Indexer is a standalone tool that lets you index the data source file directly
on the data source host.
See “System requirements for remote EDM indexing” on page 587.
Step 1 Install the Remote EDM See “Installing the Remote EDM Indexer” on page 588.
Indexer on a computer that
is not part of the Symantec
Data Loss Prevention
system.
Step 2 Create an Exact Data Profile On the Enforce Server, generate an EDM Profile template using the *.edm
on the Enforce Server to use file name extension and specifying the exact number of columns to be indexed.
with the Remote EDM
See “Creating an EDM profile template for remote indexing” on page 589.
Indexer.
Step 3 Copy the Exact Data Profile Download the profile template from the Enforce Server and copy it to the
file to the computer where remote data source host computer.
the Remote EDM Indexer
See “Downloading and copying the EDM profile file to a remote system”
resides.
on page 591.
Detecting content using Exact Data Matching (EDM) 588
Remote EDM indexing
Step 4 Run the Remote EDM If you have a cleansed data source file, use the RemoteEDMIndexer with
Indexer and create the index the -data, -profile and -result options.
files.
If the data source is an Oracle database, use the SqlPreindexer and the
RemoteEDMIndexer to index the data source directly with the -alias (oracle
DB host), -username and -password credentials, and the -query string
or -query_path
Step 5 Copy the index files from the Copy the resulting *.pdx and *.rdx files from the remote machine to the
remote machine to the Enforce Server host at C:\ProgramData\Symantec\DataLossPrevention
Enforce Server. \EnforceServer\15.5\Protect\index.
See “Copying and loading remote EDM index files to the Enforce Server”
on page 594.
Step 6 Load the index files into the Update the EDM profile by loading the externally generated index.
Enforce Server.
Submit the profile for indexing.
See “Copying and loading remote EDM index files to the Enforce Server”
on page 594.
Step 7 Troubleshoot any problems Verify that indexing is started and completes.
that occur during the
Check the system events for Code 2926 ("Created Exact Data Profile" and
indexing process.
"Data source saved").
Step 8 Create policy with EDM You should see the column data for defining the EDM condition.
condition.
See “Configuring the Content Matches Exact Data policy condition for EDM”
on page 551.
7 In the Error Threshold text box, enter the maximum percentage of rows that can contain
errors.
If, during indexing of the data source, the number of rows with errors exceeds the
percentage that you specify here, the indexing operation fails.
8 In the Column Separator Char field, select the type of character that is used in your data
source to separate the columns of data.
9 In the File Encoding field, select the character encoding that is used in your data source.
If Latin characters are used, select the ISO-8859-1 option. For East Asian languages, use
either the UTF-8 or UTF-16 options.
10 Click Next to map the column headings from the data source to the profile.
11 In the Field Mappings section, map the Data Source Field to the System Field for each
column by selecting the column name from the System Field drop-down list.
The Data Source Field lists the number of columns you specified at the previous screen.
The System Field contains a list of standard column headings. If any of the column
headings in your data source match the choices available in the System Field list, map
each accordingly. Be sure that you match the selection in the System Field column to its
corresponding numbered column in the Data Source Field.
For example, for a data source that you have specified in the profile as having three
columns, the mapping configuration may be:
12 If a Data Source Field does not map to a heading value in the options available from the
System Field column, click the Advanced View link.
In the Advanced View the system displays a Custom Name column beside the System
Field column.
Enter the correct column name in the text box that corresponds to the appropriate column
in the data source.
Optionally, you can specify the data type for the Custom Name you entered by selecting
the data type from the Type drop-down list. These data types are system-defined. Click
the description link beside the Type name for details on each system-defined data type.
Detecting content using Exact Data Matching (EDM) 591
Remote EDM indexing
13 If you intend to use the Exact Data Profile to implement a policy template that contains
one or more EDM rules, you can validate your profile mappings for the template. To do
this, select the template from the Check mappings against policy template drop-down
list and click Check now. The system indicates any unmapped fields that the template
requires.
14 Do not select any Indexing option available at this screen, since you intend to index
remotely.
15 Click Finish to complete the profile creation process.
Remote EDM Indexer with data source Specify data source file, EDM profile, Use when you have a cleansed data
file. output directory. source file; use for upgrading to the
latest vesion.
Remote EDM Indexer with SQL Query DB and pipe output to stdin of Requires Oracle DB and clean data.
Preindexer Remote EDM Indexer.
See “Remote indexing examples using
SQL Preindexer (EDM)” on page 593.
For example:
RemoteEDMIndexer -data=C:\EDMIndexDirectory\CustomerData.dat
-profile=C:\EDMIndexDirectory\RemoteEDMProfile.edm
-result=C:\EDMIndexDirectory\
This command generates an EDM index using the local data source tabular text file
CustomerData.dat and the local RemoteEDMProfile.edm file that you generated and copied
from the Enforce Server to the remote host, where \EDMIndexDirectory is the directory for
placing the generated index files.
When the generation of the indexes is successful, the utility displays the message "Successfully
created index" as the last line of output.
In addition, the following index files are created and placed in the -result directory:
■ ExternalDataSource.CustomerData.pdx
■ ExternalDataSource.CustomerData.rdx
Detecting content using Exact Data Matching (EDM) 593
Remote EDM indexing
For example:
With this command the SQL Preindexer utility connects to the Oracle database and runs the
SQL query to retrieve name and salary data from the employee table. The SQL Preindexer
returns the result of the query to stdout (the command console). The SQL query must be in
quotes. The Remote EDM Indexer command runs the utility and reads the query result from
the stdin console. The Remote EDM Indexer indexes the data using the ExportEDMProfile.edm
profile as specified by the profile file name and local file path.
When the generation of the indexes is successful, the utility displays the message "Successfully
created index" as the last line of output.
In addition, the utility places the following generated index files in the EDMIndexDirectory
-result directory:
■ ExternalDataSource.CustomerData.pdx
■ ExternalDataSource.CustomerData.rdx
Here is another example using SQL Preindexer and Remote EDM Indexer commands:
Here the SQL Preindexer command queries the CUST.customer_account table in the database
for the account_id, amount_owed, and availble_credit records. The result is piped to the
Remote EDM Indexer which generates the index files based on the CustomerData.edm profile.
The -verbose option is used for troubleshooting.
As an alternative to the -query SQL string you can use the -query_path option and specify
the file path and name for the SQL query (*.sql). If you do not specify a query or query path
the entire DB is queried.
Copying and loading remote EDM index files to the Enforce Server
The following files are created in the -result directory when you remotely index a data source:
■ ExternalDataSource.<DataSourceName>.pdx
■ ExternalDataSource.<DataSourceName>.rdx.0 -
ExternalDataSource.<DataSourceName>.rdx.11
After you create the index files on a remote machine, the files must be copied to the Enforce
Server, loaded into the previously created remote EDM profile, and indexed.
See “Creating an EDM profile template for remote indexing” on page 589.
To copy and load the files on the Enforce Server
1 Go to the directory where the index files were generated. (This directory is the one specified
in the -result option.)
2 Copy all of the index files with .pdx and .rdx extensions to the index directory on the
Enforce Server. This directory is located at
C:\ProgramData\Symantec\DataLossPrevention\ServerPlatformCommon\15.5\Index
(Windows) or /var/Symantec/DataLossPrevention/ServerPlatformCommon/15.5/index
(Linux).
3 From the Enforce Server administration console, navigate to the Manage > Policies >
Exact Data screen.
This screen lists all the Exact Data Profiles in the system.
4 Click the name of the Exact Data Profile you used with the Remote EDM Indexer.
5 To load the new index files, go to the Data Source section of the Exact Data Profile and
select Load Externally Generated Index.
Detecting content using Exact Data Matching (EDM) 595
Remote EDM indexing
The SQL Preindexer provides a command-line interface. The syntax for running the utility is
as follows:
-alias Oracle DB connect string Specifies the database alias that is used to connect to the
database in the following format:
Required
@//oracle_DB_host:port/SID
For example:
-alias=@//myhost:1521/ORCL
-alias=@//localhost:1521/CUST
-driver Oracle JDBC driver class Specifies the JDBC driver class, for example:
oracle.jdbc.driver.OracleDriver.
-encoding Character encoding Specifies the character encoding of the data to index. The
(iso-8859-1) default is iso-8859-1.
-query-query_path SQL query This option specifies the SQL query to perform. The statement
must be enclosed in quotes.
If you omit the -query option the utility indexes the entire
database.
SQL script Specifies the file name and local path that contains a SQL
query to run. Must be full path.
-separator Output column separator Specifies whether the output column separator is a comma,
(tab) pipe, or tab. The default separator is a tab.
-subprotocol Oracle thin driver Specifies the JDBC connect string subprotocol (for example,
oracle:thin).
Required
-verbose Print verbose output for Displays a statistical summation of the operation when it is
debugging. complete.
If you are on Linux, change users to the “SymantecDLP” user before running the Remote EDM
Indexer. (The installation program creates the “SymantecDLP” user.)
The Remote EDM Indexer provides a command line interface. The syntax for running the utility
is as follows:
-data Data source to be indexed Specifies the data source to be indexed. If this option is not
(stdin) specified, the utility reads data from stdin.
Required if you use a Required if using data source file and not the SQL Preindexer.
tabular text file
-encoding Character encoding of data Specifies the character encoding of the data to index. The
to be indexed (ISO-8859-1) default is ISO-8859-1.
-ignore_date Ignore expiration date of the Overrides the expiration date of the Exact Data Profile if the
EDM profile profile has expired. (By default, an Exact Data Profile expires
after 30 days.)
-profile File containing the EDM Specifies the Exact Data Profile to be used. This profile is the
profile one that is selected by clicking the “download link” on the
Exact Data screen in the Enforce Server management console
Required
Detecting content using Exact Data Matching (EDM) 598
Remote EDM indexing
-result Directory to place the Specifies the directory where the index files are generated.
resulting indexes
Required
-verbose Display verbose output Displays a statistical summation of the indexing operation
when the index is complete.
3 Locate the create_error_file property and change the “false” setting to “true.”
4 Save and close the Indexer.properties file.
The Remote EDM Indexer logs errors in a file with the same name as the data file being
indexed and the .err suffix.
The rows of data that are listed in the error file are not encrypted. Safeguard the error file
to minimize any security risk from data exposure.
See “About the SQL Preindexer for EDM” on page 586.
Index files not Use the -verbose option in Specifying the verbose option when running the Remote EDM
generated the command to reveal error Indexer provides a statistical summary of information about the
message. indexing operation after it completes. This information includes
the number of errors and where the errors occurred.
"Failed to create Verify file and path names. Verify that you included the full path and proper file name for
index" the -data file and the -profile file (*.edm). The paths must
be local to the host.
"Cannot compute
index"
"Unable to generate
index"
"Destination is not a Directory path not correct. Verify that you properly entered the full path to the destination
directory" directory for the required -result argument.
Detecting content using Exact Data Matching (EDM) 600
Remote EDM indexing
*.idx file instead Did not use -data argument The -data option is required if you are using a data source file
of *.rdx file and not the SQL Preindexer. In other words, the only time you
do not use the -data argument is when you are using the SQL
Preindexer.
If you run the Remote EDM Indexer without the -data option
and no SQL Preindexer query, you get an *.idx and *.rdx
file that cannot be used as for the EDM index. Rerun the index
using the -data option or a SQL Preindexer -query or
-query-path.
In addition, you may encounter errors when you index large amounts of data. Often the set of
data contains a data record that is incomplete, inconsistent, or incorrectly formatted. Data rows
that contain more columns than expected or incorrect data types often cannot be properly
indexed and are unrecognized during indexing. The rows of data with errors cannot be indexed
until those errors are corrected and the Remote EDM Indexer rerun. Symantec provides a
couple of ways to get information about any errors and the ultimate success of the indexing
operation.
To see the actual rows of data that the Remote EDM Indexer failed to index, modify the
Indexer.properties file.
Ensure that the data source file contains at least one See “Ensure data source has at least one column of unique
column of unique data. data (EDM)” on page 602.
Eliminate duplicate rows and blank columns before See “Cleanse the data source file of blank columns and
indexing. duplicate rows (EDM)” on page 603.
To reduce false positives, avoid single characters, quotes, See “Remove ambiguous character types from the data
abbreviations, numeric fields with less than 5 digits, and source file (EDM)” on page 604.
dates.
Understand multi-token indexing and clean up as See “Understand how multi-token cell matching functions
necessary. (EDM)” on page 604.
Use the pipe (|) character to delimit columns in your data See “Do not use the comma delimiter if the data source
source. has number fields (EDM)” on page 605.
Review an example cleansed data source file. See “Ensure that the data source is clean for indexing
(EDM)” on page 605.
Map data source column to system fields to leverage See “Map data source column to system fields to leverage
validation during indexing. validation (EDM)” on page 605.
Leverage EDM policy templates whenever possible. See “Leverage EDM policy templates when possible”
on page 606.
Include the column headers as the first row of the data See “Include column headers as the first row of the data
source file. source file (EDM)” on page 606.
Check the system alerts to tune Exact Data Profiles. See “Check the system alerts to tune profile accuracy
(EDM)” on page 607.
Use stopwords to exclude common words from matching. See “Use stopwords to exclude common words from
detection (EDM)” on page 607.
Automate profile updates with scheduled indexing. See “Use scheduled indexing to automate profile updates
(EDM)” on page 607.
Detecting content using Exact Data Matching (EDM) 602
Best practices for using EDM
Match on two or three columns in an EDM rule. See “Match on 3 columns in an EDM condition to increase
detection accuracy” on page 608.
Leverage exception tuples to avoid false positives. See “Leverage exception tuples to avoid false positives
(EDM)” on page 609.
Use a WHERE clause to detect records that meet a See “Use a WHERE clause to detect records that meet
specific criteria. specific criteria (EDM)” on page 609.
Use the minimum matches field to fine tune EDM rules. See “Use the minimum matches field to fine tune EDM
rules” on page 610.
Consider using Data Identifiers in combination with EDM See “Combine Data Identifiers with EDM rules to limit the
rules. impact of two-tier detection” on page 610.
Include an email address field in the Exact Data Profile for See “Include an email address field in the Exact Data
profiled DGM. Profile for profiled DGM (EDM)” on page 610.
Use profiled DGM for Network Prevent for Web identity See “Use profiled DGM for Network Prevent for Web
detection identity detection (EDM)” on page 611.
Ensure data source has at least one column of unique data (EDM)
EDM is designed to detect combinations of data fields that are globally unique. At a minimum,
your EDM index must include at least one column of data that contains a unique value for each
record in the row. Column data such as account number, social security number, and credit
card number are inherently unique, whereas state or zip code are not unique, nor are names.
If you do not include at least one column of unique data in your index, your EDM profile will
not accurately detect the data you want to protect.
A unique column field is a column that has mostly unique values. It can have duplicate values,
but not more than the number set in term_commonority_threshold. The default value for this
setting is 10.
Table 26-42 describes the various types of unique data to include in your EDM indexes, as
well as fields that are not unique. You can include the non-unique fields in your EDM indexes
as long as you have at least one column field that is unique.
Detecting content using Exact Data Matching (EDM) 603
Best practices for using EDM
The following data fields are usually unique: The following data fields are not unique:
■ Account number ■ First name
■ Bank Card number ■ Last name
■ Phone number ■ City
■ Email address ■ State
■ Social security number ■ Zip code
■ Tax ID number ■ Password
■ Drivers license number ■ PIN number
■ Employee number
■ Insurance number
Cleanse the data source file of blank columns and duplicate rows
(EDM)
The data source file should be as clean as possible before you create the EDM index, otherwise
the resulting profile may create false positives.
When you create the data source file, avoid including empty cells or blank columns. Blank
columns or fields count as “errors” when you generate the EDM profile. A data source error is
either an empty cell or a cell with the wrong type of data (a name appearing in a phone number
column). The error threshold is the maximum percentage of rows that contain errors before
indexing stops. If the errors exceed the error threshold percentage for the profile (by default,
5%), the system stops indexing and displays an indexing error message.
The best practice is to remove blank columns and empty cells from the data source file, rather
than increasing the error threshold. Keep in mind that if you have many empty cells, it may
require a 100% error threshold for the system to create the profile. If you specify 100% as the
error threshold, the system indexes the data source without checking for errors.
In addition, do not fill empty cells or blank fields with bogus data so that the error threshold is
met. Adding fictitious or "null" data to the data source file will reduce the accuracy of the EDM
profile and is strongly discouraged. Content you want to monitor should be legitimate and not
null.
See “About cleansing the exact data source file for EDM” on page 530.
See “Preparing the exact data source file for indexing for EDM” on page 537.
See “Ensure that the data source is clean for indexing (EDM)” on page 605.
Detecting content using Exact Data Matching (EDM) 604
Best practices for using EDM
Remove ambiguous character types from the data source file (EDM)
You cannot have extraneous spaces, punctuation, and inconsistently populated fields in the
data source file. You can use tools such as Stream Editor (sed) and AWK to remove these
items from you data source file or files before indexing them.
Single characters Single character fields should be eliminated from the data source file. These are
more likely to cause false positives, since a single character is going to appear
frequently in normal communications.
Abbreviations Abbreviated fields should be eliminated from the data source file for the same reason
as single characters.
Small numbers Indexing numeric fields that contain less than 5 digits is not recommended because
it will likely yield many false positives.
Dates Date fields are also not recommended. Dates are treated like a string, so if you are
indexing a date, such as 12/6/2007, the string will have to match exactly. The indexer
will only match 12/6/2007, and not any other date formats, such as Dec 6, 2007,
12-6-2007, or 6 Dec 2007. It must be an exact match.
If multi-token matching is enabled, any punctuation that is next to a space is ignored. Therefore,
punctuation before and after a space is ignored.
Lastly, do not change the WIP setting from "true" to "false" unless you are sure that is the
result you want to achieve. You should only set WIP = false when you need to loosen the
matching criteria, such as account numbers where formatting may change across messages.
Make sure you test detection results to ensure you are getting the matches you expect.
See “Memory requirements for EDM” on page 579.
Do not use the comma delimiter if the data source has number fields
(EDM)
Of the three types of column delimiters that you can choose from for separating the fields in
the data source file (pipe, tab, semicolon, or comma), the pipe, semicolon, or tab (default) is
recommended. The comma delimiter is ambiguous and should not be used, especially if one
or more fields in your data source contain numbers. If you use a comma-delimited data source
file, make sure there are no commas in the data set other than those used as column delimiters.
Note: Although the system also treats the pound sign, equals sign, plus sign, semicolon, and
colon characters as separators, you should not use these because like the comma their
meaning is ambiguous.
Include column headers as the first row of the data source file (EDM)
When you extract the source data to the data source file, you should include the column
headers as the first row in the data source file. Including the column headers will make it easier
for you to identify the data you want to use in your policies.
The column names reflect the column mappings that were created when the exact data profile
was added. If there is an unmapped column, it is called Col X, where X is the column number
(starting with 1) in the original data profile.
If the Exact Data Profile is to be used for DGM, the file must have a column with a heading of
email, or the DGM will not appear in the Directory EDM drop-down list (at the remediation
page).
Detecting content using Exact Data Matching (EDM) 607
Best practices for using EDM
only matches the SSN field, there may still be false positives because there are other types
of nine-digit numbers that may trigger a match.)
If you choose "2 of the selected fields" to match, the policy will still produce false positives
because there are potential worthless combinations of data: First Name + Last Name, Phone
Number + Email Address, or First Name + Phone Number.
If you choose to match on 4 or all 5 of the column fields, you will not be able to exclude certain
data field combinations because that option is only available for matches on 2 or 3 fields.
See “Leverage exception tuples to avoid false positives (EDM)” on page 609.
In this example, to ensure that you generate the most accurate match, the recommendation
is that you choose "3 of the selected fields to match." In this way you can reduce the number
of false positives while using one or more exceptions to exclude the combinations that do not
present a concern, such as First Name + Last Name + Phone Number
Whatever number of fields you choose to match, ensure that you are including the column
with the most unique data, and that you are matching at least 2-column fields.
For example, if you wanted to match only on an Exact Data Profile for "Employees" with a
"State" field containing certain states, you could configure the match where "State" equals
"CA,NV". This rule then causes the detection engine to match a message that contains either
CA or NV as content.
Combine Data Identifiers with EDM rules to limit the impact of two-tier
detection
When implementing EDM policies, it is recommended that you combine Data Identifiers (DIs)
rules with the EDM condition to form compound policies. As reference, note that all
system-provided policy templates that implement EDM rules also implement Data Identifier
rules in the same policy.
Data Identifiers and EDM are both designed to protect personally identifiable information (PII).
Including Data Identifiers with your EDM rules make your policies more robust and reusable
across detection servers because unlike EDM rules Data Identifiers are executed on the
endpoint and do not require two-tier detection. Thus, if an endpoint is off the network, the Data
Identifier rules can protect PII such as SSNs.
Data Identifier rules are also useful to use in your EDM policies while you are gathering and
preparing your confidential data for EDM indexing. For example, a policy might contain the
US SSN Data Identifier and an EDM rule for as yet unindexed or unknown SSNs.
Include an email address field in the Exact Data Profile for profiled
DGM (EDM)
You must include the appropriate fields in the Exact Data Profile to implement profiled DGM.
See “Creating the exact data source file for profiled DGM for EDM” on page 537.
If you include the email address field in the Exact Data Profile for profiled DGM and map it to
the email data validator, email address will appear in the Directory EDM drop-down list (at
the remediation page).
Detecting content using Exact Data Matching (EDM) 611
Best practices for using EDM
Use profiled DGM for Network Prevent for Web identity detection
(EDM)
If you want to implement DGM for Network Prevent for Web, use one of the profiled DGM
conditions to implement identity matching. For example, you may want to use identity matching
to block all web traffic for a specific users. For Network Prevent for Web, you cannot use
synchronized DGM conditions for this use case.
See “Creating the exact data source file for profiled DGM for EDM” on page 537.
See “Configuring the Sender/User based on a Profiled Directory condition” on page 944.
Chapter 27
Detecting content using
Indexed Document
Matching (IDM)
This chapter includes the following topics:
Note: The Mac Agent is substantially the same as the Windows Agent, except that the Mac
Agent does not support two-tier detection, and different channels are supported on the Mac
Agent and Windows Agent. See “Overview of Mac agent detection technologies and policy
authoring features” on page 2280.
Partial file contents Match of discrete passages of extracted and normalized Detection server
file contents.
DLP Agent
See “Using IDM to detect exact and partial file contents”
on page 621.
Exact file Match is based on the binary signature of the file. Detection server
See “Using IDM to detect exact files” on page 620. DLP Agent
Exact file contents Match is an exact match of the extracted and normalized Detection server
file contents.
Note: Symantec recommends
See “Using IDM to detect exact and partial file contents” that you use partial file contents
on page 621. matching rather than exact file
contents matching.
Agent IDM The DLP Agent supports partial contents matching in See “Agent IDM detection”
addition to exact file matching locally on the endpoint. on page 614.
Server IDM The detection server performs exact file matching, exact See “Server IDM detection”
file contents matching, and partial file contents matching. on page 615.
Two-tier IDM The DLP Agent sends the data to the detection server for See “Two-tier IDM detection”
policy evaluation. on page 615.
Agent IDM is enabled by default for a newly installed Endpoint Server. Agent IDM for macOS
is enabled by default for newly installed Endpoint Servers, but disabled if you upgrade. In the
case of all upgrades, if you want to use agent IDM you must enable it and reindex your IDM
profiles so that the endpoint index is generated and made available for download by DLP
Agents.
If you use two-tier detection for IDM on the Windows endpoint, make sure that you understand
the performance implications of two-tier detection.
See “Two-tier detection for DLP Agents” on page 395.
Symantec recommends that you contact Symantec Support before reconfiguring properties
files.
During indexing, the system stores the document source by changing \Program
Files\Symantec\DataLossPrevention\ServerPlatformCommon\15.5\Protect\documentprofiles
(on Windows) or
/var/Symantec/DataLossPrevention/ServerPlatformCommon/15.5/documentprofiles
(on Linux).
The result of the indexing process is four separate indexes: one for detection servers (the
server index) and three for DLP Agents (the endpoint indexes). All indexes are generated
regardless of whether or not you are licensed for Endpoint Prevent or Endpoint Discover. On
the Enforce Server, the system stores the indexes in \Program
Files\Symantec\DataLossPrevention\EnforceServer\15.5\Protect\index (on Windows)
or /var/Symantec/DataLossPrevention/EnforceServer/15.5/index (on Linux).
See “About the server index files and the agent index files” on page 618.
For most IDM deployments there is no need to configure the indexer. If necessary you can
configure key settings for the indexer using the file \Program
Files\Symantec\DataLossPrevention\EnforceServer\15.5\Protect\config\Indexer.properties.
Note: Symantec recommends that you contact Symantec Support for guidance if you decide
to modify a properties file. Modifying properties incorrectly can cause serious issues with the
operation of Symantec Data Loss Prevention.
Note: To index documents on a SharePoint server using the Remote SMB Share option, you
must deploy the Enforce Server to a supported Windows Server operating system host. Data
Loss Prevention depends on Windows NTLM services to mount a WebDAV server.
About the server index files and the agent index files
When you create an Indexed Document Profile and index a document data source, the
system generates four index files, one for the server and three for the endpoint. The indexes
are generated regardless of whether or not you are licensed for a particular detection server
or the DLP Agent.
See “About index deployment and logging” on page 619.
The server index is a binary file named DocSource.rdx. The server index supports exact file,
exact file contents, and partial file contents matching. If the document data source is large,
the server index may span multiple *.rdx files.
The endpoint index is comprised of one secure binary file, either EndpointDocSource.rdx or
LegacyEndpointDocSource.rdx for backward compatibility with 14.0 and 12.5 Agents. The
endpoint index supports exact file and partial file contents matching. EncryptedDocSource.rdx
is for endpoint partial matching.
See “Supported forms of matching for IDM” on page 613.
To create the index entries for exact file and exact file contents matching, the system uses the
MD5 message-digest algorithm. This algorithm is a one-way hash function that takes as input
a message of arbitrary length and produces as output a 128-bit message-digest or "fingerprint"
of the input. If the message input is a text-based document that the system can extract contents
from, such as a Microsoft Word file, the system extracts all of the file content, normalizes it by
removing whitespace, punctuation, and formatting, and creates a cryptographic hash. Otherwise,
if the message input is a file that the system cannot extract the contents from, such as an
image file, small file, or unsupported file type, the system creates a cryptographic hash based
on the binary signature of the file.
Note: To improve accuracy across different versions of the Enforce Server and DLP Agent,
only binary matching MDF is supported on the agent, whether or not the file contains text.
that the server index does not contain actual document content. Table 27-3 summarizes the
types of matching supported by the endpoint and server indexes.
Table 27-3 Types of matching supported by the endpoint and server indexes
Binary file, custom file, A single cryptographic hash based Exact file binary DocSource.rdx
small file, encapsulated on the binary signature of the file
EndpointDocSource.rdx
file
LegacyEndpointDocSource.rdx
Agent only: Text-based
file that the system can
extract the contents
from.
index deployment process, the Enforce Server stops trying to deploy the index. When the
detection server comes back online the Enforce Server deploys the index to the detection
server. The same is true for DLP Agents. There is no way to manually copy the endpoint index
to the endpoint host and have the DLP Agent recognize the index.
Table 27-4 summarizes how IDM indexes are deployed and the logs files to check to
troubleshoot index deployment.
performs exact file matching for files containing a very small amount of text, as well as files
that were encapsulated when indexed, even if text-based.
As an optimization for exact file type matching in Endpoint IDM detection, the system checks
the byte size of the file before computing the run-time hash for comparison against the index.
If the byte size does not match size of the indexed file there is no need to compute the exact
file hash. The system does not consider the file format when creating the exact file fingerprint.
Table 27-5 summarizes exact file type matching behavior.
File format from which the Proprietary or non-supported If the system cannot extract the contents from the file
system cannot extract the document format format, you can use IDM to detect that specific file
contents using exact binary matching.
Binary file GIF, MPG, AVI, CAD design, You can use IDM to detect binary file types from
JPEG files, audio/video files which you cannot extract the contents, such as
images, graphics, JPEGs, etc. Binary file detection
is not supported on stream-based channels.
File containing a small CAD files and Visio diagrams A file containing a small amount of text is treated as
amount of text a binary file even if the contents are text-based and
can have their contents extracted.
Encapsulated file Any file that is encapsulated when If a document data source file is encapsulated in an
indexed (even if text-based and archive file, the file contents of the subfile cannot be
can have their contents extracted and only the binary signature of the file can
extracted); for example, Microsoft be fingerprinted. This does not apply to document
Word file archived in a ZIP file archive that are indexes.
document type the system can extract the file contents from, such as Microsoft Office documents
(Word, Excel, PowerPoint), PDF, and many more.
See “Supported formats for content extraction” on page 980.
An exact file contents match means that the normalized extracted content from the file matches
exactly the content of a file that has been indexed. With partial matching on the endpoint, using
a 90% threshold generates 90% to 100% content matches. These are less strict than the
previous exact content matches and may, in some cases, match even if there are some minor
differences between the scanned file and the indexed file.
The system does not consider the file format or file size when creating the cryptographic hash
for the index or when checking for an exact file contents match against the index. A document
might contain much more content, but the system detects only the file contents that are indexed
as part of the Indexed Document Profile. For example, consider a situation where you index
a one-page document, and that one-page document is included as part of a 100-page document.
The 100-page document is considered an exact match because its content matches the
one-page document exactly.
See “About the server index files and the agent index files” on page 618.
For text-based files from which you can extract the contents, in addition to creating the MD5
fingerprint for exact file contents matching, the system uses a rolling hash algorithm to register
discrete sections or passages of content. In this case the system uses a selection method to
store hashed sections of content; not all text is hashed in the index. The index does not contain
actual document content.
Table 27-6 lists the requirements to match file contents using IDM.
Requirement Description
File formats from The system must be able to extract the the file format and extract file content. Data Loss
which you can extract Prevention supports content extraction for over 100 file types.
the contents
See “Supported formats for content extraction” on page 980.
Unencapsulated file To match file contents, the source file cannot be encapsulated in an archive file when the
source file is indexed. If a file in the document source is encapsulated in an archive file, the
system does not index the file contents of the encapsulated file. Any encapsulated file is
considered for exact matches only, like image files and other unsupported file formats.
See “Do not compress files in the document source” on page 649.
Note: The exception to this is the main ZIP file that contains the document data source, for
those upload methods that use an archive file. See “Creating and modifying Indexed Document
Profiles” on page 629.
Detecting content using Indexed Document Matching (IDM) 623
Introducing Indexed Document Matching (IDM)
Requirement Description
Minimum amount of For exact file contents matching, the source file must contain at a minimum 50 characters of
text normalized text before the extracted coProgram
Files\Symantec\DataLossPrevention\EnforceServertent is indexed. Normalization involves
the removal of punctuation and whitespace. A normalized character therefore is either a
number or a letter. This size is set by the min_normalized_size=50 parameter in the file
\Program Files\Symantec\DataLossPrevention
\EnforceServer\15.5\Protect\config\Indexer.properties. If file contains less
than 50 normalized characters, the system performs an exact file match against the file binary.
Note: Symantec advises that you consult with Symantec Support for guidance if you need to
change an advanced setting or edit a properties file. Incorrectly updating a properties file can
have unintended consequences.
For partial file contents matching, there must be at least 300 normalized characters. However,
the exact length is variable depending on the file contents and encoding.
Maximum amount of The default maximum size of the document that can be processed for content extraction at
text run-time is 30,000,000 bytes. If your document is over 30,000,000 bytes you need to increase
the default maximum size in Advanced server settings. Contact Symantec Support for
assistance when changing Advanced server settings, to avoid any unintended consequences.
Table 27-7 Minimum document exposure settings for the IDM condition
Exact file matching File contents All of the extracted and Microsoft Word
normalized file contents, if
See “Using IDM to detect
the file is text-based and
exact and partial file
from which the content is not
contents” on page 621.
extractable
Exact content matching The endpoint performs Microsoft Word, JPG, MP3
binary matching on all files.
Partial content matching File contents Discrete passages of text Microsoft Word
Note: White listing only applies to partial file contents matching; it does not apply to exact file
contents matching. The white listing file is not checked at run-time when the system computes
the cryptographic hashes for exact file contents matching.
Detecting content using Indexed Document Matching (IDM) 625
Configuring IDM profiles and policy conditions
1 Identify the content you want to protect and See “Using IDM to detect exact and partial file contents”
collect the documents that contain this on page 621.
content.
See “Using IDM to detect exact files” on page 620.
2 Prepare the documents for indexing. See “Preparing the document data source for indexing”
on page 625.
3 Whitelist headers, footers, and boilerplate See “White listing file contents to exclude from partial
text. matching” on page 627.
4 Create an Indexed Document Profile and See “Creating and modifying Indexed Document Profiles”
specify the document source. on page 629.
5 Configure any document source filters. See “Filtering documents by file name” on page 640.
6 Schedule indexing as necessary. See “Scheduling document profile indexing” on page 643.
7 Configure one ore more IDM policy conditions See “Configuring the Content Matches Document Signature
or exceptions. policy condition” on page 646.
8 Test and troubleshoot your IDM See “Troubleshooting policies” on page 445.
implementation.
1 Collect all of the documents Collect all of the documents you want to index and put them in a folder.
you want to protect.
See “About the document data source” on page 616.
2 Uncompress all the files you The files you index should be in their unencapsulated, uncompressed state.
want to index. Check the document collection to make sure none of the files are
encapsulated in an archive file, such as ZIP, TAR, or RAR. If a file is
embedded in an archive file, extract the source file from the archive file and
remove the archive file.
See “Using IDM to detect exact and partial file contents” on page 621.
3 Separate the documents if To protect a large amount of content and files, create separate collections
you have more than for each set of documents over 1,000,000 files in size, with all files in their
1,000,000 files to index. unencapsulated, uncompressed state. For example, if you have 15,000,000
documents you want to index, separate the files by folders, one folder
containing 750,000 files, and another folder containing the remaining 750,000
files. or, you can change the value of
com.vontu.profiles.documents.maxIndexSize in the
Indexer.properties to accommodate larger data sets. The rule of thumb is
2 GB/1 million documents.
See “Create separate profiles to index large document sources” on page 653.
4 Decide how you are going to The indexing process is a separate process that runs on the Enforce Server.
make the document source To index the document source you must make the files accessible to the
files available to the Enforce Enforce Server. You have several options. Decide which one works best
Server. for your needs and proceeding accordingly.
See “Using the remote SMB share option to index file shares” on page 637.
5 Configure the document The next step is to configure the document profile, or, alternatively, if you
profile. want to exclude specific document content from detection, whitelist it.
See “White listing file contents to exclude from partial matching” on page 627.
Detecting content using Indexed Document Matching (IDM) 627
Configuring IDM profiles and policy conditions
See “Use white listing to exclude non-sensitive content from partial matching” on page 651.
Table 27-10 describes the process for excluding document content using white listing.
1 Copy the content you want to Copy only noncritical content you want to exclude, such as standard
exclude from matching into a text boilerplate text and document headers and footers, to the text file. By
file. default, for file contents matching the file to be indexed must contain
at least 300 characters. This default setting applies to the
Whitelisted.txt file as well. For whitelisted text you can change
this default setting.
2 Save the text file as The Whitelisted.txt file is the source file for storing content you
Whitelisted.txt. want to exclude from matching.
4 Configure the Indexed When you index the document data source, the Enforce Server looks
Document Profile and generate for the Whitelisted.txt file. If the file exists, the Enforce Server
the index. copies it to Whitelisted.x.txt, where x is a unique identification
number corresponding to the Indexed Document Profile. Future
indexing of the profile uses the profile-specific Whitelisted.x.txt
file, not the generic Whitelisted.txt file.
Action Description
Add IDM profile Click Add Document Profile to create a new Indexed Document Profile.
Edit IDM profile Click the name of the Document Profile, or click the pencil icon to the far right of the profile, to
modify an existing Document Profile.
Remove IDM profile Click the red X icon next to the far right of the document profile row to delete that profile from
the system. A dialog box confirms the deletion.
Note: You cannot edit or remove a profile if another user currently modifies that profile, or if a
policy exists that depends on that profile.
Refresh IDM profile Click the refresh arrow icon at the upper right of the Indexed Documents screen to fetch the
status latest status of the indexing process. If you are in the process of indexing, the system displays
the message "Indexing is starting." The system does not automatically update the screen when
the indexing process is complete.
Column Description
Column Description
Detection server The name of the detection server that indexes the Document Profile and the Document Profile
version.
Click the triangle icon beside the Document Profile name to display this information. It appears
beneath the name of the Document Profile.
Location The location of the file(s) on the Enforce Server that the system has profiled and indexed.
Documents The number of documents that the system has indexed for the document profile.
Status The current status of the document indexing process, which can be any of the following:
In addition, beneath the status of the indexing process, the system displays the status of each
detection server, which can be any of the following:
Error messages The Indexed Document screen also displays any error messages in red (for example, if the
document profile is corrupted or does not exist).
1 Navigate to the screen Manage You must be logged on to the Enforce Server administration console
> Data Profiles > Indexed as an administrator or policy author.
Documents.
See “Policy authoring privileges” on page 375.
2 Click Add Document Profile. Select an existing Indexed Document Profile to edit it.
3 Enter a Name for the Document Choose a name that describes the data content and the index type
Profile. (for example, "Research Docs IDM"). The name is limited to 255
characters.
4 Select the Document Source Select one of the five options for indexing the document data source,
method for indexing. depending on how large your data source is and how you have
packaged it.
The Remote IDM Indexer is a standalone tool that lets you index
your confidential documents and files locally on the systems where
these files are stored. See Remote IDM Indexing See “About the
Remote IDM Indexer” on page 655. for more information.
■ See “Using the remote SMB share option to index SharePoint
documents” on page 637.
Detecting content using Indexed Document Matching (IDM) 632
Configuring IDM profiles and policy conditions
5 Optionally, configure any Filters. You can specify file name and file size filters in the document profile.
The filters tell the system which files to include or ignore during
indexing.
Enter files to include in the File Name Include Filters field, or enter
files to exclude in the File Name Exclude Filters field.
Select file sizes to ignore, either Ignore Files Smaller Than or Ignore
Files Larger Than.
6 Select one of the Indexing As part of creating a document profile, you can set up a schedule for
options. indexing the document source.
You do not have to select an indexing option to create a profile that
you can reference in a policy, but you must select an indexing option
to generate the index and actually detect matches using an IDM policy.
2 Click Configure Partial The Configure Partial Content Matching page displays a
Matching. snapshot of all profiles that are deployed at the time you
access the page, along with their estimated current size.
Note: The Configure Partial Content Matching page is not
accessible while any IDM profile is being indexed.
4 Click Save.
Note: The sum of all deployed profiles on the endpoint cannot
exceed the value of Endpoint Total Profile Size (MB), which
is set to a default 60 MB. To change this value, enter a
different value in the Endpoint Total Profile Size (MB) box.
After you click Save, the profiles that you have selected have
partial matching enabled. Click Refresh to ensure that you
have the latest status of the indexing operation.
Table 27-15 Requirements for using the Upload Document Archive to Server Now option
Requirement Description
ZIP file only The document archive must be a ZIP file; no other encapsulation formats are supported
for this option.
50 MB or less You cannot use this option if the document archive ZIP file is more than 50 MB because
files exceeding that size limit can take too long to upload and slow the performance of the
Enforce Server. If the document archive ZIP file is over 50 MB, use the Reference Archive
on Enforce Server method instead.
UTF-8 file names only The IDM indexing process fails (and presents you with an "unexpected error") if the
document archive (ZIP file) contains non-ASCII file names in encodings other that UTF-8.
If the ZIP file contains files with non-ASCII file names, use one of the following options
instead to make the files available to the Enforce Server for indexing:
Note: If the ZIP file is less than 50 MB, you can use the Upload Document Archive to Server
Now option instead. See “Uploading a document archive to the Enforce Server” on page 633.
To use the Reference Archive on Enforce Server option, you copy the ZIP file to the \Program
Files\Symantec\DataLossPrevention\EnforceServer\Protect\documentprofiles folder
on the Enforce Server file system host. Once you have copied the ZIP file to the Enforce
Server, you can select the document source from the pull-down menu at the Add Document
Profile screen. See “Creating and modifying Indexed Document Profiles” on page 629.
To reference the document archive on the Enforce Server describes the procedure for using
the Reference Archive on Enforce Server option.
To reference the document archive on the Enforce Server
1 Copy the ZIP file to the Enforce Server.
■ On Windows, copy the ZIP file to directory \Program
Files\Symantec\DataLossPrevention\ServerPlatformCommon\15.1\Protect\documentprofiles
Note: The system deletes the document data source file after the indexing process
completes.
Table 27-16 Requirements to use the option Reference Archive on Enforce Server
Requirement Description
ZIP file only The document archive must be a ZIP file; no other encapsulation formats are supported
for this option.
The ZIP file can be at the most 2 GB. Consider using a third-party solution (such as Secure
FTP), to copy the ZIP file securely to the Enforce Server.
subfile not archived Make sure the subfiles are proper and not encapsulated in an archive (other than the
top-level profile archive).
See “Do not compress files in the document source” on page 649.
UTF-8 file names only Do not use this method if any of the names of the files you are indexing contain non-ASCII
file names.
Use either of the following options instead:
Note: If the files you index include a file that is more than 2 GB in size, the system indexes all
the files except the 2 GB file. This only applies to the Use Local Path on Enforce Server
option. It does not apply to the Reference Archive on Enforce Server option.
Detecting content using Indexed Document Matching (IDM) 637
Configuring IDM profiles and policy conditions
Note: Symantec Data Loss Prevention does not delete documents after indexing when you
use the Use Remote SMB Share option.
Note: To index documents on a SharePoint server using the Remote SMB Share option, you
must deploy the Enforce Server to a supported Windows Server operating system host. Data
Loss Prevention depends on Windows NTLM services to mount a WebDAV server.
Table 27-17 provides the procedure for remotely indexing SharePoint documents using WebDAV
1 Enable WebDAV for See “Enabling WebDAV for Microsoft IIS” on page 639.
SharePoint.
2 Start the WebClient service. From the computer where the Enforce Server is installed, start the WebClient
service using the "Services" console. If this service is "disabled," right-click it
and select Properties. Enable the service, set it to Manual, then Start it.
Note: You must have administrative privileges to enable this service.
3 Access the SharePoint From the computer where your Enforce Server is installed, access SharePoint
instance. using your browser and the following address format:
http://<server_name>:port
5 Locate the documents to In SharePoint, navigate to the documents you want to scan. Often SharePoint
scan. documents are stored at the Home > Shared Documents screen. Your
documents may be stored in a different location.
6 Find the UNC path for the In SharePoint for the documents you want to scan, select the option Library
documents. > Open with Explorer. Windows Explorer should open a window and display
the documents. Look in the Address field for the path to the documents. This
address is the UNC path you need to scan the documents remotely. For
example: \\protect-x64\Shared Documents. Copy this path to the
Clipboard or a text file.
7 Create the IDM Index. See “Creating and modifying Indexed Document Profiles” on page 629.
Detecting content using Indexed Document Matching (IDM) 639
Configuring IDM profiles and policy conditions
9 Verify success. At the Manage > Data Profiles > Indexed Documents screen you should see
that the index was successfully created. Check the "Status" and the number
of documents indexed. If the index was successfully created you can now use
it to create IDM policies.
11 Click Finish.
12 Right-click the virtual directory that you created and select Properties.
13 In the Virtual Directory tab, select the option "A redirection to a URL" and click Create.
The alias name is populated in the Application Name field.
14 Enter the SharePoint site URL in the "Redirect to" field and click OK. WebDAV is now
enabled for this SharePoint instance.
Filter Description
File Name Include Filters If the File Name Include Filters field is empty, matching is performed on all documents
in the document profile. If you enter anything in the File Name Include Filters field, it is
treated as an inclusion filter. In this case the document is indexed only if it matches the
filter you specify.
For example, if you enter *.docx in the File Name Include Filters field, the system
indexes only the *.docx files in the document source.
File Name Exclude Filters The Exclude Filters field lets you specify the documents to exclude in the matching
process.
If you leave the Exclude Filters field empty, the system performs matching on all
documents in the ZIP file or file share. If you enter any values in the field, the system
scans only those documents that do not match the filter.
The system treats forward slashes (/) and backslashes (\) as equivalent. The system ignores
whitespace at the beginning or end of the pattern. File name filtering does not support escape
characters, so you cannot match on literal question marks, commas, or asterisks.
Table 27-19 describes the syntax accepted by the File Name Filters feature. The syntax for
the Include and Exclude filters is the same.
Operator Description
Table 27-20 provides sample filters and descriptions of behavior if you enter them in the File
Name Include Filters field:
*.txt,*.docx The system indexes only .txt and .docx files in the ZIP file or file share, ignoring
everything else.
?????.docx The system indexes files with the .docx extension and files with five-character
names, such as hello.docx and stats.docx, but not good.docx or
marketing.docx.
Detecting content using Indexed Document Matching (IDM) 642
Configuring IDM profiles and policy conditions
*/documentation/*,*/specs/* The system indexes only files in two subdirectories below the root directory, one
called "documentation" and the other called "specs."
Example with wildcards and IDM indexing fails or ignores the filter setting if the File Name Includes / Excludes
sub-directories: filter string starts with an alphanumeric character and includes a wildcard, for
example: l*.txt. The workaround is to configure the include/exclude filter with
*\scan_dir\l*.txt
the filter string as indicated in this example, that is, *\scan_dir\l*.txt.
For example, the filter 1*.txt does not work for a file path
\\dlp.symantec.com\scan_dir\lincoln-LyceumAddress.txt. However,
if the filter is configured as *\scan_dir\l*.txt, the indexer acknowledges the
filter and index the file.
Filter Description
Ignore Files Smaller Than To exclude files smaller than a particular size:
For example, to prevent indexing of files smaller than one kilobyte (1 KB), enter 1 in
the field and select KB from the corresponding drop-down list.
Detecting content using Indexed Document Matching (IDM) 643
Configuring IDM profiles and policy conditions
Filter Description
Ignore Files Larger Than To exclude files larger than a particular size:
■ Enter a number in the field for Ignore Files Larger Than.
■ Select the appropriate unit of measure (Bytes, KB, or MB) from the drop-down list.
For example, to prevent indexing of files larger than two megabytes (2 MB), enter 2
in the field and select MB from the corresponding drop-down list.
Note: The Enforce Server can index only one document profile at a time. If one indexing
process is scheduled to start while another indexing process is running, the new process does
not begin until the first process completes.
Parameter Description
Index Once On – Enter the date to index the document profile in the format MM/DD/YY. You can also click
the date widget and select a date.
Until – Select this check box to specify a date in the format MM/DD/YY when the indexing
should stop. You can also click the date widget and select a date.
Index Weekly Day of the week – Select the day(s) to index the document.
Until – Select this check box to specify a date in the format MM/DD/YY when the indexing
should stop. You can also click the date widget and select a date.
Detecting content using Indexed Document Matching (IDM) 644
Configuring IDM profiles and policy conditions
Parameter Description
Index Monthly Day – Enter the number of the day of each month you want the indexing to occur. The number
must be 1 through 28.
Until – Select this check box to specify a date in the format MM/DD/YY when the indexing
should stop. You can also click the date widget and select a date.
low_threshold_k=50
Detecting content using Indexed Document Matching (IDM) 645
Configuring IDM profiles and policy conditions
4 Change the numerical portion of the parameter value to reflect the wanted minimum
number of characters that are allowed in Whitelisted.txt.
For example, to change the minimum to 30 characters, modify the value to look like the
following:
low_threshold_k=30
The value for this parameter must match the min_normalized_size value. The default
for min_normalized_size is 50.
5 Save the file.
For more information on IDM configuration and customization, see the article "Understanding
IDM configuration and customization" at http://www.support.symantec.com/doc/TECH234899
at the Symantec Support Center.
6 Change the value to either "ON" or "OFF" (case insensitive) depending on your
requirements.
See Table 27-23 on page 646.
7 Click Save at the top of the page to save the changes.
8 Apply the agent configuration to the agent group or groups.
See “Applying agent configurations to an agent group” on page 2412.
Table 27-23 Advanced agent settings for exact match IDM on the endpoint
Action Description
Choose a percentage between 10% and 90% to match document contents partially.
Select the components to Select one of the available message components to match on:
Match On.
■ Body – The content of the message.
■ Attachments – Any files that are attached to or transferred by the message.
Configure additional Select this option to create a compound condition. All conditions must be met to trigger or
conditions to Also Match. except a match.
You can Add any available condition from the drop-down menu.
Test and tune the policy. See “Test and tune policies to improve match accuracy” on page 453.
See “Use parallel IDM rules to tune match thresholds” on page 654.
Consideration Description
Reindex IDM profiles after upgrade. See “Reindex IDM profiles after upgrade” on page 649.
Do not compress documents whose content you want to See “Do not compress files in the document source”
fingerprint. on page 649.
Prefer partial matching over exact matching on the DLP See “Prefer partial matching over exact matching on the
Agent. DLP Agent” on page 650.
Do not index text-based documents without content. See “Do not index empty documents” on page 649.
Be aware of the limitations of exact matching. See “Understand limitations of exact matching” on page 650.
Use white listing to exclude partial file contents from See “Use white listing to exclude non-sensitive content
matching and reduce false positives. from partial matching” on page 651.
Filter non-critical documents from indexing to reduce false See “Filter documents from indexing to reduce false
positives. positives” on page 652.
Change the index max size to index more than 1,000,000 See “Create separate profiles to index large document
documents. sources” on page 653.
Use remote indexing for large document sets. See “Remote IDM indexing” on page 655.
Use scheduled indexing to automate profile updates. See “Use scheduled indexing to keep profiles up to date”
on page 653.
Use multiple IDM rules in parallel to establish and tune See “Use parallel IDM rules to tune match thresholds”
match thresholds. on page 654.
Detecting content using Indexed Document Matching (IDM) 649
Best practices for using IDM
other blank PPTX files produce exact file contents matches because the resulting MD5 of the
extracted content is the same.
Note: This behavior has not been observed with XLSX files; that is, false positives do not get
created if the blank files are different.
See “Using IDM to detect exact and partial file contents” on page 621.
Note: White listing does not apply to exact file or exact file contents matching.
Note: White listing is not available for exact file or file contents matching; it is only available
for partial content matching.
IDM Use
Configuration
IDM Use
Configuration
See “Use white listing to exclude non-sensitive content from partial matching” on page 651.
See “Filter documents from indexing to reduce false positives” on page 652.
threshold percentage, such as 80% for documents with a high match percentage, 50% for
documents with a medium match percentage, and 10% with a low match percentage. Using
this approach helps you filter out false positives and establish an accurate Minimum Document
Exposure setting for each IDM index you deploy as part of your policies.
Feature Description
Feature Description
Secure upload to Enforce UI for uploading the preindex to the Enforce Server
User must provide password to complete the
indexing process.
Indexing the document data source using the GUI edition (Windows
only)
To configure the UI edition of the Remote IDM Indexer, you enter the parameters into the
required fields. Optionally you can provide additional parameters, such as a whitelist file for
filters.
On successful completion of indexing, the preindex file (*.prdx) is generated. You move this
file to the Enforce Server to complete the indexing process.
Figure 27-1 shows the GUI edition of the Remote IDM Indexer.
Table 27-29 provides instructions for configuring the GUI edition of the Remote IDM Indexer.
Detecting content using Indexed Document Matching (IDM) 657
Remote IDM indexing
Table 27-29 Configuring the Remote IDM Indexer using the GUI edition
1 Enter the Source URI path. The source URI is the local file path (directory folder) where the files to be
indexed are stored. It can also be a shared file system path accessible by
the host.
If the document data source requires credentials you provide them in the
URI Credentials section.
2 Enter the Output File Specify the file path and name for the preindex file that the tool generates.
name.
Include the *.prdx file extension when you specify the output file name.
3 Optionally, enter the Specify the file path to the whitelist.txt file.
Whitelist File path.
Text in the whitelist file is ignored during detection for server-based partial
matching.
4 Optionally, enter one or Enter one or more file names to include for indexing or to exclude for indexing.
more File Name Filters.
The File Name Include Filter includes the named files for indexing.
The File Name Exclude Filter excludes the named files from indexing.
The format for the include and exclude filters accepts both comma-separated
and newline-separated values.
If you use a filter, use one type but not both. For example, if you choose to
use a file name include filter, do not also provide a file name exclude filter.
7 Click Run to index the data Click Run to start the indexing process.
source immediately.
Alternatively, you can click Schedule to schedule indexing. The tool opens
the Windows Task Utility.
See “Scheduling remote indexing with the Remote IDM Indexer app for
Windows” on page 659.
Detecting content using Indexed Document Matching (IDM) 659
Remote IDM indexing
Table 27-29 Configuring the Remote IDM Indexer using the GUI edition (continued)
8 Enter the Password for the For security purposes you must provide a password for the pre-index file.
pre-index file.
The password must meet the one of the following requirements:
The password you enter here is required to load the preindex into the Enforce
Server for indexing.
9 Verify indexing progress. When you click Run, the status bar shows the scanning completion
percentage.
Scheduling remote indexing with the Remote IDM Indexer app for
Windows
If you use the Windows GUI version of the Remote IDM Indexer, you can schedule or edit a
task directly from the tool. The following screen shots illustrate the process.
See “To schedule indexing using the Windows GUI version” on page 659.
See “To edit an existing scheduled task using the Windows GUI” on page 661.
To schedule indexing using the Windows GUI version
1 Click Schedule to open the dialog. See “Scheduling remote indexing with the Remote
IDM Indexer app for Windows” on page 659.
2 Click Create to create a new scheduled task. Or, if you already have a task created, click
Edit.
You are prompted to provide a UTF8-encoded password file in cleartext for the scheduled
job. Access to this file should be limited to the appropriate user, such as your Protect user.
Click Create and provide the credentials to the Windows host.
Detecting content using Indexed Document Matching (IDM) 660
Remote IDM indexing
3 Enter the user name and password for the Windows host where the Task Scheduler is
installed.
When you enter the appropriate credentials (generally administrator privileges are required),
the Remote IDM Indexer creates a new task in the Windows Task Scheduler. The tool
displays a dialog indicating that the task was successfully created and provides you with
the name of the task. See Figure 27-3 on page 660.
4 Click OK to close the dialog.
After you complete this operation with Windows the interface appears.
5 Select the SymantecDLP folder in the Task Scheduler Library.
Notice to the right that there is a task created named "Remote IDM Indexer <time-stamp>".
See Figure 27-4 on page 661.
6 Double-click the created task.
This action brings up the Window Task Scheduler properties dialog for this task. Using
this dialog you can schedule when the Remote IDM Indexer should run. Refer to the Task
Scheduler help for details on using the Windows Task Scheduler.
Incremental indexing
You can incrementally index a remote data source by specifying an existing preindex file
(*.prdx) in the command line argument when you run the tool.
Detecting content using Indexed Document Matching (IDM) 662
Remote IDM indexing
In the GUI version of the tool you can browse to and select an existing *.prdx file for the
Output File path.
The indexing process appends newly indexed files and file contents to the existing preindex
entries.
The tool compares the last modified date of the file. If the file has been modified after the file
that was preindexed, the tool updates the preindex with the changes that were made to the
file. If the date the file was modified is the same, the pre-index is not updated. If you change
any include, exclude, or size filters in your existing preindex file, those filters are applied to
any previously indexed files. For example, for a remote data source with ten .docx files and
ten .pptx files, if your first remote indexing job has no filters, all files are indexed. If you add
an exclude filter for .docx files (-exclude_filter=*.docx) and run the indexing job again,
the .docx files are removed from the index and only the .pptx files remain.
You copy the *.prdx file to the following directory on the Enforce Server host on Windows:
C:\Program
Files\Symantec\DataLossPrevention\ServerPlatformCommon\15.5\documentprofiles
or on Linux:
/var/Symantec/DataLossPrevention/ServerPlatformCommon/15.5/documentprofiles.
You can use FTP or FTP/S to copy the *.prdx file to the Enforce Server host file system.
Note: Make sure that the Enforce user who is reading and loading the .prdx file has permission
to enable copying and loading of the file.
See “Loading the remote index file into the Enforce Server” on page 663.
Note: If you have not copied the preindex file to the proper directory on the Enforce Server
host on Windows: C:\Program
Files\Symantec\DataLossPrevention\ServerPlatformCommon\15.5\documentprofiles
or on Linux:
/var/Symantec/DataLossPrevention/ServerPlatformCommon/15.5/documentprofiles,
the file does not appear in the drop-down field for selection.
Minimum: 50
documents 30 MB per upload
Single, specific Text-based
business use case (primarily) No size limit per
Negative Approximately the Content you do
category.
same amount as not want to protect
the positive yet thematically
category. related to the
positive category.
Base false positive rate The percentage of the content in the negative training set that is statistically similar to the
(%) positive content.
Base false negative Rrate The percentage of the content in the positive training set that is statistically similar to
(%) negative content.
Detecting content using Vector Machine Learning (VML) 667
Introducing Vector Machine Learning (VML)
Similarity Description
Similarity Threshold The Similarity Threshold is a configurable parameter between 0 and 10 that is unique to each
VML profile. The default setting is 10, which requires the most similar match between the VML
profile features and the detected message content. As such, this setting is likely to produce
fewer incidents. A setting of 0 produces the most number of matches, many of which are likely
to be false positives.
Similarity Score The Similarity Score is a read-only run-time statistic between 0 and 10 reported by the system
based on the detection results of a VML policy. To report an incident, the Similarity Score must
be higher than the Similarity Threshold, otherwise the VML policy does not report a match.
Where you have a VML policy that references a never-accepted VML profile, the result of this
configuration depends on the type of detection server. Table 28-4 describes the behavior:
Discover Server Discover scanning does not begin until all policy dependencies are loaded.
A Discover scan based on a VML policy does not start until the referenced
VML profile is accepted. In this case the system displays a message in the
Discover scanning interface that indicates that the scan waits on the
dependency to load.
Network and Endpoint For a simple rule, or compound rule where the conditions are ANDed, the
Servers entire rule fails because the VML condition cannot match. If this is the only
rule in the policy, the policy does not work.
For a policy where there are multiple rules that are ORed, only the VML rule
fails; the other rules in the policy are evaluated.
Step 1 Collect the example documents for Collect a representative number of example documents that contain
training the system. the positive content that you want to protect and the negative
content you want to ignore.
Step 2 Create a new VML profile. Define a new VML profile based on the specific business category
of data from which you have derived your positive and negative
training sets.
Step 3 Upload the example documents. Upload the example positive and negative training sets separately
to the Enforce Server.
Step 4 Train the VML profile. Train the system to learn the type of content you want to protect
and generate the VML profile.
Step 5 Accept or reject the trained profile. Accept the trained profile to deploy it. Or, reject the profile, update
one or both of the training sets (by adding or removing example
documents), and restart the training process.
Step 6 Create a VML policy and test Create a VML policy that references the VML profile.
detection.
See “Configuring the Detect using Vector Machine Learning Profile
condition” on page 679.
Step 7 Tune the VML profile. Adjust the Similarity Threshold setting as necessary to optimize
detection results.
Step 8 Follow VML best practices. See “Best practices for using VML” on page 687.
Note: You must have Enforce Server administrator privileges to create VML profiles.
Detecting content using Vector Machine Learning (VML) 670
Configuring VML profiles and policy conditions
Note: You can upload individual documents. However, we recommended that you upload a
document archive (such as ZIP, RAR, or TAR) that contains the recommended (250) or
minimum (50) number of example documents. The maximum upload size is 30 MB. You can
partition the documents across archives if you have more than 30 MB of data to upload. See
“About the content you train” on page 665.
5 Navigate the file system to where you have stored the example documents.
6 Choose the file to upload and click Open.
7 Verify that you have chosen the correct category of content: Positive or Negative.
If you mismatch the upload (select Negative but upload a Positive document archive), the
resulting profile is inaccurate.
8 Click Submit to upload the document archive to the Enforce Server.
The system displays a message indicating if the file successfully uploaded. If the upload
was successful, the document archive appears in the New Documents table. This table
displays the document type, name, size, date uploaded, and the user who uploaded it. If
the upload was not successful, check the error message and retry the upload. Click the
X icon in the Remove column to delete an uploaded document or document archive from
the training set.
9 Click Upload Contents to repeat the process for the other training set.
The profile is not complete and cannot be trained until you have uploaded the minimum
number of positive and negative example documents.
See Table 28-1 on page 666.
10 Once you have successfully uploaded both training sets you are ready to train the VML
profile.
See “Training VML profiles” on page 672.
Step 1 Enable training mode. Select the VML profile you want to train from the Manage > Data Profiles >
Vector Machine Learning screen. Or, create a new VML profile.
Click Manage Profile to the far right of the Current Profile tab. The system
displays the profile for training in the Temporary Workspace tab.
See “Working with the Current Profile and Temporary Workspace tabs”
on page 670.
Step 2 Upload the training Familiarize yourself with the training set requirements and recommendations.
content.
See “About the content you train” on page 665.
Upload the positive and the negative training sets in separate document archives
to the Enforce Server.
Step 3 Adjust the memory The default value is "High" which generally results in the best training set accuracy
allocation (only if rates. Typically you do not need to change this setting. For some situations you
necessary). may want to choose a "Medium" or "Low" memory setting (for example, deploying
the profile to the endpoint).
Step 4 Start the training Click Start Training to begin the profile training process.
process. During the training process, the system:
Step 5 Verify training When the training process completes, the system indicates if the training profile
completion. was successfully created.
If the training process failed, the system displays an error. Check the debug log
files and restart the training process.
Note: If you previously accepted the profile, the system also displays the Current
Profile statistics for side-by-side comparison.
Step 6 Accept or reject the If the training process is successful, the system prompts you to accept or reject
training profile. the training profile. Your decision is based on the Accuracy Rate from Training
percentages.
See “About the base accuracy from training percentage rates” on page 666.
To accept or reject the training profile:
■ Click Accept to save the training results as the active Current Profile.
Once you accept the training profile, it appears in the Current Profile tab
and the Temporary Workspace tab is removed.
■ Click Reject to discard the training results.
The profile remains in the Temporary Workspace tab for editing. You can
adjust one or both of the training sets by adding or removing documents and
retraining the profile.
See “Managing training set documents” on page 676.
Note: A trained VML profile is not active until you accept it. The system lets you
create a policy based on a VML profile that has not been trained or accepted.
However, the VML profile is not deployed to that policy until the profile is accepted.
See “About using unaccepted VML profiles in policies” on page 667.
Detecting content using Vector Machine Learning (VML) 675
Configuring VML profiles and policy conditions
Step 7 Test and tune the Once you have successfully trained and accepted the VML profile, you can now
profile. use it to define policy rules and tune the VML profile.
See “Configuring the Detect using Vector Machine Learning Profile condition”
on page 679.
See “About the Similarity Threshold and Similarity Score” on page 667.
Note: For more information, refer to the Symantec Data Loss Prevention Vector
Machine Learning Best Practices Guide, available at the Symantec Support
Center at (http://www.symantec.com/docs/DOC8733).
Note: You must have Enforce Server administrator privileges to manage and create VML
profiles.
Action Description
Create new profiles. Click New Profile to create a new VML profile.
View and sort The system lists all existing VML profiles and their state at the Vector Machine
profiles. Learning screen.
Click the column header to sort the VML profiles by name or status.
Manage and train Select a VML profile from the list to display and manage it.
profiles.
The Current Profile tab displays the active profile.
See “Working with the Current Profile and Temporary Workspace tabs” on page 670.
Action Description
Monitor profiles. The system lists and describes the status of all VML profiles.
■ Memory Required (KB)
The minimum amount of memory that is required to load the profile in memory
for detection.
See “Adjusting the memory allocation” on page 675.
■ Status
The present status of the profile.
See Table 28-8 on page 678.
■ Deployment Status
The historical status of the profile.
See Table 28-9 on page 679.
Remove profiles. Click the X icon at the far right to delete an existing profile.
If you delete an existing profile, the system removes the profile metadata and the
Training Set from the Enforce Server.
The Status field displays the current state of each VML profile.
The Deployment Status field indicates if the VML profile has ever been accepted or not.
Detecting content using Vector Machine Learning (VML) 679
Configuring VML profiles and policy conditions
Accepted on <date> The VML profile was accepted on the date indicated.
Note: You do not have to retrain a profile if you change the name or description.
Step 1 Create and train the VML See “Creating new VML profiles” on page 669.
profile.
See “Training VML profiles” on page 672.
Step 3 Add the VML rule to the policy. From the Configure Policy screen:
Step 4 Configure the VML detection Name the rule and configure the rule severity.
rule.
See “Configuring policy rules” on page 417.
Step 5 Select components to match Select one or both message components to Match On:
on.
■ Body, which is the content of the message
■ Attachments, which are any files transported by the message
Note: On the endpoint, the Symantec DLP Agent matches on the entire
message, not individual message components.
Step 6 Configure additional conditions Optionally, you can create a compound detection rule by adding more
(optional). conditions to the rule.
Step 7 Save the policy configuration. Click OK then click Save to save the policy.
Step 1 Create and train the VML profile. See “Creating new VML profiles” on page 669.
See “Training VML profiles” on page 672.
Step 3 Add a VML exception to the From the Configure Policy screen:
policy.
■ Select Add Exception.
■ Select the Detect using Vector Machine Learning profile exception
from the list of content exceptions.
■ Select the VML profile you want to use from the drop-down menu.
■ Click Next.
■ Entire Message
Select this option to compare the exception against the entire
message. If an exception is found anywhere in the message, the
exception is triggered and no matching occurs.
■ Matched Components Only
Select this option to match the exception against the same
component as the rule. For example, if the rule matches on the Body
and the exception occurs in an attachment, the exception is not
triggered.
Step 5 Configure the condition. Generally you can accept the default condition settings for policy
exceptions.
Step 6 Save the policy configuration. Click OK then click Save to save the policy.
Note: You do not have to retrain the VML profile after you adjust the Similarity Threshold,
unless you modify a training set based on testing results.
Detecting content using Vector Machine Learning (VML) 682
Configuring VML profiles and policy conditions
Step 1 Train the VML profile. Follow the recommendations in this guide for defining the category and uploading
the training set documents. Adjust the memory allocation before you train the
profile. Refer to the Symantec Data Loss Prevention Administration Guide for help
performing the tasks involved.
Step 2 Set the Similarity The default Similarity Threshold is 10. At this value the system does not generate
Threshold to 0. any incidents. A setting of 0 produces the most incidents, many of which are likely
to be false positives. The purpose of setting the value to 0 is to see the entire
range of potential matches. It also servers to tune the profile to be greater than
the highest false positive score.
Detecting content using Vector Machine Learning (VML) 683
Configuring VML profiles and policy conditions
Step 3 Create a VML policy. Create a policy that references the VML profile you want to tune. The profile must
be accepted to be deployable to a policy.
Step 4 Test the policy. Test the VML policy using a corpus of test data. For example, you can use the
DLP_Wikipedia_sample.zip file to test your VML policies against. Create a
mechanism to detect incidents. The mechanism can be a Discover scan target of
a local file folder where you place the test data. Or it can be a DLP Agent scan of
a copy/paste operation.
Step 5 Review any incidents. Review any matches at the Incident Snapshot screen. Verify a relatively low
Similarity Score for each match. A relatively low Similarity Score indicates a false
positive. If one or more test documents produce a match with a relatively high
Similarity Score, you have a training set quality issue. In this case you need to
review the content and if appropriate add the document(s) to the positive training
set. You then need to retrain and retune the profile.
See “Log files for troubleshooting VML training and policy detection” on page 686.
Step 6 Adjust the Similarity Review the incidents to determine the highest Similarity Score among the detected
Threshold. false positives that you have tested the profile against. Then, you can adjust the
Similarity Threshold for the profile to be greater than the highest Similarity Score
for the false positives.
For example, if the highest detected false positive has a Similarity Score of 4.5,
set the Similarity Threshold to 4.6. This setting filters the known false positives
from being reported as incidents.
Manager.properties Property file for the Enforce Server; contains 1 VML setting.
The following table lists and describes the VML training parameters available for configuration
in properties file MLDTraining.properties.
Parameter Description
Lowering this value can help reduce the size of the profile.
However, adjusting this setting is not recommended.
Instead, use the memory allocation setting to tune the size
of the profile.
Parameter Description
Parameter Description
Recommended Use VML to protect unstructured, text-based content. Do not use VML to protect graphics, binary
uses for VML data, or personally identifiable information (PII).
Category of content Define the VML profile based on a single category of content that you want to protect. The
category of content should be derived from a specific business use case. Narrowly defined
categories are better than broadly defined ones.
Positive training set Archive and upload the recommended (250) number of example documents for the positive
training set, or at least the minimum (50).
Negative training Archive and upload the example documents for the negative training set. Ideally the negative
set training set contains a similar number of well-categorized documents as the positive training set.
In addition, add some documents containing generic or neutral content to your negative training
set.
Profile sizing Consider adjusting the memory allocation to low. Internal testing has shown that setting the
memory allocation to low may improve accuracy in certain cases.
Training set quality Reject the training result and adjust the example documents if either of the base accuracy rates
from training are more than 5%.
Profile tuning Perform negative testing to tune the VML profile by using a corpus of testable data.
Profile deployment Remove accepted profiles not in use by policies to reduce detection server load. Tune the
Similarity Threshold before deploying a profile into production across all endpoints to avoid
network overhead.
It is not possible or practical Often collecting all of the content you want to protect for fingerprinting is an impossible
to fingerprint all the data you task. This situation arises for many forms of unstructured data: marketing materials,
want to protect. financial documents, patient records, product formulas, source code, and so forth.
VML works well for this situation because you do not have to collect all of the content
you want to protect. You collect a smaller set of example documents.
You cannot adequately Often describing the data you want to protect is difficult without sacrificing some
describe the data you want to accuracy. This situation may arise when you have long keyword lists that are hard to
protect. generate, tune, and maintain.
VML works well in these situations because it automatically models the features
(keywords) you want to protect. It enables you to easily manage and update the source
content.
A policy reports frequent false Sometimes a certain category of information is a constant source of false positives.
positives. For example, a weekly sales report may consistently produce false positives for a Data
Identifier policy looking for social security numbers.
VML may work well here because you can train against the content that causes the
false positives and create a policy exception to ignore those features.
Note: The false positive contents must belong to a well-defined category for VML to
be an effective solution for this use case. See “Recommendations for training set
definition” on page 689.
Detecting content using Vector Machine Learning (VML) 689
Best practices for using VML
Protect personally identifiable Exact Data Matching (EDM) and Data Identifiers are the best option for protecting the
information (PII). common types of PII.
Protect binary files and Indexed Document Matching (IDM) is the best option to protect the content that is
images. largely binary, such as image files or CAD files.
Note: While a completely generic negative training set is not recommended, seeding the
negative training set with some neutral-content documents does have value. See “Guidelines
for training set sizing” on page 690.
The following table provides some example categories and possible positive and negative
training sets comprising those categories.
Detecting content using Vector Machine Learning (VML) 690
Best practices for using VML
Product source code Proprietary product source code Source code from open source
projects
Quarterly earnings Pre-release earnings; sales estimates; Details of published annual accounts
accounting documents
Mergers and acquisitions Confidential legal documents; M&A Publicly available materials; press
documents releases
If you cannot collect enough positive documents to meet the minimum requirement, you can
upload the under-sized training set multiple times. For example, consider a case where you
have the category of content "Sales Forecasts." For this category you have collected 25 positive
spreadsheets and 50 negative documents. In this case, you can upload the positive training
set twice to reach the minimum document threshold and equal the number of negative
documents. Note that you should use this technique for development and testing purposes
only. Production profiles should be trained against at least the minimum number of documents
for both training sets.
Table 28-21 lists the optimal, recommended, and minimum number of documents to include
in each training set.
Note: These training set guidelines assume an average document size of 3 KB. If you have
larger-sized documents, fewer in number may be sufficient.
in turn affects the size of the profile. The higher the memory allocation setting, the more in-depth
the feature extraction and the plotting of the model, and the larger the profile. In general, for
server-based policy detection, the recommended memory allocation setting is high, which is
the default setting.
On the endpoint, the VML profile is deployed to the host computer and loaded into memory
by the DLP Agent. (Unlike EDM and IDM, VML does not rely on two-tier detection for endpoint
policies.) Because memory on the endpoint is limited, the recommendation is to allocate low
or medium memory for endpoint policies. Internal testing has shown that reducing the memory
allocation does not reduce the accuracy of the profile and may improve accuracy in certain
situations.
Note: You can use the log file machinelearning_training.log to evaluate per-fold training
accuracy rates.
See “Log files for troubleshooting VML training and policy detection” on page 686.
Fold evaluation Per fold category accuracy rates and cross-fold averages
Fold evaluation Per fold category accuracy rates and cross-fold averages
Cross-fold Avg False Positive Rate 1.214855808019638 Avg False Negative Rate
1.0730373203754424
■ PNG
■ TIFF (single page or multi-page, .tif or .tiff)
■ Bitmap (.bmp, .dib)
Form Recognition is available for Network Monitor, Network Prevent for Email, Network Prevent
for Web, and Network Discover. Form Recognition is not available for Endpoint Discover,
Endpoint Prevent, or any cloud detectors.
See “Configuring Form Recognition detection” on page 696.
See “About extracting images from Microsoft Office documents for OCR and Form Recognition”
on page 706.
Table 29-1 provides a high-level workflow for configuring Form Recognition detection:
1 Collect and prepare blank copies of the forms you want to protect. See “Preparing a Form Recognition
Gallery Archive” on page 697.
2 Configure a Form Recognition profile. Specify the Gallery Archive See “Configuring a Form Recognition
with the forms you want to detect and a Fill Threshold for creating profile” on page 698.
incidents.
3 Configure a policy with a Form Recognition detection or exception See “Configuring the Form Recognition
rule using your Form Recognition profile. detection rule” on page 699.
■ YourForm_2of3.PDF
■ YourForm_3of3.PDF
■ If your form contains electronically fillable fields, use a PDF editing tool for the
conversion process that retains AcroForms formatting, for example Adobe Acrobat.
■ If your form includes several pages of un-fillable boilerplate, only add the fillable pages
to your gallery archive.
Note: The name you enter is used when you configure policies and appears in the incident
snapshot for Form Recognition incidents.
Note: For electronically filled forms, entering 1 for the fill threshold detects any electronically
filled item on a form. For example, setting the threshold to 1 detects a single selected
check-box. In contrast, setting the threshold to 1 may not detect a similar check-box that
has been filled in using a pen.
6 Upload the gallery archive by clicking Browse and selecting the gallery archive ZIP file.
7 Click Save to begin indexing the profile.
When the gallery completes indexing, you can use it to configure a Form Recognition rule
in a policy.
See “Configuring the Form Recognition detection rule” on page 699.
Element Description
Add Profile Click Add Profile to configure a new Form Recognition profile.
See “Configuring a Form Recognition profile” on page 698.
Show Entries Select a value from Show Entries to specify the number of profiles
you can view on this page.
Page navigation You can use the following buttons to change the view of profiles:
■ Click Last to view profiles with the most recent dates in ascending
order.
■ Click a number to navigate to that specific page number.
■ Click Next to view the next page.
■ Click Previous to view the previous page.
Profile Name Click the Profile Name to view or edit the profile.
Note: You can sort column data in ascending order (A-Z/1-3) by
clicking the up arrow or descending order (Z-A/3-1) by clicking the
down arrow.
Description The profile description. You can edit the description by clicking the
profile name or the pencil icon in the Actions column.
■ Indexing not started displays when indexing for the profile did not
start. The uploaded gallery did not process.
■ Indexing in progress displays when the uploaded gallery is
indexing.
■ Profile indexed displays when indexing for this profile is complete
and the index successfully created.
■ Invalid gallery displays when indexing for the profile failed. The
uploaded gallery did not start indexing because it is invalid.
■ Index contains no images displays when indexing for the profile
failed. The uploaded gallery did not index because it contains no
compatible files.
■ Indexing failed displays when indexing for this profile failed. The
uploaded gallery was not indexed.
■ Indexing found some unusable files displays when indexing for
the profile completes with errors. Some of the files in the uploaded
gallery cannot be indexed.
Detecting content using Form Recognition - Sensitive Image Recognition 702
Advanced server settings for Form Recognition
Element Description
Usable Forms Count The total number of form images in the gallery that have been indexed
without errors and can be used in a policy.
Date Indexed The date when the profile was last indexed.
Fill Threshold The fill threshold value you provided when you configured the Form
Recognition profile. You can edit this value by clicking the profile name
or the pencil icon in the Actions column.
Click the red X to delete a profile. If you delete a profile, the system
removes the profile metadata and gallery from the Enforce Server.
■ FormRecognition.PRECLASSIFIER_ACTION
You can see details about these settings here:
See “Advanced server settings” on page 285.
■ Advanced Server settings and Troubleshooting for Sensitive Image Recognition content
extraction
Detecting Content using OCR - Sensitive Image Recognition 705
About content detection with OCR Sensitive Image Recognition
■ PNG
■ TIFF (single page or multi-page, .tif or .tiff)
■ Bitmap (.bmp)
■ Images extracted from PDF files, such as pages from a scanned document.
■ Images extracted from Microsoft Office documents.
See “Advanced Server settings and Troubleshooting for Sensitive Image Recognition content
extraction” on page 715.
The system collects metrics on the images that are encountered and logs the results in the
OcrRequestsRecord0.log for the last 24 hours. If you let the server run for one calendar week,
you can plot the “trailing 24 hour” data over this longer interval. This longer run enables you
to see the peaks and valleys of your potential OCR image load. During this process, no incidents
are created and only the images that are suitable for submission to OCR are counted.
Note: You do not have to have the Data Loss Prevention Symantec Data Loss Prevention
Sensitive Image Recognition add-on license to use this feature. You can estimate sizing
requirements for an OCR Server deployment in advance of purchasing the DLP Sensitive
Image Recognition add-on license that includes the OCR feature.
7 Consult the OcrRequestsRecord0.log to get the values to enter in the OCR Server Sizing
Estimator spreadsheet.
8 Go to the OCR Server Sizing Estimator spreadsheet at
https://www.symantec.com/docs/DOC10612.
9 Enter data in the green cells from the log for the following values:
Percentage of messages containing images requiring OCR (OCR messages)
Estimated average number of images per OCR message
10 The spreadsheet calculates the number of OCR Servers that you need to deploy for the
image traffic of each detection server in your Symantec Data Loss Prevention deployment.
11 Set OCR.RECORD_REQUEST_STATISTICS to false to disable logging.
You use a different technique for estimating OCR Server sizing requirements for Network
Discover. See “Creating a null policy to assist in OCR diagnostics for Discover Servers”
on page 708.
11 Enter the data from the log into the green cells in the spreadsheet for the following values:
Percentage of messages containing images requiring OCR (OCR messages)
Estimated average number of images per OCR message
12 The spreadsheet calculates the number of OCR Servers that you need to deploy for the
image traffic of each detection server in your Symantec Data Loss Prevention deployment.
13 Set OCR.RECORD_REQUEST_STATISTICS to false to disable logging.
See “Using the OCR Server Sizing Estimator spreadsheet” on page 710.
with the request, so OCR Servers can service requests from different detection servers that
are configured differently.
For example, you can configure one detection server to detect English with the highest possible
OCR accuracy. Then, you can configure another detection server to detect Japanese, with
the highest possible speed. In this case, the same OCR Server is able to handle both types
of requests. Symantec recommends that you install the OCR Server on a computer separate
from the detection server. However, Symantec supports co-locating of the OCR Server with
a detection server.
You install an OCR Server using the Symantec DLP OCR Server Installer setup wizard.
To install an OCR Server
1 Open the OCR Server Installer.
2 Double click OCRServerInstaller64.
3 Click Next.
4 Select desired Destination directory. Click Next. The installer runs.
5 Click Finish when the installation is complete.
Now the OCR service is running and is ready to receive OCR requests.
See “Creating an OCR configuration” on page 711.
6 Enter a value for Accuracy vs speed. By default, the OCR Server sets the value
dynamically for each document. The Sensitive Image Recognition pre-classifier is on the
detection server inspects each image and determines if it is suitable for OCR content
extraction (and form recognition). It then determines which preset is most appropriate. If
you uncheck this box, you can select a preset to use for all images. You can choose from
Accurate, Balanced, or Fast. This strategy can be appropriate for Discover scans, where
accuracy is prioritized over time.
7 In the Supported Languages section, select the candidate languages for OCR.
You can select one or more languages, and then the OCR Server selects a language
from that pool to use for the image. Symantec assumes that documents are primarily one
language (for example, all French, or all English, as opposed to mixed English and French).
The number of languages should be as small as possible. The more languages you select,
the slower the processing speed.
Even if a language is not selected, you may still get accurate text from that language. For
example, you can select English and German and submit a mixed English-French image
the OCR Server. It may choose English and still return some French text. The language
selection affects which spell-check dictionary to use. It also affects the pool of characters
to choose from if a character in the image is unclear.
8 In the Languages and Dictionaries Specialized Dictionaries section, you enable
supplemental spell checking for different businesses (legal, financial, medical) across
different languages.
Detecting Content using OCR - Sensitive Image Recognition 713
Using the OCR engine
9 In the Languages and Dictionaries Custom Dictionary section, specify the name of
your custom dictionary file to aid recognition accuracy. For example, if certain proper
nouns give the OCR Server difficulty, you can place them in this custom dictionary.
Using Dictionaries and spell checking improves recognition results for low-quality scans
and images (such as faxes). If the characters are crisp and clean they are easier for the
engine to read, and the Dictionaries are less useful.
10 The custom dictionary is a text file, with one entry per line. This text file must be placed
in the dictionary directory of each server at c:\Symantec\DLPOCR\Protect\bin.
Assign a profile to a detection server
1 Go to System > Servers and Detectors > Overview.
2 Select a monitor.
3 On the Server/Detector Detail page, click Configure.
4 On the Configure Server page, click OCR Engine. In OCR Engine Configuration select
the configuration that you want to use for the server.
5 Click Save.
See “Using the OCR engine” on page 713.
■ Polish
■ Portuguese
■ Portuguese (Brazilian)
■ Romany
■ Russian
■ Spanish
■ Swedish
■ Turkish
Other languages can be detected if they use supported character sets.
Table 30-1 Advanced settings for OCR and FR image extraction (continued)
Note: You must restart the server when you change Advanced settings.
Consult the following table for troubleshooting tips when using image extraction for OCR and
FR.
No images are extracted even though you have Check if the ContentExtraction.ImageExtractorEnabled
a Form Recognition rule present or OCR setting is equal to 0. Change it to 1 or 2.
configuration assigned to the monitor.
Make sure that a policy with the Form Recognition rule is not
suspended.
Log messages in ContentExtractionHost_File ■ INFO | cehost |Verity [10320] | [9580] | Extract Images Enabled
Reader.log | src\VerityImplinternal.c (246)
■ INFO | cehost |Verity [3544] | [2064] | Update Plugin
Configuration: Extract Images Enabled | src\VerityImplinternal.c
(969)
■ INFO | cehost |OfficeOpenXMLPlugin [3544] |[2064] | Updated
Plugin Configuration: Extract Images - True |
OfficeOpenXMLExtractor.cs (104)
Only 10 images are extracted out of many more Change the value of ContentExtraction.MaxNumImages to
images that are present in your document. Extract =10 in the Advanced settings to a greater value.
can fine-tune your detection results. Data identifiers offer broad support for detecting
international content.
If a system-defined data identifier does not meet your needs, you can modify it. You can also
define your own custom data identifiers to detect any content that you can describe.
See “System-defined data identifiers” on page 718.
See “Selecting a data identifier breadth” on page 739.
Category Description
Personal Identity Detect various types of identification numbers for the regions of Africa, Asia Pacific, Europe,
North America, and South America.
Financial Detect financial identification numbers, such as credit card numbers and ABA routing numbers.
Healthcare Detect U.S. and international drug codes, and other healthcare-related pattern-based sensitive
data.
South African Personal Identification Number See “South African Personal Identification Number”
on page 1469.
Table 31-3 lists system-defined data identifiers for the Asia Pacific region.
Australia Driver's License Number See “Australia Driver's License Number” on page 1018.
Australian Tax File Number See “Australian Tax File Number” on page 1029.
India RuPay Card Number See “India RuPay Card Number” on page 1252.
Indian Aadhaar Card Number See “Indian Aadhaar Card Number” on page 1249.
Indian Permanent Account Number See “Indian Permanent Account Number” on page 1251.
Indonesian Identity Card Number See “Indonesian Identity Card Number” on page 1255.
Israel Personal Identification Number See “Israel Personal Identification Number” on page 1276.
Japan Driver's License Number See “Japan Driver's License Number” on page 1285.
Korean Residence Registration Number for Foreigners See “Korea Residence Registration Number for Foreigners”
on page 1298.
Korean Residence Registration Number for Korean See “Korea Residence Registration Number for Korean”
on page 1300.
Macau Individual Identification Number See “Macau National Identification Number” on page 1331.
Malaysian MyKad Number See “Malaysian MyKad Number (MyKad)” on page 1335.
New Zealand Driver's License Number See “New Zealand Driver's Licence Number” on page 1370.
New Zealand National Health Index Number See “New Zealand National Health Index Number”
on page 1371.
New Zealand Passport Number See “New Zealand Passport Number” on page 1373.
People's Republic of China ID See “People's Republic of China ID” on page 1384.
Sri Lanka National Identity Number See “Sri Lanka National Identity Number” on page 1490.
Thailand Personal Identification Number See “Thailand Personal Identification Number” on page 1519.
United Arab Emirates Personal Number See “United Arab Emirates Personal Number” on page 1544.
Table 31-4 lists system-defined data identifiers for the European region.
Austria Tax Identification Number See “Austria Tax Identification Number” on page 1031.
Austria Value Added Tax (VAT) Number See “Austria Value Added Tax (VAT) Number” on page 1033.
Austrian Social Security Number See “Austrian Social Security Number” on page 1036.
Belgium Driver's License Number See “Belgium Driver's Licence Number” on page 1042.
Belgium Tax Identification Number See “Belgium Tax Identification Number” on page 1045.
Belgium Value Added Tax (VAT) Number See “Belgium Value Added Tax (VAT) Number”
on page 1047.
Bulgaria Value Added Tax (VAT) Number See “Bulgaria Value Added Tax (VAT) Number”
on page 1060.
Bulgarian Uniform Civil Number - EGN See “Bulgarian Uniform Civil Number - EGN” on page 1063.
Croatia National Identification Number See “Croatia National Identification Number” on page 1104.
Cyprus Tax Identification Number See “Cyprus Tax Identification Number” on page 1109.
Cyprus Value Added Tax (VAT) Number See “Cyprus Value Added Tax (VAT) Number” on page 1111.
Czech Republic Driver's License Number See “Czech Republic Driver's Licence Number”
on page 1112.
Czech Republic Personal Identification Number See “Czech Republic Personal Identification Number”
on page 1114.
Czech Republic Tax Identification Number See “Czech Republic Tax Identification Number”
on page 1117.
Czech Republic Value Added Tax (VAT) Number See “Czech Republic Value Added Tax (VAT) Number”
on page 1121.
Denmark Personal Identification Number See “Denmark Personal Identification Number” on page 1126.
Denmark Tax Identification Number See “Denmark Tax Identification Number” on page 1128.
Denmark Value Added Tax (VAT) Number See “Denmark Value Added Tax (VAT) Number”
on page 1130.
Estonia Driver's Licence Number See “Estonia Driver's Licence Number” on page 1147.
Estonia Personal Identification Code See “Estonia Personal Identification Code” on page 1151.
Estonia Value Added Tax (VAT) Number See “Estonia Value Added Tax (VAT) Number” on page 1153.
European Health Insurance Card Number See “European Health Insurance Card Number”
on page 1156.
Finland Driver's Licence Number See “Finland Driver's Licence Number” on page 1165.
Finland European Health Insurance Number See “Finland European Health Insurance Number”
on page 1167.
Finland Tax Identification Number See “Finland Tax Identification Number” on page 1171.
Finland Value Added Tax (VAT) Number See “Finland Value Added Tax (VAT) Number” on page 1173.
Finnish Personal Identification Number See “Finnish Personal Identification Number” on page 1175.
France Driver's License Number See “France Driver's License Number” on page 1177.
France Health Insurance Number See “France Health Insurance Number” on page 1179.
France Tax Identification Number See “France Tax Identification Number” on page 1181.
France Value Added Tax (VAT) Number See “France Value Added Tax (VAT) Number” on page 1182.
French Social Security Number See “French Social Security Number” on page 1188.
Germany Driver's License Number See “Germany Driver's License Number” on page 1194.
Germany Tax Identification Number See “Germany Tax Identification Number” on page 1198.
Germany Value Added Tax (VAT) Number See “Germany Value Added Tax (VAT) Number”
on page 1196.
Greece Social Security Number (AMKA) See “Greece Social Security Number (AMKA)” on page 1202.
Greece Value Added Tax (VAT) Number See “Greece Value Added Tax (VAT) Number” on page 1206.
Detecting content using data identifiers 723
Introducing data identifiers
Greek Tax Identification Number See “Greek Tax Identification Number” on page 1204.
Hungarian Social Security Number See “Hungarian Social Security Number” on page 1221.
Hungarian Tax Identification Number See “Hungarian Tax Identification Number” on page 1223.
Hungary Driver's Licence Number See “Hungary Driver's Licence Number” on page 1217.
Iceland National Identification Number See “Iceland National Identification Number” on page 1241.
Iceland Value Added Tax (VAT) Number See “Iceland Value Added Tax (VAT) Number” on page 1247.
Ireland Tax Identification Number See “Ireland Tax Identification Number” on page 1268.
Ireland Value Added Tax (VAT) Number See “Ireland Value Added Tax (VAT) Number” on page 1271.
Irish Personal Public Service Number See “Irish Personal Public Service Number” on page 1274.
Italy Driver's License Number See “Italy Driver's Licence Number” on page 1278.
Italy Health Insurance Number See “Italy Health Insurance Number” on page 1280.
Italy Value Added Tax (VAT) Number See “Italy Value Added Tax (VAT) Number” on page 1283.
Latvia Driver's Licence Number See “Latvia Driver's Licence Number” on page 1303.
Latvia Personal Identification Number See “Latvia Personal Identification Number” on page 1306.
Latvia Value Added Tax (VAT) Number See “Latvia Value Added Tax (VAT) Number” on page 1308.
Lithuania Personal Identification Number See “Lithuania Personal Identification Number” on page 1312.
Lithuania Tax Identification Number See “Lithuania Tax Identification Number” on page 1315.
Detecting content using data identifiers 724
Introducing data identifiers
Lithuania Value Added Tax Number See “Lithuania Value Added Tax (VAT) Number”
on page 1317.
Luxembourg National Register of Individuals Number See “Luxembourg National Register of Individuals Number”
on page 1320.
Luxembourg Tax Identification Number See “Luxembourg Tax Identification Number” on page 1324.
Luxembourg Value Added Tax (VAT) Number See “Luxembourg Value Added Tax (VAT) Number”
on page 1327.
Malta National Identification Number See “Malta National Identification Number” on page 1337.
Malta Tax Identification Number See “Malta Tax Identification Number” on page 1339.
Malta Value Added Tax (VAT) Number See “Malta Value Added Tax (VAT) Number” on page 1342.
Netherlands Bank Account Number See “Netherlands Bank Account Number” on page 1359.
Netherlands Driver's License Number See “Netherlands Driver's License Number” on page 1362.
Netherlands Tax Identification Number See “Netherlands Tax Identification Number” on page 1364.
Netherlands Value Added Tax (VAT) Number See “Netherlands Value Added Tax (VAT) Number”
on page 1367.
Norway Driver's Licence Number See “Norway Driver's Licence Number” on page 1375.
Norway National Identification Number See “Norway National Identification Number” on page 1377.
Norway Value Added Tax Number See “Norway Value Added Tax Number” on page 1379.
Poland Driver's Licence Number See “Poland Driver's Licence Number” on page 1386.
Poland European Health Insurance Number See “Poland European Health Insurance Number”
on page 1387.
Poland Value Added Tax (VAT) Number See “Poland Value Added Tax (VAT) Number” on page 1391.
Polish Social Security Number (PESEL) See “Polish Social Security Number (PESEL)” on page 1398.
Polish Tax Identification Number (NIP) See “Polish Tax Identification Number” on page 1400.
Portugal Driver's Licence Number See “Portugal Driver's Licence Number” on page 1402.
Portugal National Identification Number See “Portugal National Identification Number” on page 1404.
Portugal Tax Identification Number See “Portugal Tax Identification Number” on page 1408.
Portugal Value Added Tax (VAT) Number See “Portugal Value Added Tax (VAT) Number”
on page 1411.
Romania Driver's Licence Number See “Romania Driver's Licence Number” on page 1416.
Romania National Identification Number See “Romania National Identification Number” on page 1419.
Romania Value Added Tax (VAT) Number See “Romania Value Added Tax (VAT) Number”
on page 1420.
Romanian Numerical Personal Code (CNP) See “Romanian Numerical Personal Code” on page 1425.
Russian Passport Identification Number See “Russian Passport Identification Number” on page 1427.
Russian Taxpayer Identification Number See “Russian Taxpayer Identification Number” on page 1428.
SEPA Creditor Identifier Number North See “SEPA Creditor Identifier Number North” on page 1430.
SEPA Creditor Identifier Number South See “SEPA Creditor Identifier Number South” on page 1437.
SEPA Creditor Identifier Number West See “SEPA Creditor Identifier Number West” on page 1441.
Serbia Unique Master Citizen Number See “Serbia Unique Master Citizen Number” on page 1445.
Serbia Value Added Tax (VAT) Number See “Serbia Value Added Tax (VAT) Number” on page 1448.
Slovakia Driver's Licence Number See “Slovakia Driver's Licence Number” on page 1451.
Slovakia National Identification Number See “Slovakia National Identification Number” on page 1453.
Slovakia Value Added Tax (VAT) Number See “Slovakia Value Added Tax (VAT) Number”
on page 1459.
Detecting content using data identifiers 726
Introducing data identifiers
Slovenia Tax Identification Number See “Slovenia Tax Identification Number” on page 1463.
Slovenia Unique Master Citizen Number See “Slovenia Unique Master Citizen Number” on page 1465.
Slovenia Value Added Tax (VAT) Number See “Slovenia Value Added Tax (VAT) Number”
on page 1467.
Spain Driver's License Number See “Spain Driver's Licence Number” on page 1477.
Spain Value Added Tax (VAT) Number See “Spain Value Added Tax (VAT) Number” on page 1474.
Spanish Customer Account Number See “Spanish Customer Account Number” on page 1479.
Spanish DNI Identification Number See “Spanish DNI ID” on page 1481.
Spanish Social Security Number See “Spanish Social Security Number ” on page 1485.
Spanish Tax Identification (CIF) See “Spanish Tax Identification (CIF)” on page 1487.
Sweden Driver's Licence Number See “Sweden Driver's Licence Number” on page 1492.
Sweden Personal Identification Number See “Sweden Personal Identification Number” on page 1501.
Sweden Tax Identification Number See “Sweden Tax Identification Number” on page 1494.
Sweden Value Added Tax (VAT) Number See “Sweden Value Added Tax (VAT) Number”
on page 1496.
Swiss Social Security Number (AHV) See “Swiss Social Security Number (AHV)” on page 1507.
Switzerland Health Insurance Card Number See “Switzerland Health Insurance Card Number”
on page 1509.
Switzerland Value Added Tax (VAT) Number See “Switzerland Value Added Tax (VAT) Number”
on page 1513.
UK Bank Account Number Sort Code See “UK Bank Account Number Sort Code” on page 1523.
Detecting content using data identifiers 727
Introducing data identifiers
UK Driver's Licence Number See “UK Drivers Licence Number” on page 1525.
UK Electoral Roll Number See “UK Electoral Roll Number” on page 1527.
UK National Health Service (NHS) Number See “UK National Health Service (NHS) Number”
on page 1528.
UK National Insurance Number See “UK National Insurance Number” on page 1530.
UK Value Added Tax (VAT) Number See “UK Value Added Tax (VAT) Number” on page 1536.
Table 31-5 lists system-defined data identifiers for the North American region.
Canada Driver's License Number See “Canada Driver's License Number” on page 1067.
Canada Permanent Residence (PR) Number See “Canada Permanent Residence (PR) Number”
on page 1072.
Canadian Social Insurance Number See “Canadian Social Insurance Number” on page 1074.
Driver's License Number – CA State See “Driver's License Number – CA State ” on page 1133.
Driver's License Number – FL, MI, MN States See “Driver's License Number - FL, MI, MN States”
on page 1134.
Driver's License Number – IL State See “Driver's License Number - IL State” on page 1136.
Driver's License Number – NJ State See “Driver's License Number - NJ State” on page 1138.
Driver's License Number – NY State See “Driver's License Number - NY State” on page 1139.
Driver's License Number -WA State See “Driver's License Number - WA State” on page 1140.
Detecting content using data identifiers 728
Introducing data identifiers
Driver's License Number - WI State See “Driver's License Number - WI State” on page 1142.
Mexican Personal Registration and Identification See “Mexican Personal Registration and Identification
Number Number” on page 1346.
Mexican Tax Identification Number See “Mexican Tax Identification Number” on page 1349.
Mexican Unique Population Registry Code (CURP) See “Mexican Unique Population Registry Code”
on page 1351.
Randomized US Social Security Number (SSN) See “Randomized US Social Security Number (SSN)”
on page 1414.
US Individual Tax ID Number (ITIN) See “US Individual Tax Identification Number (ITIN)”
on page 1546.
US Social Security Number (SSN) See “US Social Security Number (SSN)” on page 1550.
Note: This data identifer is replaced by the Randomized
US SSN data identifier.
US ZIP+4 Postal Codes See “US ZIP+4 Postal Codes” on page 1553.
Table 31-6 lists system-defined data identifiers for the South American region.
Argentina Tax Identification Number See “Argentina Tax Identification Number” on page 1015.
Brazilian Election Identification Number See “Brazilian Election Identification Number” on page 1049.
Brazilian National Registry of Legal Entities Number See “Brazilian National Registry of Legal Entities Number”
on page 1053.
Brazilian Natural Person Registry Number See “Brazilian Natural Person Registry Number (CPF)”
on page 1055.
Chilean National Identification Number See “Chilean National Identification Number” on page 1077.
Colombian Cell Phone Number See “Colombian Cell Phone Number” on page 1085.
Colombian Tax Identification Number See “Colombian Tax Identification Number” on page 1090.
Credit Card Magnetic Stripe Data See “Credit Card Magnetic Stripe Data” on page 1092.
British Columbia Personal Healthcare Number See “British Columbia Personal Healthcare Number”
on page 1058.
Drug Enforcement Agency (DEA) Number See “Drug Enforcement Agency (DEA) Number”
on page 1145.
Healthcare Common Procedure Coding System See “Healthcare Common Procedure Coding System
(HCPCS CPT Code) (HCPCS CPT Code)” on page 1208.
Health Insurance Claim Number See “Health Insurance Claim Number” on page 1212.
National Drug Code See “National Drug Code (NDC)” on page 1355.
National Provider Identifier Number See “National Provider Identifier Number” on page 1357.
International Mobile Equipment Identity Number See “International Mobile Equipment Identity Number”
on page 1257.
widest option available for the data identifier is likely to produce the most false positive matches;
the narrowest option produces the least. Generally the validators and often the patterns differ
among breadths.
See “Using data identifier breadths” on page 738.
For example, the Driver's License Number – CA State data identifier provides wide and medium
breadths, with the medium breadth using a keyword validator.
Note: Not all system data identifiers provide each breadth of detection. Refer to the complete
list of data identifiers and breadths to determine what is available.
See “Selecting a data identifier breadth” on page 739.
Note: Optional validators only apply to the policy instance you are actively configuring; they
do not apply system-wide.
pattern 123-45-6789 and the keyword "social security number" and both data items are
contained in the message attachment component, the detection engine reports a match.
However, if the attachment contains the number but the body contains the keyword validator,
the detection engine does not consider this to be a match.
See “Configuring the Content Matches data identifier condition” on page 737.
■ Breadth ■ Patterns
You can implement any breadth the data identifier You cannot modify the match patterns at the instance
supports at the instance level. level.
■ Optional Validators ■ Mandatory Validators
You can select one or more optional validators at You cannot modify, add, or remove required validators at
the instance level. the instance level.
1 Decide the type of data See “Introducing data identifiers” on page 717.
identifier you want to
implement.
2 Decide the data identifier See “About data identifier breadths” on page 731.
breadth.
3 Configure the data See “Configuring the Content Matches data identifier condition” on page 737.
identifier.
4 Test and tune the data See “Best practices for using data identifiers” on page 833.
identifier policy.
Action Description
Edit a data identifier. Select the data identifier from the list to modify it.
Define a custom data Click Add data identifier to create a custom data identifier.
identifier.
See “Custom data identifier configuration” on page 814.
A pencil icon to the left means that the data identifier is modified from its original state, or is
custom.
Detecting content using data identifiers 736
Configuring data identifier policy conditions
Action Description
Remove a data Click the X icon on the right side to delete a data identifier.
identifier.
The system does not let you delete system data identifiers. You can only delete custom data
identifiers.
Note: The system does not export data identifiers in a policy template. The system exports a
reference to the system data identifier. The target system where the policy template is imported
provides the actual data identifier. If you modify a system-defined data identifier, the
modifications do not export to the template.
1 Clone the system data Clone the system data identifier before you modify it.
identifier you want to modify.
See “Cloning a system data identifier before modifying it” on page 777.
2 Edit the cloned data identifier. If you modify a system data identifier, click the plus sign to display the breadth
and edit the data identifier.
3 Edit one or more Patterns. You can modify any pattern that the Data Identifier provides.
4 Edit the data input for any See “Editing pattern validator input” on page 778.
validator that accepts input.
See “List of pattern validators that accept input data” on page 778.
5 Optionally, you can add or See “Selecting pattern validators” on page 829.
remove Validators, as
necessary.
Detecting content using data identifiers 737
Configuring data identifier policy conditions
7 Implement the data identifier See “Configuring the Content Matches data identifier condition” on page 737.
in a policy rule or exception.
1 Add a data identifier rule Select the Content Matches data identifier condition at the Add Detection
or exception to a policy, Rule or Add Exception screen.
or configure an existing
See “Adding a rule to a policy” on page 415.
one.
See “Adding an exception to a policy” on page 424.
2 Choose a data identifier. Choose a data identifier from the list and click Next.
3 Select a Breadth of Use the breadth option to narrow the scope of detection.
detection.
See “About data identifier breadths” on page 731.
Wide is the default setting and detects the broadest set of matches. Medium
and narrow breadths, if available, check additional criteria and detect fewer
matches.
4 Select and configure one Optional validators restrict the match criteria and reduce false positives.
or more Optional
See “About optional validators for data identifiers” on page 732.
Validators.
Detecting content using data identifiers 738
Configuring data identifier policy conditions
Table 31-14 Configuring the Content Matches data identifier condition (continued)
6 Configure the message Select one or more message components on which to match.
components to Match
On the endpoint, the detection engine matches the entire message, not
On.
individual components.
If the data identifier uses optional or required keyword validators, the keyword
must be present in the same component as the matched data identifier content.
7 Configure additional Optionally, you can Add one or more additional conditions from any available
conditions to Also Match. in the Also Match condition list.
Breadth Description
Wide The wide breadth defines a single or multiple patterns to create the greatest number of matches.
In general this breadth produces a higher rate of false positives than the medium and narrow
breadths.
Medium The medium breadth may refine the detection pattern(s) and/or add one or more data validators
to limit the number of matches.
Narrow The narrow breadth offers the tightest patterns and strictest validation to provide the most accurate
positive matches. In general this option requires the presence of a keyword or other validating
restriction to trigger a match.
Narrow
Narrow
Narrow
Narrow
Detecting content using data identifiers 740
Configuring data identifier policy conditions
Narrow
Narrow
Austria Value Added Tax (VAT) Number Wide Digits and Letters
See “Austria Value Added Tax (VAT) Number” on page 1033. Medium
Narrow
Narrow
Narrow
Belgium Value Added Tax (VAT) Number Wide Digits and Letters
See “Belgium Value Added Tax (VAT) Number” on page 1047. Medium
Narrow
Narrow
Bulgaria Value Added Tax (VAT) Number Wide Digits and Letters
See “Bulgaria Value Added Tax (VAT) Number” on page 1060. Medium
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Detecting content using data identifiers 743
Configuring data identifier policy conditions
Narrow
Narrow
Narrow
Cyprus Value Added Tax (VAT) Number Wide Digits and Letters
See “Cyprus Value Added Tax (VAT) Number” on page 1111. Medium
Narrow
Narrow
Czech Republic Value Added Tax (VAT) Number Wide Digits and Letters
Narrow
Detecting content using data identifiers 744
Configuring data identifier policy conditions
Narrow
Denmark Value Added Tax (VAT) Number Wide Digits and Letters
See “Denmark Value Added Tax (VAT) Number” on page 1130. Medium
Narrow
Narrow
Narrow
Narrow
Narrow
Estonia Value Added Tax (VAT) Number Wide Digits and Letters
See “Estonia Value Added Tax (VAT) Number” on page 1153. Medium
Narrow
Narrow
Narrow
Finland Value Added Tax (VAT) Number Wide Digits and Letters
See “Finland Value Added Tax (VAT) Number” on page 1173. Medium
Narrow
Narrow
France Value Added Tax (VAT) Number Wide Digits and Letters
See “France Value Added Tax (VAT) Number” on page 1182. Medium
Narrow
Narrow
Narrow
Narrow
Narrow
Germany Value Added Tax (VAT) Number Wide Digits and Letters
See “Germany Value Added Tax (VAT) Number” on page 1196. Medium
Narrow
Detecting content using data identifiers 747
Configuring data identifier policy conditions
Narrow
Greece Value Added Tax (VAT) Number Wide Digits and Letters
See “Greece Value Added Tax (VAT) Number” on page 1206. Medium
Narrow
Narrow
Healthcare Common Procedure Coding System (HCPCS Medium Digits and Letters
CPT Code)
Narrow
See “Healthcare Common Procedure Coding System (HCPCS
CPT Code)” on page 1208.
Narrow
Narrow
Narrow
Narrow
Detecting content using data identifiers 748
Configuring data identifier policy conditions
Narrow
Narrow
Iceland Value Added Tax (VAT) Number Wide Digits and Letters
See “Iceland Value Added Tax (VAT) Number” on page 1247. Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Ireland Value Added Tax (VAT) Number Wide Digits and Letters
See “Ireland Value Added Tax (VAT) Number” on page 1271. Medium
Narrow
Narrow
Detecting content using data identifiers 750
Configuring data identifier policy conditions
Narrow
Italy Value Added Tax (VAT) Number Wide Digits and Letters
See “Italy Value Added Tax (VAT) Number” on page 1283. Medium
Narrow
Narrow
Narrow
Narrow
Narrow
Latvia Value Added Tax (VAT) Number Wide Digits and Letters
See “Latvia Value Added Tax (VAT) Number” on page 1308. Medium
Narrow
Narrow
Narrow
Detecting content using data identifiers 752
Configuring data identifier policy conditions
Narrow
Narrow
Luxembourg Value Added Tax (VAT) Number Wide Digits and Letters
Narrow
Malta Value Added Tax (VAT) Number Wide Digits and Letters
See “Malta Value Added Tax (VAT) Number” on page 1342. Medium
Narrow
Detecting content using data identifiers 753
Configuring data identifier policy conditions
Narrow
Mexican Personal Registration and Identification Number Wide Digits and Letters
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Netherlands Value Added Tax (VAT) Number Wide Digits and Letters
See “New Zealand National Health Index Number” on page 1371. Medium
Narrow
Narrow
Narrow
Narrow
Poland Value Added Tax (VAT) Number Wide Digits and Letters
See “Poland Value Added Tax (VAT) Number” on page 1391. Medium
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Narrow
Portugal Value Added Tax (VAT) Number Wide Digits and Letters
See “Portugal Value Added Tax (VAT) Number” on page 1411. Medium
Narrow
Narrow
Romania Value Added Tax (VAT) Number Wide Digits and Letters
See “Romania Value Added Tax (VAT) Number” on page 1420. Medium
Narrow
Narrow
Narrow
Narrow
Detecting content using data identifiers 757
Configuring data identifier policy conditions
Narrow
Narrow
Narrow
Serbia Value Added Tax (VAT) Number Wide Digits and Letters
See “Serbia Value Added Tax (VAT) Number” on page 1448. Medium
Narrow
Narrow
Slovakia Value Added Tax (VAT) Number Wide Digits and Letters
See “Slovakia Value Added Tax (VAT) Number” on page 1459. Medium
Narrow
Narrow
Narrow
Slovenia Value Added Tax (VAT) Number Wide Digits and Letters
See “Slovenia Value Added Tax (VAT) Number” on page 1467. Medium
Narrow
Spain Value Added Tax (VAT) Number Wide Digits and Letters
See “Spain Value Added Tax (VAT) Number” on page 1474. Medium
Narrow
Narrow
Narrow
Narrow
Detecting content using data identifiers 759
Configuring data identifier policy conditions
Narrow
Narrow
Narrow
Sweden Value Added Tax (VAT) Number Wide Digits and Letters
See “Sweden Value Added Tax (VAT) Number” on page 1496. Medium
Narrow
Narrow
Narrow
Narrow
Narrow
See “UK Bank Account Number Sort Code” on page 1523. Medium
Narrow
Narrow
See “UK National Health Service (NHS) Number” on page 1528. Narrow
Narrow
Detecting content using data identifiers 761
Configuring data identifier policy conditions
Narrow
Narrow
See “UK Value Added Tax (VAT) Number” on page 1536. Medium
Narrow
Narrow
Narrow
Narrow
Detecting content using data identifiers 762
Configuring data identifier policy conditions
Narrow
Narrow
Require beginning Match the characters that begin (lead) the matched data item.
characters
For example, for the CA Drivers License data identifier, you could require the beginning
character to be the letter "C." In this case the engine matches a license number C6457291.
Require ending characters Match the characters that end (trail) the matched data item.
Exclude beginning Exclude from matching characters that begin (lead) the matched data.
characters
See “Acceptable characters for optional validators” on page 764.
Exclude ending Exclude from matching the characters that end (trail) the matched data item.
characters
See “Acceptable characters for optional validators” on page 764.
Detecting content using data identifiers 763
Configuring data identifier policy conditions
Find keywords Match one or more keywords or key phrases in addition to the matched data item. Can
check for the proximity of matched data against a list of keywords.
Keywords can also be scanned for case sensitivity. Then a check is performed for the
proximity of the matched data identifier patterns against a list of keywords. An incident is
generated when all of the data identifier patterns in the rule match. Captured keywords
are highlighted in incidents. Proximity, case sensitivity, and validator highlighting are
disabled by default and must be enabled to work.
The keyword must be detected in the same message component as the data identifier
content to report a match.
See “List of pattern validators that accept input data” on page 778.
Exact Match Data Lookup tokens around a pattern for an Exact Match Data Identifier index and validate the
Identifier Check pattern.
See “Adding an EMDI check to a built-in or custom data identifier condition in a policy”
on page 487.
Note: The Find keyword optional validator accepts any characters as values for all data
identifiers .
The type of data expected by the optional validator depends on the data identifier. Most data
identifier/optional validator pairings accept numbers only; some accept alphanumeric values,
and a few accept any characters. If you enter unacceptable input and attempt to save the
policy, the system reports an error.
See “Configuring optional validators” on page 763.
Austria Value Added Tax (VAT) Number Letters only Numbers only
Belgium Value Added Tax (VAT) Number Letters only Numbers only
Brazilian National Registry of Legal Entities Number Numbers only Numbers only
Bulgaria Value Added Tax (VAT) Number Letters only Numbers only
Czech Republic Value Added Tax (VAT) Number Letters only Numbers only
Denmark Value Added Tax (VAT) Number Letters only Numbers only
Driver's License Number – FL, MI, MN States Letters only (normalized Numbers only
to lowercase)
Drug Enforcement Agency (DEA) Number Letters only (normalized Numbers only
to lowercase)
Estonia Value Added Tax (VAT) Number Letters only Numbers only
Finland Value Added Tax (VAT) Number Letters only Numbers only
France Value Added Tax (VAT) Number Letters only Numbers only
German Value Added Tax (VAT) Number Letters only Numbers only
Greece Value Added Tax (VAT) Number Letters only Numbers only
Iceland Value Added Tax (VAT) Number Letters only Numbers only
Ireland Value Added Tax (VAT) Number Letters only Numbers only
Irish Personal Public Service Number Numbers only Letters only (normalized
to lowercase)
Italy Value Added Tax (VAT) Number Letters only Numbers only
Korea Residence Registration Number for Foreigners Numbers only Numbers only
Korea Residence Registration Number for Korean Numbers only Numbers only
Latvia Value Added Tax (VAT) Number Letters only Numbers only
Lithuania Value Added Tax (VAT) Number Letters only Numbers only
Luxembourg Value Added Tax (VAT) Number Letters only Numbers only
Netherlands Value Added Tax (VAT) Number Letters only Numbers only
New Zealand National Health Index Number Letters only (normalized Numbers only
to lowercase)
Poland Value Added Tax (VAT) Number Letters only Numbers only
Detecting content using data identifiers 772
Configuring data identifier policy conditions
Portugal Value Added Tax (VAT) Number Letters only Numbers only
Romania Value Added Tax (VAT) Number Letters only Numbers only
Slovakia Value Added Tax (VAT) Number Letters only Numbers only
Slovenia Value Added Tax (VAT) Number Letters only Numbers only
Sweden Value Added Tax (VAT) Number Letters only Numbers only
First match is unique A unique match is the first match found in a message component.
Match count updated for each unique The match count is incremented by 1 for each unique pattern match.
match
Only unique matches are highlighted Duplicate matches are neither counted nor highlighted at the Incident Snapshot
screen
Uniqueness does not span message For example, if the same SSN appears in both the message body and
components attachment, two unique matches will be generated, not one. This is because
each instance is detected in a separate message component.
Compound rule with data identifier In a compound rule combining a data identifier condition with a keyword condition
and keyword proximity conditions that specifies keyword proximity logic, the reported match will be the first match
found
Note: The system does not export modified and custom data identifiers in a policy template.
The system exports a reference to the system data identifier. The target system where the
policy template is imported provides the actual data identifier. See “Clone system-defined data
identifiers before modifying to preserve original state” on page 835.
6 Click Update Validator to save the changes you have made to the validator input.
Click Discard Changes to not save the changes.
7 Click Save to save the data identifier.
Note: Input you use for beginning and ending validators concern the text of the match itself.
Input you use for prefix and suffix validators concern characters before and after matched text.
Detecting content using data identifiers 779
Modifying system data identifiers
Validator Description
Exact Match Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Exclude beginning characters Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Exclude ending characters Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Exclude exact match Enter a comma-separated list of values. Each value can be of any length.
Exclude prefix Enter a comma-separated list of values. Each value can be of any length.
Exclude suffix Enter a comma-separated list of values. Each value can be of any length.
Find keywords Enter a comma-separated list of values. Each value can be of any length.
Require beginning characters Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Require ending characters Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Austria Value Added German MwSt, Umsatzsteuernummer, VAT, sales tax number, VAT
Tax (VAT) Number MwSt Nummer, number, VAT identification
Ust.-Identifikationsnummer, number, sales tax, UID number
umsatzsteuer, Umsatzsteuer-
Identifikationsnummer
Detecting content using data identifiers 781
Modifying system data identifiers
Table 31-22 Keyword list for international PII data identifiers (continued)
Belgian National French Numéro national, numéro de National number, security number,
Number sécurité, numéro d'assuré, number of insured, national
identifiant national, identification, national
identifiantnational#, identification #, national number
Numéronational# #
Belgium Driver's German, French, Führerschein, Fuhrerschein, Driver's license, driver's license
License Number Frisian Fuehrerschein, number, driving permit, driving
Führerscheinnummer, permit number
Fuhrerscheinnummer,
Fuehrerscheinnummer,
Führerscheinnummer,
Fuhrerscheinnummer,
Fuehrerscheinnummer,
Führerschein- Nr, Fuhrerschein-
Nr, Fuehrerschein- Nr, permis de
conduire,
rijbewijs,Rijbewijsnummer,
Numéro permis conduire
Belgium Tax Dutch, German, Numéro de registre national, National registry number, tax
Identification Number French numéro d'identification fiscale, identification number, tax number
belasting aantal,Steuernummer
Belgium Value Added German, French Numéro T.V.A, VAT number, tax identification
Tax (VAT) Number Umsatzsteuer-Identifikationsnummer, number
Umsatzsteuernummer
Detecting content using data identifiers 782
Modifying system data identifiers
Table 31-22 Keyword list for international PII data identifiers (continued)
Brazilian National Brazilian Brasileira ID Legal, entidades Brazilian legal identification, legal
Registry of Legal Portuguese jurídicas ID,Registro Nacional de entities ID, National Registry of
Entities Number Pessoas Jurídicas n º, Legal Entities No
BrasileiraIDLegal#
British Columbia French MSP nombre, soins de santé no, MSP Number, MSP no, personal
Personal Healthcare soins de santé personnels healthcare number, Healthcare
Number nombre, MSPNombre#, No, PHN
soinsdesanténo#
Bulgaria Value Added Bulgarian номер на таксата, ДДС, ДДС#, Fee number, VAT, VAT number,
Tax (VAT) Number ДДС номер., ДДС номер.#, value added tax
номер на данъка върху
добавената стойност, данък
върху добавената стойност,
ДДС номер
Bulgarian Uniform Civil Bulgarian Униформ граждански номер, Uniform civil number, Uniform ID,
Number - EGN Униформ ID, Униформ Uniform civil ID, Bulgarian uniform
граждански ID, Униформ civil number
граждански не., български
Униформ граждански номер,
УниформгражданскиID#,
Униформгражданскине.#
Table 31-22 Keyword list for international PII data identifiers (continued)
Canada Passport French numéro passeport, No passeport, Passport number, passport no.,
Numbert passeport# passport#
China Passport Number Chinese 中国护照, 护照, 护照本 Chinese passport, passport,
passport book
Codice Fiscale Italian codice fiscal, dati anagrafici, tax code, personal data, VAT
partita I.V.A., p. iva number, VAT number
Columbian Addresses Spanish Calle, Cll, Carrera, Cra, Cr, Street, St, Career, Avenue,
Avenida, Av, Dg, Diagonal, Diag, Diagonal, Transversal, sidewalk
Tv, Trans, Transversal, vereda
Columbian Cell Phone Spanish numero celular, número de Cellular number, telephone
Number teléfono, teléfono celular no., number, cellular telephone
numero celular# number
Columbian Personal Spanish cedula, cédula, c.c., c.c,C.C., C.C, Identification card, citizenship
Identification Number cc, CC, NIE., NIE, nie., nie, cedula card, identification document
de ciudadania, cédula de
ciudadanía, cc#, CC #, documento
de identificacion, documento de
identificación, Nit.
Columbian Tax Spanish NIT., NIT, nit., nit, Nit. TIN (tax identification number)
Identification Number
Detecting content using data identifiers 784
Modifying system data identifiers
Table 31-22 Keyword list for international PII data identifiers (continued)
Croatia National Croatian Osobna iskaznica, Nacionalni Personal ID, national identification
Identification Number identifikacijski broj, osobni ID, number, personal ID, personal
osobni identifikacijski broj, porez identification number, tax
iskaznica, porezni broj, porezni identification card, tax number, tax
identifikacijski broj, porez kod, identification number, tax code,
šifra poreznog obveznika taxpayer code
Cyprus Tax Turkish, Greek αριθμός φορολογικού μητρώου, Tax identification number, tax
Identification Number Vergi Kimlik Numarası, vergi number, TIN number, Cyprus TIN
numarası, Kıbrıs TIN numarası number
Cyprus Value Added Turkish, Greek KDV, kdv#, KDV numarası, Katma VAT, VAT number, value added
Tax (VAT) Number değer Vergisi, Φόρος tax,
Προστιθέμενης Αξίας
Czech Republic Driver's Czech řidičský průkaz, řidičský prúkaz, Driving license, driver's license
Licence Number číslo řidičského průkazu, řidičské number, driving license number,
číslo řidičů, ovladače lic., Číslo driver's lic., driver license number,
licence řidiče, Řidičský průkaz, driver's permit
povolení řidiče, řidiči povolení,
povolení k jízdě, číslo licence
Czech Republic Czech Česká Osobní identifikační číslo, Czech Personal Identification
Personal Identification Osobní identifikační číslo., Number, personal identification
Number identifikační číslo, čeština number, Czech identification
identifikační číslo number
Czech Republic Tax Czech osobní kód, Národní identifikační Personal code, national
Identification Number číslo, osobní identifikační číslo, identification number, personal
cínové číslo, daňové identifikačné identification number, TIN number,
číslo, daňový poplatník id tax identification number, taxpayer
ID
Czech Republic Value Czech číslo DPH, Daň z přidané VAT number, value added tax,
Added Tax (VAT) hodnoty, Dan z pridané hodnoty, VAT
Number Daň přidané hodnoty, Dan
pridané hodnoty, DPH, DIC, DIČ
Detecting content using data identifiers 785
Modifying system data identifiers
Table 31-22 Keyword list for international PII data identifiers (continued)
Denmark Value Added Danish moms, momsnummer, moms VAT number, vat, value added tax
Tax (VAT) Number identifikationsnummer, number, vat identification number
merværdiafgift
Estonia Driver's Estonian juhiluba, JUHILUBA, juhiluba Driving license, driving license
Licence Number number, juhiloa number, number, driver's license number,
Juhiluba, juhi litsentsi number license number
Estonia Passport Estonian Pass, pass, passi number, pass Passport, passport number,
Number nr, pass#, Pass nr, Eesti passi Estonian passport number
number
Estonia Personal Estonian isikukood, isikukood#, IK, IK#, Personal identification code, tax
Identification Code maksu ID, maksukohustuslase ID, taxpayer identification number,
identifitseerimisnumber, tax identification number, tax
maksukood, maksukood#, code, taxpayer code
maksuID#, maksumaksja kood,
maksumaksja
identifitseerimisnumber
Table 31-22 Keyword list for international PII data identifiers (continued)
European Health Croatian, Danish, numero conto medico, tessera Medical account number, health
Insurance Card Number Estonian, Finnish, sanitaria assicurazione numero, insurance card number, insurance
French, German, carta assicurazione numero, card number, health insurance
Irish, Italian, Krankenversicherungsnummer, number, medical account number,
Luxembourgish, assicurazione sanitaria numero, health card number, health card,
Polish, Slovenian, medisch rekeningnummer, insurance number, EHIC number,
Spanish ziekteverzekeringskaartnummer,
verzekerings kaart nummer,
gezondheidskaart nummer,
gezondheidskaart, medizinische
Kontonummer,
Krankenversicherungskarte
Nummer, Versicherungsnummer,
Gesundheitskarte Nummer,
Gesundheitskarte, arstliku konto
number, ravikindlustuse kaardi
number, tervisekaart,
tervisekaardi number, Uimhir
ehic, tarjeta salud, broj kartice
zdravstvenog osiguranja, kartice
osiguranja broj, zdravstvenu
karticu, zdravstvene kartice broj,
ehic broj, numero tessera
sanitaria, numero carta di
assicurazione, tessera sanitaria,
numero ehic, Gesondheetskaart,
ehic nummer, numer rachunku
medycznego, numer karty
ubezpieczenia zdrowotne, numer
karty ubezpieczenia, karta
zdrowia, numer karty zdrowia,
numer ehic,
sairausvakuutuskortin numero,
vakuutuskortin numero,
terveyskortti, terveyskortin
numero, medicinsk
kontonummer, ehic numeris,
medizinescher Konto Nummer,
zdravstvena izkaznica
Detecting content using data identifiers 787
Modifying system data identifiers
Table 31-22 Keyword list for international PII data identifiers (continued)
Finland Driver's Finnish, Swedish permis de conduire, ajokortti, Driver's license, driver's license
License Number ajokortin numero, kuljettaja lic., number, driver's lic.
körkort, körkort nummer, förare
lic.
Finland Passport Finnish Suomen passin numero, Finnish passport number, Finnish
Number suomalainen passi, passin passport, passport number,
numero, passin numero.#, passin passport number, passport #
numero#, passin numero, passin
numero., passin numero#, passi#
Finland Value Added Finnish arvonlisäveronumero, ALV, VAT number, VAT, VAT
Tax (VAT) Number arvonlisäverotunniste, ALV nro, identification number
ALV numero, alv
France Health French carte vitale, carte d'assuré social Health card, social insurance card
Insurance Number
Detecting content using data identifiers 788
Modifying system data identifiers
Table 31-22 Keyword list for international PII data identifiers (continued)
France Value Added French Numéro d'identification taxe sur Value added tax identification
Tax (VAT) Number valeur ajoutée, Numéro taxe number, value added tax number,
valeur ajoutée, taxe valeur value added tax, VAT number,
ajoutée, Taxe sur la valeur French VAT number, SIREN
ajoutée, Numéro de TVA identification number
intracommunautaire, n° TVA,
numéro de TVA, Numéro de TVA
en France, français numéro de
TVA, Numéro d'identification
SIREN
French INSEE Code French INSEE, numéro de sécu, code INSEE, social security number,
sécu social security code
French Social Security French sécurité sociale non., sécurité Social secuty number, social
Number sociale numéro, code sécurité security code, insurance number
sociale, numéro d'assurance,
sécuritésocialenon.#,
sécuritésocialeNuméro#
Table 31-22 Keyword list for international PII data identifiers (continued)
Germany Value Added German Mehrwertsteuer, MwSt, Value added tax, value added tax
Tax (VAT) Number Mehrwertsteuer identification number, value added
Identifikationsnummer, tax number
Mehrwertsteuer nummer
Greece Passport Greek λλάδα pasport αριθμός, Ελλάδα Greece passport number, Greece
Number pasport όχι., Ελλάδα Αριθμός passport no., passport, Greece
Διαβατηρίου, διαβατήριο, passport, passport book
Διαβατήριο, ΕΛΛΑΔΑ
ΔΙΑΒΑΤΗΡΙΟ, Ελλάδα
Διαβατήριο, ελλάδα διαβατήριο,
Διαβατήριο Βιβλίο, βιβλίο
διαβατηρίου
Greece Social Security Greek Αριθμού Μητρώου Κοινωνικής Social security number
Number (AMKA) Ασφάλισης
Greece Value Added Greek FPA, fpa, Foros Prostithemenis VAT, value added tax, tax
Tax (VAT) Number Axias, arithmós dexamenís, Fóros identification number
Prostithémenis Axías, μέγας
κάδος, ΦΠΑ, Φ Π Α, Φόρος
Προστιθέμενης Αξίας, ΦΟΡΟΣ
ΠΡΟΣΤΙΘΕΜΕΝΗΣ ΑΞΙΑΣ, φόρος
προστιθέμενης αξίας, Arithmos
Forologikou Mitroou, Α.Φ.Μ, ΑΦΜ
Greek Tax Identification Greek Αριθμός Φορολογικού Μητρώου, Tax identification number, TIN, tax
Number AΦΜ, Φορολογικού Μητρώου registry number
Νο., τον αριθμό φορολογικού
μητρώου
Table 31-22 Keyword list for international PII data identifiers (continued)
Hungarian Tax Hungarian Magyar adóazonosító jel no, Hungarian tax identification
Identification Number adóazonosító szám, magyar tumber, tax identification number,
adószám, Magyar adóhatóság Hungarian tax number, Hungarian
no., azonosító szám, tax authority number, tax number,
adóazonosító no., adóhatóság no tax authority number
Hungarian VAT Number Hungarian Közösségi adószám, Általános Value added tax identification
forgalmi adó szám, number, sales tax number, value
hozzáadottérték adó, magyar added tax, Hungarian value added
Közösségi adószám tax number
Iceland National Icelandic kennitala, persónuleg kennitala, Social security number, personal
Identification Number galdur númer, skattanúmer, identification number, magic
skattgreiðenda kóða, kennitala number, tax code, taxpayer code,
skattgreiðenda taxpayer ID number
Table 31-22 Keyword list for international PII data identifiers (continued)
Indonesian Identity Indonesian, Kartu Tanda Penduduk nomor, Identity card number, card
Card Number Portuguese número do cartão, Kartu identitas number, Indonesian identity card
Indonesia no, kartu no., Kartu number, card no., Indonesian
identitas Indonesia nomor, Nomor identity card number, ID number
Induk Kependudukan,
númerodocartão,kartuno.,
KartuidentitasIndonesiano
International Bank French Code IBAN, numéro IBAN IBAN Code, IBAN number
Account Number (IBAN)
Central
International Bank French Code IBAN, numéro IBAN IBAN Code, IBAN number
Account Number (IBAN)
East
International Bank French Code IBAN, numéro IBAN IBAN Code, IBAN number
Account Number (IBAN)
West
Ireland Passport Irish irelande passeport, Éire pas, no Ireland passport, passport
Number de passeport, pas uimh, uimhir number, passport
pas, numéro de passeport
Ireland Value Added Irish cáin bhreisluacha, CBL, CBL aon, Ireland VAT number, VAT
Tax (VAT) Number Uimhir CBL, Uimhir CBL number, VAT no, VAT#, value
hÉireann, bhreisluacha uimhir added tax number, value added
chánach tax, irish VAT
Irish Personal Public Gaelic Gaeilge Uimhir Phearsanta Irish personal public service
Service Number Seirbhíse Poiblí, PPS Uimh., number, PPS no., personal public
uimhir phearsanta seirbhíse service number, service no., PPS
poiblí, seirbhíse Uimh, PPS Uimh, no., PPS service one
PPS seirbhís aon
Detecting content using data identifiers 792
Modifying system data identifiers
Table 31-22 Keyword list for international PII data identifiers (continued)
Israel Personal Hebrew, Arabic זהות,מספר זיהוי ישראלי,מספר זיהוי Israeli identity number, identity
Identification Number هوية,هويةاسرائيلية عدد,ישראלית number, unique identity number,
عدد هوية فريدة من نوعها,رقم الهوية, إسرائيليةpersonal ID, unique personal ID,
unique ID
Italy Driver's License Italian patente guida numero, patente di Driver's license number, driver's
Number guida numero, patente di guida, license
patente guida
Italy Health Insurance Italian TESSERA SANITARIA, tessera Health insurance card, Italian
Number sanitaria, tessera sanitaria health insurance card
italiana
Italy Value Added Tax Italian IVA, numero partita IVA, IVA#, VAT, VAT number, VAT#, VAT
(VAT) Number numero IVA number
Japan Driver's License Japanese 公安委員会, 番号, 免許, 交付, 運転 Public Security Committee,
Number 免許, 運転免許証, ドライバライセ driver's license, driving license,
ンス, ドライバーズライセンス, ラ driver license, driver's license
イセンス, 運転免許証番号 number, driving license number,
driver license number, license
Table 31-22 Keyword list for international PII data identifiers (continued)
Korea Passport Number Korean 한국어 여권, 여권, 여권 번호, 대한 Korean passport, passport,
민국 passport number, Republic of
Korea
Latvia Driver's Licence Latvian licences numurs, vadītāja License number, driver's license,
Number apliecība, autovadītāja apliecība, driver's license number, driver's
vadītāja apliecības numurs, lic.
Vadītāja licences numurs, vadītāji
lic., vadītāja atļauja
Latvia Passport Latvian LATVIJA, LETTONIE, Pases Nr., Latvia, passport no., passport
Number Pases Nr, Pase, pase, pases number, passport book, passport
numurs, Pases Nr, pases #, passport card
grāmata, pase#, pases karte
Latvia Personal Latvian Personas kods, personas kods, Latvia personal code, personal
Identification Number latvijas personas kods, Valsts code, national identification
identifikācijas numurs, valsts number, identification number,
identifikācijas numurs, national ID, latvia TIN, TIN, tax
identifikācijas numurs, identification number, tax ID, TIN
nacionālais id, latvija alva, alva, number, tax number
nodokļu identifikācijas numurs,
nodokļu id, alvas nē, nodokļa
numurs
Latvia Value Added Tax Latvian PVN Nr, PVN maksātāja numurs, VAT no., VAT payer number, VAT
(VAT) Number PVN numurs, PVN#, pievienotās number, VAT#, value added tax,
vērtības nodoklis, pievienotās value added tax number
vērtības nodokļa numurs
Liechtenstein Passport German Reisepass, Pass Nr, Pass Nr., Passport, passport no.
Number Reisepass#, Pass Nr#
Detecting content using data identifiers 794
Modifying system data identifiers
Table 31-22 Keyword list for international PII data identifiers (continued)
Lithuania Personal Lithuanian Nacionalinis ID, Nacionalinis National ID, national identification
Identification Number identifikavimo numeris, asmens number, personal ID
kodas
Lithuania Tax Lithuanian mokesčių identifikavimo Nr., tax identification number, tax ID,
Identification Number mokesčių identifikavimo numeris, tax ID number, tax ID number, tax
mokesčių ID, mokesčių id nr, ID #, tax number, tax no., fee #
mokesčių id nr., mokesčių ID#,
mokesčių numeris, mokestis Nr,
mokestis #, Mokesčių
identifikavimo numeris
Lithuania Value Added Lithuanian pridėtinės vertės mokesčio VAT number, VAT, VAT #, Value
Tax (VAT) Number numeris, PVM, PVM#, pridėtinės added tax, VAT registration
vertės mokestis, PVM numeris, number
PVM registracijos numeris
Luxembourg National German, French Eindeutige ID-Nummer, Unique ID number, unique ID,
Register of Individuals Eindeutige ID, ID personnelle, personal ID, personal identification
Number Numéro d'identification number
personnel, IDpersonnelle#,
Persönliche
Identifikationsnummer,
EindeutigeID#
Luxembourg Tax French, German Zinn, Zinn Nummer, Luxembourg TIN, TIN number, Luxembourg tax
Identification Number Tax Identifikatiounsnummer, identification number, tax number,
Steier Nummer, Steier ID, tax ID, social security ID,
Sozialversicherungsausweis, Luxembourg tax identification
Zinnzahl, Zinn nein, Zinn#, number, Social Security, Social
luxemburgische Security Card, tax identification
steueridentifikationsnummer, number
Steuernummer,Steuer ID, sécurité
sociale, carte de sécurité sociale,
étain,numéro d'étain, étain non,
étain#, Numéro d'identification
fiscal luxembourgeois, numéro
d'identification fiscale
Detecting content using data identifiers 795
Modifying system data identifiers
Table 31-22 Keyword list for international PII data identifiers (continued)
Luxembourg Value German, TVA kee, TVA#, TVA Aschreiwung Luxembourg VAT number, VAT
Added Tax (VAT) Luxembourgish kee, T.V.A, stammnummer, number, VAT, value added tax
Number bleiwen, geheescht, gitt id, number, VAT ID, VAT registration
mehrwertsteuer, vat number, value added tax
registrierungsnummer,
umsatzsteuer-id, wat,
umsatzsteuernummer,
umsatzsteuer-identifikationsnummer,
id de la batterie, lëtzebuerg vat
nee, registréierung nummer,
numéro de TVA, numéro de
enregistrement vat
Malaysian MyKad Malay nombor kad pengenalan, kad Identification card number,
Number (MyKad) pengenalan no, kad pengenalan identification card no., Malaysian
Malaysia, bilangan identiti unik, identification card, unique identity
nombor peribadi, number, personal number
nomborperibadi#,
kadpengenalanno#
Malta Tax Identification Maltese kodiċi tat-taxxa, numru tat-taxxa, Tax code, tax number, tax
Number numru identifikazzjoni tat-taxxa, identification number, taxid#
taxxaid#, numru identifikazzjoni taxpayer identification number,
kontribwent, kodiċi kontribwent, taxpayer code, tin, tin no
landa, landa nru
Detecting content using data identifiers 796
Modifying system data identifiers
Table 31-22 Keyword list for international PII data identifiers (continued)
Malta Value Added Tax Maltese Numru tal-VAT, numru tal-VAT, VAT number, VAT, value added
(VAT) Number bettija,valur miżjud taxxa tax number, vat identification
in-numru, bettija identifikazzjoni number
in-numru
Mexican Personal Spanish Clave de Registro de Identidad Personal identity registration key,
Registration and Personal, Código de Mexican personal identification
Identification Number Identificación Personal mexicana, code, Mexican personal
número de identificación identification number
personal mexicana
Mexican Unique Spanish Única de registro de Población, Unique population registry, unique
Population Registry clave única, clave única de key, unique identity key, unique
Code identidad, clave personal personal identity, personal identity
Identidad, personal Identidad key
Clave, ClaveÚnica#,
clavepersonalIdentidad#
Mexico CLABE Number Spanish Clave Bancaria Estandarizada, Standardized banking code,
Estandarizado Banco número de standardized bank code number,
clave, número de clave, clave code number
número, clave#
Netherlands Bank Dutch, bancu aklarashon number, Bank account number, account
Account Number Papiamento aklarashon number, number
bankrekeningnummer,
rekeningnummer
Netherlands Driver's Dutch RIJMEWIJS, permis de conduire, Driver's license, driving permit,
License Number rijbewijs, Rijbewijsnummer, driver's license number
RIJBEWIJSNUMMER
Netherlands Passport Dutch Nederlanden paspoort nummer, Dutch passport number, passport,
Number Paspoort, paspoort, Nederlanden passport number
paspoortnummer,
paspoortnummer
Detecting content using data identifiers 797
Modifying system data identifiers
Table 31-22 Keyword list for international PII data identifiers (continued)
Netherlands Value Dutch, Frisian wearde tafoege tax getal, BTW Value added tax number, VAT
Added Tax (VAT) nûmer, BTW-nummer number
Number
New Zealand Passport Maori uruwhenua, tau uruwhenua, Passport, passport no.
Number uruwhenua no, uruwhenua no.
Table 31-22 Keyword list for international PII data identifiers (continued)
Norway National Norwegian Nasjonalt ID, personlig ID, National ID, personal ID, national
Identification Number Nasjonalt ID#, personlig ID#, skatt ID #, personal ID #, tax ID, tax
id, skattenummer, skattekode, code, taxpayer ID, taxpayer
skattebetalers id, skattebetalers identification number
identifikasjonsnummer
Norway Value Added Norwegian mva, MVA, momsnummer, VAT, VAT number, VAT
Tax Number Momsnummer, registration number
momsregistreringsnummer
Norwegian Birth Norwegian fødsel nummer, Fødsel nr, fødsel Birth number
Number nei, fødselnei#, fødselnummer#
Poland Driver's Licence Polish Kierowcy Lic., prawo jazdy, Drivers license number, driving
Number numer licencyjny, zezwolenie na license, license number
prowadzenie, PRAWO JAZDY
Poland European Polish Numer EHIC, Karta Ubezpieczenia EHIC number, Health Insurance
Health Insurance Zdrowotnego, Europejska Karta Card, European Health Insurance
Number Ubezpieczenia Zdrowotnego, Card, health insurance number,
numer ubezpieczenia medical account number
zdrowotnego, numer rachunku
medycznego
Poland Passport French, Polish paszport#, numer paszportu, Nr Passport #, passport number,
Number paszportu, paszport, książka passport number, passport,
paszportowa passport book
Poland Value Added Polish Numer Identyfikacji Podatkowej, Tax identification number, tax ID
Tax (VAT) Number NIP, nip, Liczba VAT, podatek od number, VAT number, value
wartosci dodanej, faktura VAT, added tax, VAT invoice, VAT
faktura VAT# invoice #
Table 31-22 Keyword list for international PII data identifiers (continued)
Polish REGON Number Polish numer statystyczny, REGON, Statistical number, REGON
numeru REGON, number
numerstatystyczny#,
numeruREGON#
Polish Social Security Polish PESEL Liczba, społeczny PESEL number, social security
Number (PESEL) bezpieczeństwo liczba, społeczny number, social security ID, social
bezpieczeństwo ID, społeczny security code
bezpieczeństwo kod,
PESELliczba#,
społecznybezpieczeństwoliczba#
Polish Tax Polish Numer Identyfikacji Podatkowej, Tax identification number, Polish
Identification Number Polski numer identyfikacji tax identification number
podatkowej,
NumerIdentyfikacjiPodatkowej#
Portugal Driver's Portuguese carteira de motorista, carteira driver's license, license number,
License Number motorista, carteira de habilitação, driving license, driving license
carteira habilitação, número de Portugal
licença, número licença,
permissão de condução,
permissão condução, Licença
condução Portugal, carta de
condução
Portugal National Portuguese bilhete de identidade, número de identity card, civil identification
Identification Number identificação civil, número de number, citizen's card number,
cartão de cidadão, documento de identification document, citizen's
identificação, cartão de cidadão, card, bi number of Portugal,
número bi de portugal, número document number
do documento
Portugal Value Added Portuguese imposto sobre valor Value added tax, VAT, VAT
Tax (VAT) Number acrescentado, VAT nº, número number, VAT code
iva, vat não, código iva
Detecting content using data identifiers 800
Modifying system data identifiers
Table 31-22 Keyword list for international PII data identifiers (continued)
Romania Driver's Romanian permis de conducere, PERMIS DE Driving license, driving license
Licence Number CONDUCERE, Permis de number
conducere, numărul permisului
de conducere, Numărul
permisului de conducere
Romania National Romanian numărul de identificare fiscală, fiscal identification number, tax
Identification Number identificarea fiscală nr #, codul identification number, fiscal code
fiscal nr. number,
Romania Value Added Romanian CIF, cif, CUI, cui, TVA, tva, TVA#, VAT, VAT #, value added tax,
Tax (VAT) Number tva#, taxa pe valoare adaugata, fiscal code, fiscal identification
cod fiscal, cod fiscal de code, unique registration code,
identificare, cod fiscal unique identification code, code
identificare, Cod Unic de unique registration
Înregistrare, cod unic de
identificare, cod unic identificare,
cod unic de înregistrare, cod unic
înregistrare
Romanian Numerical Romanian Cod Numeric Personal, cod Personal numeric code, personal
Personal Code identificare personal, cod unic identification code, unique
identificare, număr personal unic, identification code, identity
număr identitate, număr number, personal identification
identificare personal, number
număridentitate#,
CodNumericPersonal#,
numărpersonalunic#
Russian Passport Russian паспорт нет, паспорт, номер Passport no., passport, passport
Identification Number паспорта, паспорт ID, number, passport ID, Russian
Российской паспорт, Русский passport, Russian passport
номер паспорта, паспорт#, number
паспортID#, номерпаспорта#
Table 31-22 Keyword list for international PII data identifiers (continued)
Table 31-22 Keyword list for international PII data identifiers (continued)
Table 31-22 Keyword list for international PII data identifiers (continued)
Serbia Unique Master Serbian јединствен мајстор грађанин Unique master citizen number,
Citizen Number Број, Јединствен матични број, unique identification number,
јединствен број ид, Национални unique id number, National
идентификациони број identification number
Serbia Value Added Tax Serbian poreski identifikacioni broj, Tax identification number VAT
(VAT) Number PORESKI IDENTIFIKACIONI number, value added tax, VAT,
BROJ, Poreski br., ПДВ број, identification number, tax number
Порез на додату вредност, PDV
broj, Porez na dodatu vrednost,
porez na dodatu vrednost, PDV,
pdv, ПДВ, порески
идентификациони број, PIB, pib,
пиб, poreski broj, порески број
Detecting content using data identifiers 804
Modifying system data identifiers
Table 31-22 Keyword list for international PII data identifiers (continued)
Slovakia Driver's Slovak vodičský preukaz, Vodičský Driving license, license number
Licence Number preukaz, VODIČSKÝ PREUKAZ,
číslo vodičského preukazu,
ovládače lic., povolenie vodiča,
povolenia vodičov, povolenie na
jazdu, povolenie jazdu, číslo
licencie
Slovakia National Hungarian, identifikačné číslo, személyi ID number, identity card number,
Identification Number Slovak igazolvány száma, national identity card number,
személyigazolvány szám, číslo national identification number,
občianského preukazu, identification number, ID card
identifikačná karta č, személyi number, identification card,
igazolvány szám, nemzeti national identity card
személyi igazolvány száma, číslo
národnej identifikačnej karty,
národná identifikačná karta č,
nemzeti személyazonosító
igazolvány, nemzeti azonosító
szám, národné identifikačné číslo,
národná identifikačná značka č,
nemzeti azonosító szám,
azonosító szám, identifikačné
číslo
Slovakia Value Added Slovak číslo DPH, číslo dane z pridanej VAT number, value added tax
Tax (VAT) Number hodnoty, identifikačné číslo vat, number, VAT, value added tax,
dph, DPH, daň z pridanej VAT identification number
hodnoty, daň pridanej hodnoty,
číslo dane pridanej hodnoty,
identifikačné číslo DPH
Slovenia Passport French, Slovenian številka potnega lista, potni list, Passport number, passport,
Number knjiga potnega lista, potni list #, passport book, passport #
passeport, Passeport
Table 31-22 Keyword list for international PII data identifiers (continued)
Slovenia Unique Master Slovenian EMŠO, emšo, edinstvena številka Unique national number, unique
Citizen Number državljana, enotna identifikacijska identification number, uniform
številka, Enotna maticna številka registration number, unique
obcana, enotna maticna številka registration number, citizen's
obcana, številka državljana, number, unique identification
edinstvena identifikacijska number
številka
Slovenia Value Added Slovenian številka davka na dodano Value added tax number, VAT no,
Tax (VAT) Number vrednost, DDV št, slovenia vat št Slovenia vat no
South African Personal Afrikaans nasionale identifikasie nommer, National identification number,
Identification Number nasionale identiteitsnommer, national identity number,
versekering aantal, persoonlike insurance number, personal
identiteitsnommer, unieke identity number, unique identity
identiteitsnommer, number, identity number
identiteitsnommer,
identiteitsnommer#,
versekeringaantal#,
nasionaleidentiteitsnommer#
Spain Driver's License Spanish permiso de conducción, permiso Driver's license, driver's license
Number conducción, Número licencia number, driving license, driving
conducir, Número de carnet de permit, driving permit number
conducir, Número carnet
conducir, licencia conducir,
Número de permiso de conducir,
Número de permiso conducir,
Número permiso conducir,
permiso conducir, licencia de
manejo, el carnet de conducir,
carnet conducir
Detecting content using data identifiers 806
Modifying system data identifiers
Table 31-22 Keyword list for international PII data identifiers (continued)
Spain Value Added Tax Spanish Número IVA españa, Número de Spain VAT number, Spanish VAT
(VAT) Number IVA español, español Número number, VAT Number, VAT, value
IVA, Número de valor agregado, added tax number, value added
IVA, Número IVA, Número tax
impuesto sobre valor añadido,
Impuesto valor agregado,
Impuesto sobre valor añadido,
valor añadido el impuesto, valor
añadido el impuesto numero
Spanish Customer Spanish número cuenta cliente, código Customer account number,
Account Number cuenta, cuenta cliente ID, número account code, customer account
cuenta bancaria cliente, código ID, customer bank account
cuenta bancaria number, bank account code
Spanish DNI ID Spanish NIE número, Documento Nacional NIE number, national identity
de Identidad, Identidad único, document, unique identity,
Número nacional identidad, DNI national identity number, DNI
Número number
Spanish Passport Spanish libreta pasaporte, número passport book, passport number,
Number pasaporte, Número Pasaporte, Spanish passport, passport
España pasaporte, pasaporte
Spanish Social Security Spanish Número de la Seguridad Social, Social security number
Number número de la seguridad social
Spanish Tax ID (CIF) Spanish número de contribuyente, número taxpayer number, corporate tax
de impuesto corporativo, número number, tax identification number,
de Identificación fiscal, CIF CIF number
número, CIFnúmero#
Sri Lanka National Sinhala See user interface ID, national identity number,
Identity Number personal identification number,
National Identity Card number
Sweden Driver's Finnish, Romani, ajokortti, permis de Driver's license, driver's license
License Number Swedish, Yiddish conducere,ajokortin numero, number, driving license number
kuljettajat lic., drivere lic., körkort,
numărul permisului de
conducere, שאָפער דערלויבעניש
נומער, körkort nummer, förare lic.,
דריווערס דערלויבעניש,
körkortsnummer
Detecting content using data identifiers 807
Modifying system data identifiers
Table 31-22 Keyword list for international PII data identifiers (continued)
Sweden Value Added Swedish moms#, sverige moms, sverige Swedish VAT, Swedish VAT
Tax (VAT) Number momsnummer, sverige moms nr, number, VAT registration number
sweden vat nummer, sweden
momsnummmer,
momsregistreringsnummer
Swedish Passport Swedish Passnummer, pass, sverige pass, Passport number, passport,
Number SVERIGE PASS, sverige Swedish passport, Swedish
Passnummer passport number
Switzerland Health German, Italian medizinische Kontonummer, Medical account number, health
Insurance Card Number Krankenversicherungskarte insurance card number, health
Nummer, numero conto medico, insurance number
tessera sanitaria assicurazione
numero, assicurazione sanitaria
numero
Detecting content using data identifiers 808
Modifying system data identifiers
Table 31-22 Keyword list for international PII data identifiers (continued)
Switzerland Passport French, German, Passeport, passeport, numéro Passport, passport number,
Number Italian passeport, numéro de passport # passport book
passeport,passeport#, No de
Passport, passport Number,
passeport, No de passeport.,
passport #
Numéro de passeport,
PASSEPORT, LIVRE DE Passport, passport number,
PASSEPORT passport no., passport #
Passaporto, Numero di
passaporto, passaporto,
Passaporto n,Passaporto n.,
passaporto#, Passaport, numero
passaporto, numero di
passaporto, numero passaporto,
passaporto n, PASSAPORTO
Reisepass, Reisepass#,
REISEPASS
Switzerland Value French, German, T.V.A, numéro TVA, T.V.A#, VAT, VAT number, VAT #, value
Added Tax (VAT) Italian numéro taxe valeur ajoutée, added tax number, value added
Number T.V.A., taxe sur la valeur ajoutée, tax, VAT registration number,
T.V.A#, numéro enregistrement
VAT, VAT number, VAT #
TVA, Numéro TVA
VAT, VAT registration number,
I.V.A, Partita IVA, I.V.A#, numero
VAT #, VAT number
IVA
MwSt,
Umsatzsteuer-Identifikationsnummer,
MwSt#, Mehrwertsteuer-Nummer,
Mehrwertsteuer, VAT
Registrierungsnummer,
Umsatzsteuer-Identifikationsnummer
Swiss AHV Number French Numéro AVS, numéro d'assuré, AVS number, insurance number,
identifiant national, numéro national identifier, national
d'assurance vieillesse, numéro insurance number, social security
de sécurité soclale, Numéro AVH number, AVH number
Table 31-22 Keyword list for international PII data identifiers (continued)
Ukraine Identity Card Ukrainian посвідчення особи України Ukraine identity card
United Arab Emirates Arabic فريدة,رقم التعريف الشخصي, الهوية الشخصية رقمPersonal ID Number, PIN, Unique
Personal Number هوية,التأمينرقم,التأمين رقم, من نوعها هوية رقمID Number, Insurance Number,
فريدة# Unique Identity #
Component Description
Patterns Define one or more data identifier pattern language patterns, separated by line breaks.
Data Normalizer Select a data normalizer to standardize the data before matching against it.
Validators Add or remove validators to perform validation checks on the data detected by the
pattern(s).
Validation Checks Select system-provided validation checks to add them to your list of Active Validators.
Description and Data Entry Provide comma-separated data values for any validators that require data input.
Component Description
Pre- and Post-Validators Pre- and post-validators define characters and character ranges that are valid before
or after a data identifier pattern.
1 Select Manage > Policies > The Data Identifiers screen lists all data identifiers available in the system.
Data Identifiers.
2 Select Add data identifier. Enter a Name for the custom data identifier.
3 Enter one or more Patterns You must enter at least one pattern for the custom data identifier to be valid.
to match data.
Separate multiple patterns by line breaks.
■ Digits
■ Digits and Letters
■ Lowercase
■ Swift codes
■ Do nothing
Select this option if you do not want to normalize the data.
5 Select zero or more Including a validator to check and verify pattern matching is optional.
Validation Checks.
See “Selecting pattern validators” on page 829.
6 Pre- and Post-Validators: Pre- and Post-Validators are required. You can accept the default values,
Specify characters or or edit them as necessary.
character ranges that are
See “Configuring pre- and post-validators” on page 831.
valid or invalid before or after
a data identifier pattern.
7 Save the custom data Click Save at the upper left of the screen.
identifier.
Once you define and save a custom data identifier, it appears alphabetically
in the list of data identifiers at the Data Identifiers screen.
8 Implement the custom data The system lists all custom data identifiers beneath the Custom category
identifier in one or more for the "Content Matches data identifier" condition at the Configure Policy
policies. - Add Rule and the Configure Policy - Add Exception screens.
See “Configuring the Content Matches data identifier condition” on page 737.
You can configure optional validators at the policy instance level for custom
data identifiers.
Character Description
* The asterisk (*), pipe (|), and dot (.) characters are not supported for data identifier
patterns.
|
\s The \s construct cannot be used to match a whitespace character; instead, use an actual
whitespace.
Grouping Grouping only works at the beginning of the pattern, for example:
\d{2} /19 \d{2} does not work; instead use \d{2} /[1][9] \d{2}
Groupings are allowed at the beginning of the pattern, like in the credit card data identifier.
Character Description
The data identifier pattern language includes five predefined special characters. See Table 31-28
for descriptions of these special characters.
Character Description
Bracket expressions
Bracket expressions begin with [ and end with ], and contain at least one character within in
the body of the expression. For example, the bracket expression [abcd] matches any of the
letters "a," "b," "c," or "d."
You can include a character range within a bracket expression by separating two characters
with a hyphen: -. For example, the bracket expression [a-z] matches the lower-case letters
"a" through "z". Any two characters separated by - are interpreted as a range. The relative
ordering of the range does not matter: [a-z] and [z-a] match the same characters.
You can include the characters "]" and "-" in your bracket expression if you follow these rules:
Detecting content using data identifiers 817
Creating custom data identifiers
■ The "]" character must appear as the first character in your bracket expression. For example:
[]a-z] matches the "]" character or any lower-case letter between "a" and "z."
■ The "-" character must appear as either the first or last character in your bracket expression.
If your bracket expression contains both the "]" and "-" characters, the "]" must be the first
character, and "-" the last character. For example: []-] matches either "]" or "-."
Order of interpretation
Data identifier patters are interpreted from left to right. For example, the bracket expression
[a-d-z] is interpreted as the range a-d and then the literals - and z.
Quantifiers
You can follow any token in your data identifier pattern with a quantifier. The quantifier specifies
how many occurrences of the pattern to match. See Table 31-29 for a description of the
quantifiers available in the data identifier pattern language.
Quantifier Description
? This quantifier specifies that the expression should match zero or one
occurrences of the preceding token.
{n} This quantifier specifies that the expression should match exactly n occurrences
of the preceding token.
{n, m} This quantifier specifies that the expression should match between n and m
occurrences of the preceding token (inclusive).
3 Select Manage > Policies > Data Identifiers in the Enforce Server administration console.
4 Select the data identifier you want to modify.
5 Select the breadth for the data identifier you want to modify.
Generally, patterns vary among detection breadths.
6 In the Patterns field, modify an existing pattern, or enter one or more new patterns,
separated by line breaks.
Data identifier patterns are implemented as regular expressions. However, much of the
regular expression syntax is not supported.
See “Using the data identifier pattern language” on page 814.
7 Click Save to save the data identifier.
Table 31-30 Available validators for system and custom data identifiers
Validator Description
ABA Checksum Every ABA routing number must start with the following two digits:
00-15,21-32,61-72,80 and pass an ABA specific, position-weighted check sum.
Advanced KRRN Validation Validates that 3rd and 4th digits are a valid month, that 5th and 6th digits are a valid
day, and the checksum matches the check digit.
Advanced SSN Validator checks whether SSN contains zeros in any group, the area number (first
group) is less than 773 and not 666, the delimiter between the groups is the same,
the number does not consist of all the same digits, and the number is not reserved
for advertising (123-45-6789, 987-65-432x).
Argentinian Tax Identity Computes the checksum and validates the pattern against it.
Number Validation Check
Australian Business Number Computes the checksum and validates the pattern against it.
Validation Check
Australian Company Number Computes the checksum and validates the pattern against it.
Validation Check
Australian Medicare Number Computes the checksum and validates the pattern against it.
Validation Check
Detecting content using data identifiers 819
Creating custom data identifiers
Table 31-30 Available validators for system and custom data identifiers (continued)
Validator Description
Australian Tax File validation Computes the checksum and validates the pattern against it.
check
Austria VAT Number Computes the checksum and validates the pattern against it.
Validation Check
Austrian Social Security Computes the checksum and validates the pattern against it.
Number Validation Check
Belgian National Number Computes the checksum and validates the pattern against it.
Validation Check
Belgian Tax Identification Computes the checksum and validates the pattern against it.
Number Validation Check
Belgium VAT Number Computes the checksum and validates the pattern against it.
Validation Check
Brazil Election Identification Computes the checksum and validates the pattern against it.
Number Validation Check
Brazilian National Registry of Computes the checksum and validates the pattern against it.
Legal Entities Number
Validation Check
Brazilian Natural Person Computes the checksum and validates the pattern against it.
Registry Number Validation
Check
British Columbia Personal Computes the checksum and validates the pattern against it.
Healthcare Number Validation
Check
Bulgaria Value Added Tax Computes the checksum and validates the pattern against it.
(VAT) Number Validation
Check
Bulgarian Uniform Civil Computes the checksum and validates the pattern against it.
Number Validation Check
Canada Driver's License Computes the checksum and validates the pattern against it.
Number Check
Detecting content using data identifiers 820
Creating custom data identifiers
Table 31-30 Available validators for system and custom data identifiers (continued)
Validator Description
Chilean National Identification Computes the checksum and validates the pattern against it.
Number Validation Check
China ID checksum validator Computes the checksum and validates the pattern against it.
Codice Fiscale Control Key Computes the control key and checks if it is valid.
Check
Croatia National Identification Computes the checksum and validates the pattern against it.
Number Validation Check
Cusip Validation Validator checks for invalid CUSIP ranges and computes the CUSIP checksum
(Modulus 10 Double Add Double algorithm).
Custom Script* Enter a custom script to validate pattern matches for this data identifier breadth.
Cyprus Tax Identification Computes the checksum and validates the pattern against it.
Number Validation Check
Cyprus Value Added Tax Computes the checksum and validates the pattern against it.
(VAT) Number Validation
Check
Czech Personal Identity Computes the checksum and validates the pattern against it.
Number Validation Check
Czech Republic Tax Computes the checksum and validates the pattern against it.
Identification Number
Validation Check
Czech Republic VAT Number Computes the checksum and validates the pattern against it.
Validation Check
Denmark Personal Computes the checksum and validates the pattern against it.
Identification Number
Validation Check
Denmark Tax Identification Computes the checksum and validates the pattern against it.
Number Validation Check
Denmark VAT Number Computes the checksum and validates the pattern against it.
Validation Check
DNI control key check Computes the control key and checks if it is valid.
Detecting content using data identifiers 821
Creating custom data identifiers
Table 31-30 Available validators for system and custom data identifiers (continued)
Validator Description
Driver's License Number WA Computes the checksum and validates the pattern against it.
State Validation Check
Driver's License Number WI Computes the checksum and validates the pattern against it.
State Validation Check
Drug Enforcement Agency Computes the checksum and validates the pattern against it.
Number Validation Check
Duplicate digits Ensures that a string of digits are not all the same.
Dutch Tax Identification Computes the checksum and validates the pattern against it.
Number Validation Check
Estonia Personal Computes the checksum and validates the pattern against it.
Identification Number Check
Estonia Value Added Tax Computes the checksum and validates the pattern against it.
(VAT) Number Validation
Check
Exact Match* Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Exact Match Data Identifier Looks up tokens around a pattern for the Exact Match Data Identifier index and
Check validates the pattern.
Exclude beginning Enter a comma-separated list of values. If the values are numeric, do NOT enter
characters* any dashes or other separators. Each value can be of any length.
Note: Beginning and ending validators concern the text of the match itself. Prefix
and suffix validators concern characters before and after matched text.
Exclude ending characters* Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Exclude exact match* Enter a comma-separated list of values. Each value can be of any length.
Exclude prefix* Enter a comma-separated list of values. Each value can be of any length.
Note: Prefix and suffix validators concern characters before and after matched text.
Beginning and ending validators concern the text of the match itself.
Exclude suffix* Enter a comma-separated list of values. Each value can be of any length.
Find keywords* Enter a comma-separated list of values. Each value can be of any length.
Detecting content using data identifiers 822
Creating custom data identifiers
Table 31-30 Available validators for system and custom data identifiers (continued)
Validator Description
Finland Driver's Licence Computes the checksum and validates the pattern against it.
Number Validation Check
Finland Tax Identification Computes the checksum and validates the pattern against it.
Number Validation Check
Finland VAT Number Computes the checksum and validates the pattern against it.
Validation Check
Finnish Personal Computes the checksum and validates the pattern against it.
Identification Number
Validation Check
France VAT Number Computes the checksum and validates the pattern against it.
Validation Check
French Social Security Computes the checksum and validates the pattern against it.
Number Validation Check
German ID Number Validation Computes the checksum and validates the pattern against it.
Check
German Passport Number Computes the checksum and validates the pattern against it.
Validation Check
Germany Tax Number Computes the checksum and validates the pattern against it.
Validation Check
Germany VAT Number Computes the checksum and validates the pattern against it.
Validation Check
Greece Social Security Computes the checksum and validates the pattern against it.
Number (AMKA)
Greece VAT Number Computes the checksum and validates the pattern against it.
Validation Check
Greek Tax Identification Computes the checksum and validates the pattern against it.
Number Validation Check
HCPCS CPT Code Validation Computes the checksum and validates the pattern against it.
Check
Health Care Insurance Computes the checksum and validates the pattern against it.
Number Check
Hong Kong ID Computes the checksum and validates the pattern against it.
Detecting content using data identifiers 823
Creating custom data identifiers
Table 31-30 Available validators for system and custom data identifiers (continued)
Validator Description
Hungarian Social Security Computes the checksum and validates the pattern against it.
Validation Check
Hungarian Tax Identification Computes the checksum and validates the pattern against it.
Number Validation Check
Hungarian VAT Number Computes the checksum and validates the pattern against it.
Validation Check
Hungary Passport Number Computes the checksum and validates the pattern against it.
Validation Check
Iceland National Identification Computes the checksum and validates the pattern against it.
Number Validation Check
Indonesian Kartu Tanda Computes the checksum and validates the pattern against it.
Penduduk Validation Check
INSEE Control Key Validator computes the INSEE control key and compares it to the last 2 digits of the
pattern.
IP Basic Check Every IP address must match the format x.x.x.x and every number must be less than
256.
IP Octet Check Every IP address must match the format x.x.x.x, every number must be less than
256, and no IP address can contain only single-digit numbers (1.1.1.2).
IP Reserved Range Check Checks whether the IP address falls into any of the "Bogons" ranges. If so the match
is invalid.
IPv6 Basic Validation Check Every IPv6 address must match the format xxxx.xxxx.xxxx.xxxx.xxxx.xxxx.xxxx.xxxx
and every number must be lower than ffff.
Ipv6 Medium Validation Check Every IPv6 address must match the format xxxx.xxxx.xxxx.xxxx.xxxx.xxxx.xxxx.xxxx
and every number must be lower than ffff. No IPv6 address can start with 0.
Ipv6 Reserved Validation Every IPv6 address must match the format xxxx.xxxx.xxxx.xxxx.xxxx.xxxx.xxxx.xxxx
Check and every number must be lower than ffff. No IPv6 address can start with 0. Each
IPv6 address must be fully compressed.
Ireland Tax Identification Computes the checksum and validates the pattern against it.
Number Validation Check
Ireland VAT Number Computes the checksum and validates the pattern against it.
Validation Check
Detecting content using data identifiers 824
Creating custom data identifiers
Table 31-30 Available validators for system and custom data identifiers (continued)
Validator Description
Irish Personal Public Service Computes the checksum and validates the pattern against it.
Number Validation Check
Israel Personal Identity Computes the checksum and validates the pattern against it.
Number Validation Check
Italy VAT Number Validation Computes the checksum and validates the pattern against it.
Check
Japan Driver's License Computes the checksum and validates the pattern against it.
Number Validation Check
Japanese Juki-Net ID Computes the checksum and validates the pattern against it.
Validation Check
Japanese My Number Computes the checksum and validates the pattern against it.
Validation Check
KRRN Foreign Validation Validates that 3rd and 4th digits are a valid month, that 5th and 6th digits are a valid
Check day, and the checksum matches the check digit.
Latvia Personal Code Check Computes the checksum and validates the pattern against it.
Latvia Value Added Tax (VAT) Computes the checksum and validates the pattern against it.
Number Validation Check
Lithuania Tax Identification Computes the checksum and validates the pattern against it.
Number Validation Check
Lithuania Value Added Tax Computes the checksum and validates the pattern against it.
(VAT) Number Validation
Check
Luhn Check Computes the Luhn checksum and validates the matched pattern against it.
Luxembourg National Computes the checksum and validates the pattern against it.
Register of Individuals
Number Validation Check
Luxembourg Tax Computes the checksum and validates the pattern against it.
Identification Number
Validation Check
Luxembourg VAT Number Computes the checksum and validates the pattern against it.
Validation Check
Detecting content using data identifiers 825
Creating custom data identifiers
Table 31-30 Available validators for system and custom data identifiers (continued)
Validator Description
Malaysian MyKad Number Computes the checksum and validates the pattern against it.
Validation Check
Malta Value Added Tax (VAT) Computes the checksum and validates the pattern against it.
Number Validation Check
Medicare Beneficiary Identifier Computes the checksum and validates the pattern against it.
Number Validation Check
Mexican CRIP Validation Computes the checksum and validates the pattern against it.
Check
Mexican Tax Identification Computes the checksum and validates the pattern against it.
Validation Check
Mexican Unique Population Computes the checksum and validates the pattern against it.
Registry Code Validation
Check
Mexico CLABE Number Computes the checksum and validates the pattern against it.
Validation Check
Mod 97 Validator Computes the ISO 7064 Mod 97-10 checksum of the complete match.
National Provider Identifier Computes the checksum and validates the pattern against it.
Number Validation Check
National Securities Computes the checksum and validates the pattern against it.
Identification Number
Validation Check
Netherlands Bank Account Computes the checksum and validates the pattern against it.
Number Validation Check
Netherlands VAT Number Computes the checksum and validates the pattern against it.
Validation Check
New Zealand National Health Computes the checksum and validates the pattern against it.
Index Number Validation
Check
NIB Number Validation Check Computes the ISO 7064 Mod 97-10 checksum of the complete match of the NIB
Number.
Table 31-30 Available validators for system and custom data identifiers (continued)
Validator Description
Norway National Identificaiton Computes the checksum and validates the pattern against it.
Number Validation Check
Norway Value Added Tax Computes the checksum and validates the pattern against it.
(VAT) Number Check
Norwegian Birth Number Computes the checksum and validates the pattern against it.
Validation Check
Poland VAT Number Computes the checksum and validates the pattern against it.
Validation Check
Polish ID Number Validation Computes the checksum and validates the pattern against it.
Check
Polish REGON Number Computes the checksum and validates the pattern against it.
Validation Check
Polish Social Security Number Computes the checksum and validates the pattern against it.
Validation Check
Polish Tax ID Number Computes the checksum and validates the pattern against it.
Validation Check
Portugal National Computes the checksum and validates the pattern against it.
Identification Number
Validation Check
Portugal Tax and VAT Computes the checksum and validates the pattern against it.
Identification Number
Validation Check
Randomized US Social Computes the checksum and validates the pattern against it.
Security Number Validation
Check
Require beginning characters* Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Require ending characters* Enter a comma-separated list of values. If the values are numeric, do NOT enter
any dashes or other separators. Each value can be of any length.
Romania Driver's Licence Computes the checksum and validates the pattern against it.
Number Validation Check
Detecting content using data identifiers 827
Creating custom data identifiers
Table 31-30 Available validators for system and custom data identifiers (continued)
Validator Description
Romania National Computes the checksum and validates the pattern against it.
Identification Number Check
Romania VAT Number Computes the checksum and validates the pattern against it.
Validation Check
Romanian Numerical Personal Computes the checksum and validates the pattern against it.
Code Check
Russian Taxpayer Computes the checksum and validates the pattern against it.
Identification Number
Validation Check
SEPA Creditor Number Computes the checksum and validates the pattern against it.
Validation Check
Serbia Value Added Tax (VAT) Computes the checksum and validates the pattern against it.
Number Validation Check
Singapore NRIC Computes the Singapore NRIC checksum and validates the pattern against it.
Slovakia National Computes the checksum and validates the pattern against it.
Identification Number
Validation Check
Slovakia Value Added Tax Computes the checksum and validates the pattern against it.
(VAT) Number Validation
Check
Slovenia Tax Identification Computes the checksum and validates the pattern against it.
Number Validation Check
Slovenia Unique Master Computes the checksum and validates the pattern against it.
Citizen Number Validation
Check
Slovenia Value Added Tax Computes the checksum and validates the pattern against it.
(VAT) Number Validation
Check
South African Personal Computes the checksum and validates the pattern against it.
Identification Number
Validation Check
Spain VAT Number Validation Computes the checksum and validates the pattern against it.
Check
Detecting content using data identifiers 828
Creating custom data identifiers
Table 31-30 Available validators for system and custom data identifiers (continued)
Validator Description
Spanish Customer Account Computes the checksum and validates the pattern against it.
Number Validation Check
Spanish SSN Number Computes the checksum and validates the pattern against it.
Validation Check
Spanish Tax ID Number Computes the checksum and validates the pattern against it.
Validation Check
Sri Lanka National Computes the checksum and validates the pattern against it.
Identification Number
Validation Check
SSN Area-Group number For a given area number (first group), not all group numbers (second group) might
have been assigned by the SSA. Validator eliminates SSNs with invalid group
numbers.
Sweden TaxPayer Computes the checksum and validates the pattern against it.
Identification Number
Validation Check
Sweden Value Added Tax Computes the checksum and validates the pattern against it.
Number Validation Check
Swedish Personal Computes the checksum and validates the pattern against it.
Identification Number
Validation Check
Swiss Social Security Number Computes the checksum and validates the pattern against it.
Validation Check
Switzerland Value Added Tax Computes the checksum and validates the pattern against it.
(VAT) Number Validation
Check
Thailand Personal Computes the checksum and validates the pattern against it.
Identification Number
Validation Check
Turkish Identification Number Computes the checksum and validates the pattern against it.
Validation Check
UK Bank Sort Code Check Computes the checksum and validates the pattern against it.
Detecting content using data identifiers 829
Creating custom data identifiers
Table 31-30 Available validators for system and custom data identifiers (continued)
Validator Description
UK Drivers License Every UK drivers license must be 16 characters and the number at the 8th and 9th
position must be larger than 00 and smaller than 32.
UK VAT Number Validation Computes the checksum and validates the pattern against it.
Check
Ukraine Identity Card Check Validates that the first eight digits are a correctly formatted date.
Venezuela Identification Computes the checksum and validates the pattern against it.
Number Validation Check
Verhoeff Validation Check Computes the checksum and validates the pattern against it.
Ukraine Identity Card Check Computes the checksum and validates the pattern against it.
Zip+4 Postal Codes Validation Computes the checksum and validates the pattern against it.
Check
Note: The active validators that allow for and define input are not to be confused with the
"Optional validators" that can be configured for any runtime instance of a particular data
identifier. Optional validators are always configurable at the instance level. Active validators
are only configurable at the system level.
Select a validator from the "Validation Checks" list on the left, then click Add Validator to the
right. If the validator requires input, provide the required data using a comma-separated list
and then click Add Validator.
See “Selecting pattern validators” on page 829.
Detecting content using data identifiers 830
Creating custom data identifiers
6 Click Add Validator when you are done entering the values.
The validator is added to the Active Validators list.
7 To remove a validator, select it in the Active Validators list and click the red X icon.
8 Click Save to save the configuration of the data identifier.
Normalizer Description
Note: Refer to the Symantec Data Loss Prevention Detection Customization Guide for details
on using the Symantec Data Loss Prevention Scripting Language.
pre- and post-validators. Additionally, the \l (letter) and \d (digit) special characters are
acceptable as invalid pre- or post validator characters.
Though they are not defined here, white spaces such as tabs and new lines are also treated
as valid characters for pre- and post-validators.
Pre- and Post-Validators are required in custom data identifiers. The fields are pre-populated
with default values, but you can edit them as necessary to tune your results.
The default values for the pre- and post-validators are:
Pre-validators:
■ Valid: ,=:#"'()>;@!`~$%^*\S
■ Invalid: \S\w
Post-validators:
■ Valid: ,."'()<;&=@`~\S
■ Invalid: \S\w
The pre- and post-validators only check the character immediately preceding or following the
matched data identifier. In cases where the same characters appear in both the valid and
invalid fields, the valid field takes precedence. For example, where \S (a Unicode character)
appears in both the valid and invalid field for pre-validator characters, Unicode characters will
be considered valid pre-validator characters.
Examples
These examples show some matching and non-matching pre- and post-validators for a 10
digit data identifier pattern \d{10}:
The following strings would match or not match the data identifier pattern based on the
preceding or following characters as described here:
Detecting content using data identifiers 833
Best practices for using data identifiers
own custom data identifiers to match any data you can describe using the data identifier pattern
language. Data identifiers are commonly used to detect personally identifiable information
(PII).
This section provides best practices for implementing data identifier policies.
Table 31-34 summarizes the best practices in this section.
Use data identifiers instead of regular expressions when See “Use data identifiers instead of regular expressions
possible. to improve accuracy” on page 834.
Modify data identifier definitions when you want tuning to See “Modify data identifier definitions when you want tuning
apply globally. to apply globally” on page 835.
Close system-defined data identifiers before modifying See “Clone system-defined data identifiers before
them. modifying to preserve original state” on page 835.
Consider using multiple data identifier breadths in parallel. See “Consider using multiple breadths in parallel to detect
different severities of confidential data” on page 836.
Avoid matching on the Envelope over HTTP. See “Avoid matching on the Envelope over HTTP to reduce
false positives” on page 836.
Use the Randomized US SSN data identifier to detect See “Use the Randomized US SSN data identifier to detect
traditional and randomized SSNs. SSNs” on page 836.
Use unique match counting to improve accuracy and ease See “Use unique match counting to improve accuracy and
remediation. ease remediation” on page 837.
identifier is more accurate than any regular expression you can write and much easier and
quicker to implement.
Note: The data identifier pattern language is a limited subset of the regular expression language.
Not all regular expression constructs or characters are supported for data identifier patterns.
See “Using the data identifier pattern language” on page 814.
The general recommendation is to configure data identifier definitions so that the changes
apply globally to any instance of that data identifier definition. Such configurations are reusable
across policies. Rule-level optional validators, such as, should be used for unique policies.
can go up to 899 instead of 773. Randomization applies to SSNs issued on or after June 25,
2011. It does not apply to SSNs issued before that date.
To support the new randomized SSN scheme, Symantec Data Loss Prevention provides the
system-defined Randomized US Social Security Number (SSN) data identifier.
See “Randomized US Social Security Number (SSN)” on page 1414.
The Randomized US SSN data identifier detects both traditional and randomized SSNs. The
Randomized US SSN data identifier replaces the US SSN data identifier, which only detects
traditional SSNs.
Symantec recommends that you use the Randomized US SSN data identifier for all new
policies that you want to use to detect SSNs, and that you update your existing SSN policies
to use the Randomized US SSN data identifier. For your existing policies that already implement
the traditional US SSN data identifier, you can add the Randomized US SSN data identifier
as an OR'd rule so that both run in parallel as you test the policy to ensure it accurately detects
both styles of SSNs.
See “Updating policies to use the Randomized US SSN data identifier” on page 810.
Chinese, Japanese, and Korean (CJK) languages with token verification enabled for the
server
See “About keyword matching for Chinese, Japanese, and Korean (CJK) languages”
on page 839.
Mixed languages
Server Enable token verification on the detection server and use whole word matching
See “Enabling and using CJK token verification for server keyword matching” on page 847.
Behavior Description
Whole word matching With whole word matching, keywords match at word boundaries only (\W in the regular
expression lexicon). Any characters other than A-Z, a-z, and 0-9 are interpreted as word
boundaries.
With whole word matching, keywords must have at least one alphanumeric character (a letter
or a number). A keyword consisting of only white-space characters, such as "..", is ignored.
Quotation marks Do not use quotation marks when you enter keywords or phrases because quotes are interpreted
literally and will be required in the match.
White space The systems strips out the white space before and after keywords or key phrases. Each
whitespace within a keyword phrase is counted. In addition to actual spaces, all characters
other than A-Z, a-z, and 0-9 are interpreted as white spaces.
Case sensitivity The case sensitivity option that you choose applies to all keywords in the list for that condition.
Detecting content using keyword matching 841
Introducing keyword matching
Behavior Description
Plurals and verb All plurals and verb inflections must be specifically listed. If the number of enumerations
inflections becomes complicated use the wildcard character (asterisk [*]) to detect a keyword suffix (in
whole word mode only).
Keyword phrases You can enter keyword phrases, such as social security number (without quotes). The system
looks for the entire phrase without returning matches on individual constituent words (such as
social or security).
Keyword variants The system only detects the exact keyword or key phrase, not variants. For example, if you
specify the key phrase social security number, detection does not match a phrase that
contains two spaces between the words.
Matching multiple The system implies an OR between keywords. That is, a message component matches if it
keywords contains any of the keywords, not necessarily all of them. To perform an ALL (or AND) keyword
match, combine multiple keyword conditions in a compound rule or exception.
Alpha-numeric During keyword matching, only a letter or a digit is considered a valid keyword start position.
characters Special characters (non-alphanumeric) are treated as delimiters (ignored). For example, the
ampersand character ("&") and the underscore character ("_") are special characters and are
not considered for keyword start position.
____keyword__
Keyword
&&akeyword&&
123Keyword__
For these examples, the valid keyword start positions are as follows: k, K, a, and 1.
Note: This same behavior applies to keyword validators implemented in data identifiers.
Proximity The word distance (proximity value) is exclusive of detected keywords. Thus, a word distance
of 10 allows for a proximity window of 12 words.
®CONFIDENTIAL
key phrase internal use only internal use only internal use
hacker hacker
hacks
privilege prevent
privy
privity
privs
priv
keyword dictionary account number, account ps, american If any keyword or phrase is amx
express, americanexpress, amex, bank present, the data is matched:
creditcard
card, bankcard, card num, card number,
cc #, cc#, ccn, check card, checkcard, amex master card
credit card, credit card #, credit card credit card car
number, credit card#, debit card,
debitcard, diners club, dinersclub, mastercard
discover, enroute, japanese card bureau,
jcb, mastercard, mc, visa, (etc....)
If token verification is enabled, the message size must be sufficient for the token validator to
recognize the language. For example: the message “東京都市部の人口” is too small fo a
message for the token validation process to recognize the language of the message. The
following message is a sufficient size for token validation processing:
今朝のニュースによると東京都市部の人口は増加傾向にあるとのことでした。 全国的な人口
減少の傾向の中、東京への一極集中を表しています。
See “About keyword matching for Chinese, Japanese, and Korean (CJK) languages”
on page 839.
Token validation for CJK language keywords is not available on the endpoint. To match CJK
on the endpoint, you configure the condition to match on whole words only.
See “Keep the keyword lists for your HIPAA and Caldicott policies up to date” on page 850.
See “HIPAA and HITECH (including PHI) policy template” on page 1690.
See “Caldicott Report policy template” on page 1561.
Match on whole or partial keywords Separate each keyword or phrase by a newline or comma.
and key phrases
See “Keyword matching examples” on page 841.
Match on the wildcard asterisk (*) Match the wildcard at the end of a keyword, in whole word mode only.
character
See “Keyword matching examples” on page 841.
Find keywords Implement one or more keywords in data identifiers to refine the scope of
detection.
Policy rules and exceptions You can implement keyword matching conditions in policy rules and exceptions.
Keyword dictionary If you have a large dictionary of keywords, you can index the keyword list.
See “Use VML to generate and maintain large keyword dictionaries” on page 851.
CJK token verification Enable on the detection server for CJK languages and match on whole words
only.
Action Description
Enter the match type. Select if you want the keyword match to be:
Choose the keyword Select the keyword separator you to delimit multiple keywords:
separator.
Newline or Comma.
Match any keyword. Enter the keyword(s) or key phrase(s) you want to match. Use the separator you have selected
(newline or comma) to delimit multiple keyword or key phrase entries.
You can use the asterisk (*) wildcard character at the end of any keyword to match one or more
suffix characters in that keyword. If you use the asterisk wildcard character, you must match
on whole words only. For example, a keyword entry of confid* would match on "confidential"
and "confide," but not "confine." As long as the keyword prefix matches, the detection engine
matches on the remaining characters using the wildcard.
Action Description
Configure keyword Keyword proximity matching lets you specify a range of detection among keyword pairs.
proximity matching
See “About keyword proximity” on page 840.
(optional).
To implement keyword proximity matching:
■ Select (check) the Keyword Proximity matching option in the "Conditions" section of the
rule builder interface.
■ Click Add Pair of Keywords.
■ Enter a pair of keywords.
■ Specify the Word distance.
The maximum distance between keywords is 999, as limited by the three-digit length of the
“Word distance” field. The word distance is exclusive of detected keywords. For example,
a word distance of 10 allows for a range of 12 words, including the two words comprising
the keyword pair.
■ Repeat the process to add additional keyword pairs.
The system connects multiple keyword pair entries the OR Boolean operator, meaning that
the detection engine evaluates each keyword pair independently.
Match on whole or Select the option On whole words only to match on whole keywords only (by default this
partial keywords. option is selected).
You must match on whole words only if you use the asterisk (*) wildcard character in any
keyword you enter in the list.
Configure match Keyword matching lets you specify how you want to count condition matches.
conditions. Select one of the following options:
Action Description
Select components Keyword matching detection supports matching across message components.
to match on.
See “Selecting components to match on” on page 423.
Select one or more message components to match on:
Note: On the endpoint the DLP Agent matches on the entire message, not individual
components.
Also match one or Select this option to create a compound condition. All conditions must be met to report a match.
more additional
You can Add any available condition from the list.
conditions.
See “Configuring compound match conditions” on page 429.
Enable keyword token verification for CJK describes how to enable and use token verification
for CJK keywords.
Detecting content using keyword matching 848
Configuring keyword matching
Updating the Drug, Disease, and Treatment keyword lists for your
HIPAA and Caldicott policies
If you have created a policy derived from the HIPAA or Caldicott template and have not made
any changes or customizations to the derived policy, after upgrade you can create a new policy
from the appropriate template and remove the old policy from production. If you have made
changes to a policy derived from either the HIPAA or Caldicott policy template and you want
to preserve these changes, you can copy the updated keyword lists from either the HIPAA or
Caldicott policy template and use the copied keyword lists to update your HIPAA or Caldicott
policies.
See “About updates to the Drug, Disease, and Treatment keyword lists” on page 843.
See “Keep the keyword lists for your HIPAA and Caldicott policies up to date” on page 850.
To update the Drug, Disease, and Treatment keyword lists for HIPAA and Caldicott policies
provides instructions for updating the keyword lists for your HIPAA and Caldicot policies.
To update the Drug, Disease, and Treatment keyword lists for HIPAA and Caldicott policies
1 Create a new policy from a template and choose either the HIPAA or Caldicott template.
See “Creating a policy from a template” on page 397.
2 Edit the detection rules for the policy.
See “Configuring policy rules” on page 417.
Detecting content using keyword matching 849
Best practices for using keyword matching
3 Select the Patient Data and Drug Keywords (Keyword Match) rule.
4 Select the Content Matches Keyword condition.
5 Select all the keywords in the Match any Keyword data field and copy them to the
Clipboard.
6 Paste the copied keywords to a text file named Drug Keywords.txt.
7 Cancel the rule edit operation to return to the policy Detection tab.
8 Repeat the same process for the Patient Data and Treatment Keywords (Keyword
Match) rule.
9 Copy and paste the keywords from the condition to a text file named Treatment
Keywords.txt.
10 Repeat the same process for the Patient Data and Disease Keywords (Keyword Match)
rule.
11 Copy and paste the keywords from the condition to a text file named Disease
Keywords.txt.
12 Update your HIPAA and Caldicott policies derived from the HIPAA or Caldicott templates
using the keyword *.txt files you created.
13 Test your updated HIPAA and Caldicott policies.
Enable linguistic validation for CJK keyword See “Enable token verification on the server to reduce false
detection on the server. positives for CJK keyword detection” on page 850.
Update keyword lists for your Caldicott and HIPAA See “Keep the keyword lists for your HIPAA and Caldicott policies
policies. up to date” on page 850.
Tune keyword validators to improve data identifier See “Tune keywords lists for data identifiers to improve match
accuracy. accuracy” on page 851.
Detecting content using keyword matching 850
Best practices for using keyword matching
Use VML to profile long keyword lists and See “Use VML to generate and maintain large keyword
dictionaries dictionaries” on page 851.
Use keyword matching for metadata detection. See “Use keyword matching to detect document metadata”
on page 851.
Keep the keyword lists for your HIPAA and Caldicott policies up to
date
For each Symantec Data Loss Prevention relese, the Drug, Disease, and Treatment keyword
lists are updated based on information from the U.S. Federal Drug Administration (FDA) and
other sources. These keyword lists are used in the HIPAA and HITECH (including PHI) and
Caldicott Report policy templates.
See “About updates to the Drug, Disease, and Treatment keyword lists” on page 843.
If you have upgraded to the latest Data Loss Prevention version and you have existing policies
derived from either the HIPAA or Caldicott policy template, consider updating your HIPAA and
Caldicott policies to use the Drug, Disease, and Treatment keyword lists provided with this
Data Loss Prevention version.
See “Updating the Drug, Disease, and Treatment keyword lists for your HIPAA and Caldicott
policies” on page 848.
Detecting content using keyword matching 851
Best practices for using keyword matching
Note: Data Identifier pattern matching is based on the regular expression syntax. However,
not all regular expression constructs listed in the table below are supported by Data Identifier
patterns. See “About data identifier patterns” on page 732.
[] Elements inside brackets are a character class (For example, [abc] matches 1 character:
a, b, or c.)
^ At the beginning of a character class, negates it (For example, [^abc] matches anything
except a, b, or c.)
Detecting content using regular expressions 854
Configuring the Content Matches Regular Expression condition
+ Following a regular expression means 1 or more (For example, \d+ means 1 or more digit.)
* Following a regular expression means any number (For example, \d* means 0, 1, or more
digits.)
(?i) At the beginning of a regular expression makes the expression case-insensitive (Regular
expressions are case-sensitive by default.)
| Means OR (For example, A|B means regular expression A or regular expression B.)
Action Description
Check for existence reports a match count of 1 if there are one or more matches. For
compound rules or exceptions, all conditions must be configured this way.
Count all matches reports the sum of all matches; applies if any condition uses this
parameter.
Match on one or more Configure cross-component matching by selecting one or more message components to
message components. match on.
Also match one or more Select this option to create a compound condition. All conditions must match to trigger or
additional conditions. except an incident.
Use Data Identifiers instead of regular expressions where See “Use regular expressions sparingly to support efficient
possible. performance” on page 857.
Detecting content using regular expressions 856
Best practices for using regular expression matching
Use regular expressions sparingly to support efficient policy See “Test regular expressions before deployment to
performance. improve accuracy” on page 857.
Use look ahead and behind characters to improve regular See “Use look ahead and look behind characters to
expression performance. improve regular expression accuracy” on page 856.
Test regular expressions for accuracy and performance. See “Test regular expressions before deployment to
improve accuracy” on page 857.
Operation Construct
Table 33-4 Look ahead and look behind standard sections (continued)
Operation Construct
and
(?<=(^|(?:[^)+\d][^-\w+])|\t))
Content matches, the taxonomy is available to you to select from drop-down menus under
Organization, Scope, and Level. You can also select Any organization or scope. To complete
the detection formula, you choose the search Operator, such as Not Equals or Is Less Than
or Equals. Multiple operators can be combined ("OR'd" together).
Note: The Content is classified expression is triggered only if the classified file or email
message has been classified within the imported taxonomy. If a file or email message has
been classified using some other taxonomy that has not been imported into Enforce, then this
expression does not evaluate as true. Similarly, something that has been classified within
another Information Centric Tagging taxonomy that is not known to Enforce evaluates as
Content is not classified.
To detect these tags, the Data Loss Prevention detection engine searches the metadata of
supported emails and files. Prior to your search running, end users applied the tags to various
emails and files.
See “About integrating Information Centric Tagging with Data Loss Prevention” on page 226.
PDF .pdf
Note: Even though tags can be detected in the (unencrypted) metadata, a common scenario
for using the Content Matches Classification option is to join this option with other options,
such as using keyword matching or regular expressions to detect sensitive content, such
as Social Security Numbers. Then, if a file is detected with a Level 1 (PUBLIC) tag, for
example, but the document content is sensitive, an incident could be generated. If content
is encrypted, that type of policy using compound rules fails.
Note: In the tables, the term this taxonomy refers to the taxonomy that's been
imported/synchronized on this Enforce Server.
The tag belongs to this taxonomy. ■ The tag belongs to a different taxonomy.
■ There is no classification tag applied to the
content.
■ The tag is in the wrong format.
Table 34-3 Search results for the Content is not classified condition
■ The tag belongs to a different taxonomy. The tag belongs to this taxonomy.
■ There is no classification tag applied to the
content.
■ The tag is in the wrong format.
Detecting content using classification matching 861
How tag matching works
Table 34-4 Search results for the Content matches [specific operator and selected tags]
condition
The ICT tag matches the criteria. ■ The tag in this taxonomy does not match the
criteria.
■ The tag belongs to a different taxonomy.
■ There is no classification tag applied to the
content.
■ The tag is in the wrong format.
Table 34-5 lists an example of an imported classification taxonomy, displayed on the System
> Settings > Information Centric Tagging page.
Table 34-6 shows the results of running various combinations of operators and tag selections
against that taxonomy, either from the Configure Policy - Add Rule page or the Configure
Policy - Edit Rule page, when defining a detection rule of Content Matches Classification
type.
CLOUD
ENG
CONFID 4
RESTRICT 3
INTERNAL 2
CORE
FIN
SECRET 5
HR
PUB 1
MKTG
CONFID 4
PUB 1
Detecting content using classification matching 862
How tag matching works
OUTSRC
ENG
SECRET 4
CONFID 3
DEPTONLY 2
Table 34-6 Incidents that evaluate to true, based on operator and matching requirements
Evaluates to true if
content classified
as:
(2) INTERNAL
Evaluates to true if
content classified
as:
Evaluates to true if
content classified
as:
Table 34-6 Incidents that evaluate to true, based on operator and matching
requirements (continued)
Evaluates to true if
content classified
as:
Evaluates to true if
content classified
as:
Parameter Description
Parameter Description
Canadian Social Insurance Numbers This policy detects patterns indicating Canadian social insurance numbers.
Data Protection Act 1998 This policy protects personal identifiable information.
EU Data Protection Directives This policy detects personal data specific to the EU directives.
See “Data Protection Directives (EU) policy template” on page 1570.
General Data Protection Regulations This policy protects personal identifiable information related to banking and
(Banking and Finance) finance.
See “General Data Protection Regulation (Banking and Finance)” on page 1583.
General Data Protection Regulation This policy protects personal identifiable information related to digital identity.
(Digital Identity)
See “General Data Protection Regulation (Digital Identity)” on page 1617.
General Data Protection Regulation This policy protects personal identifiable information related to government
(Government Identification) identification.
General Data Protection Regulation This policy protects personal identifiable information related to healthcare
(Healthcare and Insurance) and insurance.
General Data Protection Regulation This policy protects personal identifiable information related to personal
(Personal Profile) profile data.
General Data Protection Regulation This policy protects personal identifiable information related to travel.
(Travel)
See “General Data Protection Regulation (Travel)” on page 1675.
Human Rights Act 1998 This policy enforces Article 8 of the act for UK citizens.
SWIFT Codes (International banking) This policy detects codes that banks use to transfer money across
international borders.
UK National Health Service Number This policy detects personal identification numbers issued by the NHS.
See “UK National Health Service (NHS) Number policy template” on page 1728.
Austria Value Added German MwSt, Umsatzsteuernummer, VAT, sales tax number, VAT
Tax (VAT) Number MwSt Nummer, number, VAT identification
Ust.-Identifikationsnummer, number, sales tax, UID number
umsatzsteuer, Umsatzsteuer-
Identifikationsnummer
Detecting international language content 870
Best practices for detecting non-English language content
Belgian National French Numéro national, numéro de National number, security number,
Number sécurité, numéro d'assuré, number of insured, national
identifiant national, identification, national
identifiantnational#, identification #, national number
Numéronational# #
Belgium Driver's German, French, Führerschein, Fuhrerschein, Driver's license, driver's license
License Number Frisian Fuehrerschein, number, driving permit, driving
Führerscheinnummer, permit number
Fuhrerscheinnummer,
Fuehrerscheinnummer,
Führerscheinnummer,
Fuhrerscheinnummer,
Fuehrerscheinnummer,
Führerschein- Nr, Fuhrerschein-
Nr, Fuehrerschein- Nr, permis de
conduire,
rijbewijs,Rijbewijsnummer,
Numéro permis conduire
Belgium Tax Dutch, German, Numéro de registre national, National registry number, tax
Identification Number French numéro d'identification fiscale, identification number, tax number
belasting aantal,Steuernummer
Belgium Value Added German, French Numéro T.V.A, VAT number, tax identification
Tax (VAT) Number Umsatzsteuer-Identifikationsnummer, number
Umsatzsteuernummer
Detecting international language content 871
Best practices for detecting non-English language content
British Columbia French MSP nombre, soins de santé no, MSP Number, MSP no, personal
Personal Healthcare soins de santé personnels healthcare number, Healthcare
Number nombre, MSPNombre#, No, PHN
soinsdesanténo#
Bulgaria Value Added Bulgarian номер на таксата, ДДС, ДДС#, Fee number, VAT, VAT number,
Tax (VAT) Number ДДС номер., ДДС номер.#, value added tax
номер на данъка върху
добавената стойност, данък
върху добавената стойност,
ДДС номер
Bulgarian Uniform Civil Bulgarian Униформ граждански номер, Uniform civil number, Uniform ID,
Number - EGN Униформ ID, Униформ Uniform civil ID, Bulgarian uniform
граждански ID, Униформ civil number
граждански не., български
Униформ граждански номер,
УниформгражданскиID#,
Униформгражданскине.#
Canada Passport French numéro passeport, No passeport, Passport number, passport no.,
Numbert passeport# passport#
China Passport Number Chinese 中国护照, 护照, 护照本 Chinese passport, passport,
passport book
Codice Fiscale Italian codice fiscal, dati anagrafici, tax code, personal data, VAT
partita I.V.A., p. iva number, VAT number
Columbian Addresses Spanish Calle, Cll, Carrera, Cra, Cr, Street, St, Career, Avenue,
Avenida, Av, Dg, Diagonal, Diag, Diagonal, Transversal, sidewalk
Tv, Trans, Transversal, vereda
Columbian Cell Phone Spanish numero celular, número de Cellular number, telephone
Number teléfono, teléfono celular no., number, cellular telephone
numero celular# number
Columbian Personal Spanish cedula, cédula, c.c., c.c,C.C., C.C, Identification card, citizenship
Identification Number cc, CC, NIE., NIE, nie., nie, cedula card, identification document
de ciudadania, cédula de
ciudadanía, cc#, CC #, documento
de identificacion, documento de
identificación, Nit.
Columbian Tax Spanish NIT., NIT, nit., nit, Nit. TIN (tax identification number)
Identification Number
Detecting international language content 873
Best practices for detecting non-English language content
Croatia National Croatian Osobna iskaznica, Nacionalni Personal ID, national identification
Identification Number identifikacijski broj, osobni ID, number, personal ID, personal
osobni identifikacijski broj, porez identification number, tax
iskaznica, porezni broj, porezni identification card, tax number, tax
identifikacijski broj, porez kod, identification number, tax code,
šifra poreznog obveznika taxpayer code
Cyprus Tax Turkish, Greek αριθμός φορολογικού μητρώου, Tax identification number, tax
Identification Number Vergi Kimlik Numarası, vergi number, TIN number, Cyprus TIN
numarası, Kıbrıs TIN numarası number
Cyprus Value Added Turkish, Greek KDV, kdv#, KDV numarası, Katma VAT, VAT number, value added
Tax (VAT) Number değer Vergisi, Φόρος tax,
Προστιθέμενης Αξίας
Czech Republic Driver's Czech řidičský průkaz, řidičský prúkaz, Driving license, driver's license
Licence Number číslo řidičského průkazu, řidičské number, driving license number,
číslo řidičů, ovladače lic., Číslo driver's lic., driver license number,
licence řidiče, Řidičský průkaz, driver's permit
povolení řidiče, řidiči povolení,
povolení k jízdě, číslo licence
Czech Republic Czech Česká Osobní identifikační číslo, Czech Personal Identification
Personal Identification Osobní identifikační číslo., Number, personal identification
Number identifikační číslo, čeština number, Czech identification
identifikační číslo number
Czech Republic Tax Czech osobní kód, Národní identifikační Personal code, national
Identification Number číslo, osobní identifikační číslo, identification number, personal
cínové číslo, daňové identifikačné identification number, TIN number,
číslo, daňový poplatník id tax identification number, taxpayer
ID
Czech Republic Value Czech číslo DPH, Daň z přidané VAT number, value added tax,
Added Tax (VAT) hodnoty, Dan z pridané hodnoty, VAT
Number Daň přidané hodnoty, Dan
pridané hodnoty, DPH, DIC, DIČ
Detecting international language content 874
Best practices for detecting non-English language content
Denmark Value Added Danish moms, momsnummer, moms VAT number, vat, value added tax
Tax (VAT) Number identifikationsnummer, number, vat identification number
merværdiafgift
Estonia Driver's Estonian juhiluba, JUHILUBA, juhiluba Driving license, driving license
Licence Number number, juhiloa number, number, driver's license number,
Juhiluba, juhi litsentsi number license number
Estonia Passport Estonian Pass, pass, passi number, pass Passport, passport number,
Number nr, pass#, Pass nr, Eesti passi Estonian passport number
number
Estonia Personal Estonian isikukood, isikukood#, IK, IK#, Personal identification code, tax
Identification Code maksu ID, maksukohustuslase ID, taxpayer identification number,
identifitseerimisnumber, tax identification number, tax
maksukood, maksukood#, code, taxpayer code
maksuID#, maksumaksja kood,
maksumaksja
identifitseerimisnumber
European Health Croatian, Danish, numero conto medico, tessera Medical account number, health
Insurance Card Number Estonian, Finnish, sanitaria assicurazione numero, insurance card number, insurance
French, German, carta assicurazione numero, card number, health insurance
Irish, Italian, Krankenversicherungsnummer, number, medical account number,
Luxembourgish, assicurazione sanitaria numero, health card number, health card,
Polish, Slovenian, medisch rekeningnummer, insurance number, EHIC number,
Spanish ziekteverzekeringskaartnummer,
verzekerings kaart nummer,
gezondheidskaart nummer,
gezondheidskaart, medizinische
Kontonummer,
Krankenversicherungskarte
Nummer, Versicherungsnummer,
Gesundheitskarte Nummer,
Gesundheitskarte, arstliku konto
number, ravikindlustuse kaardi
number, tervisekaart,
tervisekaardi number, Uimhir
ehic, tarjeta salud, broj kartice
zdravstvenog osiguranja, kartice
osiguranja broj, zdravstvenu
karticu, zdravstvene kartice broj,
ehic broj, numero tessera
sanitaria, numero carta di
assicurazione, tessera sanitaria,
numero ehic, Gesondheetskaart,
ehic nummer, numer rachunku
medycznego, numer karty
ubezpieczenia zdrowotne, numer
karty ubezpieczenia, karta
zdrowia, numer karty zdrowia,
numer ehic,
sairausvakuutuskortin numero,
vakuutuskortin numero,
terveyskortti, terveyskortin
numero, medicinsk
kontonummer, ehic numeris,
medizinescher Konto Nummer,
zdravstvena izkaznica
Detecting international language content 876
Best practices for detecting non-English language content
Finland Driver's Finnish, Swedish permis de conduire, ajokortti, Driver's license, driver's license
License Number ajokortin numero, kuljettaja lic., number, driver's lic.
körkort, körkort nummer, förare
lic.
Finland Passport Finnish Suomen passin numero, Finnish passport number, Finnish
Number suomalainen passi, passin passport, passport number,
numero, passin numero.#, passin passport number, passport #
numero#, passin numero, passin
numero., passin numero#, passi#
Finland Value Added Finnish arvonlisäveronumero, ALV, VAT number, VAT, VAT
Tax (VAT) Number arvonlisäverotunniste, ALV nro, identification number
ALV numero, alv
France Health French carte vitale, carte d'assuré social Health card, social insurance card
Insurance Number
Detecting international language content 877
Best practices for detecting non-English language content
France Value Added French Numéro d'identification taxe sur Value added tax identification
Tax (VAT) Number valeur ajoutée, Numéro taxe number, value added tax number,
valeur ajoutée, taxe valeur value added tax, VAT number,
ajoutée, Taxe sur la valeur French VAT number, SIREN
ajoutée, Numéro de TVA identification number
intracommunautaire, n° TVA,
numéro de TVA, Numéro de TVA
en France, français numéro de
TVA, Numéro d'identification
SIREN
French INSEE Code French INSEE, numéro de sécu, code INSEE, social security number,
sécu social security code
French Social Security French sécurité sociale non., sécurité Social secuty number, social
Number sociale numéro, code sécurité security code, insurance number
sociale, numéro d'assurance,
sécuritésocialenon.#,
sécuritésocialeNuméro#
Germany Value Added German Mehrwertsteuer, MwSt, Value added tax, value added tax
Tax (VAT) Number Mehrwertsteuer identification number, value added
Identifikationsnummer, tax number
Mehrwertsteuer nummer
Greece Passport Greek λλάδα pasport αριθμός, Ελλάδα Greece passport number, Greece
Number pasport όχι., Ελλάδα Αριθμός passport no., passport, Greece
Διαβατηρίου, διαβατήριο, passport, passport book
Διαβατήριο, ΕΛΛΑΔΑ
ΔΙΑΒΑΤΗΡΙΟ, Ελλάδα
Διαβατήριο, ελλάδα διαβατήριο,
Διαβατήριο Βιβλίο, βιβλίο
διαβατηρίου
Greece Social Security Greek Αριθμού Μητρώου Κοινωνικής Social security number
Number (AMKA) Ασφάλισης
Greece Value Added Greek FPA, fpa, Foros Prostithemenis VAT, value added tax, tax
Tax (VAT) Number Axias, arithmós dexamenís, Fóros identification number
Prostithémenis Axías, μέγας
κάδος, ΦΠΑ, Φ Π Α, Φόρος
Προστιθέμενης Αξίας, ΦΟΡΟΣ
ΠΡΟΣΤΙΘΕΜΕΝΗΣ ΑΞΙΑΣ, φόρος
προστιθέμενης αξίας, Arithmos
Forologikou Mitroou, Α.Φ.Μ, ΑΦΜ
Greek Tax Identification Greek Αριθμός Φορολογικού Μητρώου, Tax identification number, TIN, tax
Number AΦΜ, Φορολογικού Μητρώου registry number
Νο., τον αριθμό φορολογικού
μητρώου
Hungarian Tax Hungarian Magyar adóazonosító jel no, Hungarian tax identification
Identification Number adóazonosító szám, magyar tumber, tax identification number,
adószám, Magyar adóhatóság Hungarian tax number, Hungarian
no., azonosító szám, tax authority number, tax number,
adóazonosító no., adóhatóság no tax authority number
Hungarian VAT Number Hungarian Közösségi adószám, Általános Value added tax identification
forgalmi adó szám, number, sales tax number, value
hozzáadottérték adó, magyar added tax, Hungarian value added
Közösségi adószám tax number
Iceland National Icelandic kennitala, persónuleg kennitala, Social security number, personal
Identification Number galdur númer, skattanúmer, identification number, magic
skattgreiðenda kóða, kennitala number, tax code, taxpayer code,
skattgreiðenda taxpayer ID number
Indonesian Identity Indonesian, Kartu Tanda Penduduk nomor, Identity card number, card
Card Number Portuguese número do cartão, Kartu identitas number, Indonesian identity card
Indonesia no, kartu no., Kartu number, card no., Indonesian
identitas Indonesia nomor, Nomor identity card number, ID number
Induk Kependudukan,
númerodocartão,kartuno.,
KartuidentitasIndonesiano
International Bank French Code IBAN, numéro IBAN IBAN Code, IBAN number
Account Number (IBAN)
Central
International Bank French Code IBAN, numéro IBAN IBAN Code, IBAN number
Account Number (IBAN)
East
International Bank French Code IBAN, numéro IBAN IBAN Code, IBAN number
Account Number (IBAN)
West
Ireland Passport Irish irelande passeport, Éire pas, no Ireland passport, passport
Number de passeport, pas uimh, uimhir number, passport
pas, numéro de passeport
Ireland Value Added Irish cáin bhreisluacha, CBL, CBL aon, Ireland VAT number, VAT
Tax (VAT) Number Uimhir CBL, Uimhir CBL number, VAT no, VAT#, value
hÉireann, bhreisluacha uimhir added tax number, value added
chánach tax, irish VAT
Irish Personal Public Gaelic Gaeilge Uimhir Phearsanta Irish personal public service
Service Number Seirbhíse Poiblí, PPS Uimh., number, PPS no., personal public
uimhir phearsanta seirbhíse service number, service no., PPS
poiblí, seirbhíse Uimh, PPS Uimh, no., PPS service one
PPS seirbhís aon
Detecting international language content 881
Best practices for detecting non-English language content
Israel Personal Hebrew, Arabic זהות,מספר זיהוי ישראלי,מספר זיהוי Israeli identity number, identity
Identification Number هوية,هويةاسرائيلية عدد,ישראלית number, unique identity number,
عدد هوية فريدة من نوعها,رقم الهوية, إسرائيليةpersonal ID, unique personal ID,
unique ID
Italy Driver's License Italian patente guida numero, patente di Driver's license number, driver's
Number guida numero, patente di guida, license
patente guida
Italy Health Insurance Italian TESSERA SANITARIA, tessera Health insurance card, Italian
Number sanitaria, tessera sanitaria health insurance card
italiana
Italy Value Added Tax Italian IVA, numero partita IVA, IVA#, VAT, VAT number, VAT#, VAT
(VAT) Number numero IVA number
Japan Driver's License Japanese 公安委員会, 番号, 免許, 交付, 運転 Public Security Committee,
Number 免許, 運転免許証, ドライバライセ driver's license, driving license,
ンス, ドライバーズライセンス, ラ driver license, driver's license
イセンス, 運転免許証番号 number, driving license number,
driver license number, license
Korea Passport Number Korean 한국어 여권, 여권, 여권 번호, 대한 Korean passport, passport,
민국 passport number, Republic of
Korea
Latvia Driver's Licence Latvian licences numurs, vadītāja License number, driver's license,
Number apliecība, autovadītāja apliecība, driver's license number, driver's
vadītāja apliecības numurs, lic.
Vadītāja licences numurs, vadītāji
lic., vadītāja atļauja
Latvia Passport Latvian LATVIJA, LETTONIE, Pases Nr., Latvia, passport no., passport
Number Pases Nr, Pase, pase, pases number, passport book, passport
numurs, Pases Nr, pases #, passport card
grāmata, pase#, pases karte
Latvia Personal Latvian Personas kods, personas kods, Latvia personal code, personal
Identification Number latvijas personas kods, Valsts code, national identification
identifikācijas numurs, valsts number, identification number,
identifikācijas numurs, national ID, latvia TIN, TIN, tax
identifikācijas numurs, identification number, tax ID, TIN
nacionālais id, latvija alva, alva, number, tax number
nodokļu identifikācijas numurs,
nodokļu id, alvas nē, nodokļa
numurs
Latvia Value Added Tax Latvian PVN Nr, PVN maksātāja numurs, VAT no., VAT payer number, VAT
(VAT) Number PVN numurs, PVN#, pievienotās number, VAT#, value added tax,
vērtības nodoklis, pievienotās value added tax number
vērtības nodokļa numurs
Liechtenstein Passport German Reisepass, Pass Nr, Pass Nr., Passport, passport no.
Number Reisepass#, Pass Nr#
Detecting international language content 883
Best practices for detecting non-English language content
Lithuania Personal Lithuanian Nacionalinis ID, Nacionalinis National ID, national identification
Identification Number identifikavimo numeris, asmens number, personal ID
kodas
Lithuania Tax Lithuanian mokesčių identifikavimo Nr., tax identification number, tax ID,
Identification Number mokesčių identifikavimo numeris, tax ID number, tax ID number, tax
mokesčių ID, mokesčių id nr, ID #, tax number, tax no., fee #
mokesčių id nr., mokesčių ID#,
mokesčių numeris, mokestis Nr,
mokestis #, Mokesčių
identifikavimo numeris
Lithuania Value Added Lithuanian pridėtinės vertės mokesčio VAT number, VAT, VAT #, Value
Tax (VAT) Number numeris, PVM, PVM#, pridėtinės added tax, VAT registration
vertės mokestis, PVM numeris, number
PVM registracijos numeris
Luxembourg National German, French Eindeutige ID-Nummer, Unique ID number, unique ID,
Register of Individuals Eindeutige ID, ID personnelle, personal ID, personal identification
Number Numéro d'identification number
personnel, IDpersonnelle#,
Persönliche
Identifikationsnummer,
EindeutigeID#
Luxembourg Tax French, German Zinn, Zinn Nummer, Luxembourg TIN, TIN number, Luxembourg tax
Identification Number Tax Identifikatiounsnummer, identification number, tax number,
Steier Nummer, Steier ID, tax ID, social security ID,
Sozialversicherungsausweis, Luxembourg tax identification
Zinnzahl, Zinn nein, Zinn#, number, Social Security, Social
luxemburgische Security Card, tax identification
steueridentifikationsnummer, number
Steuernummer,Steuer ID, sécurité
sociale, carte de sécurité sociale,
étain,numéro d'étain, étain non,
étain#, Numéro d'identification
fiscal luxembourgeois, numéro
d'identification fiscale
Detecting international language content 884
Best practices for detecting non-English language content
Luxembourg Value German, TVA kee, TVA#, TVA Aschreiwung Luxembourg VAT number, VAT
Added Tax (VAT) Luxembourgish kee, T.V.A, stammnummer, number, VAT, value added tax
Number bleiwen, geheescht, gitt id, number, VAT ID, VAT registration
mehrwertsteuer, vat number, value added tax
registrierungsnummer,
umsatzsteuer-id, wat,
umsatzsteuernummer,
umsatzsteuer-identifikationsnummer,
id de la batterie, lëtzebuerg vat
nee, registréierung nummer,
numéro de TVA, numéro de
enregistrement vat
Malaysian MyKad Malay nombor kad pengenalan, kad Identification card number,
Number (MyKad) pengenalan no, kad pengenalan identification card no., Malaysian
Malaysia, bilangan identiti unik, identification card, unique identity
nombor peribadi, number, personal number
nomborperibadi#,
kadpengenalanno#
Malta Tax Identification Maltese kodiċi tat-taxxa, numru tat-taxxa, Tax code, tax number, tax
Number numru identifikazzjoni tat-taxxa, identification number, taxid#
taxxaid#, numru identifikazzjoni taxpayer identification number,
kontribwent, kodiċi kontribwent, taxpayer code, tin, tin no
landa, landa nru
Detecting international language content 885
Best practices for detecting non-English language content
Malta Value Added Tax Maltese Numru tal-VAT, numru tal-VAT, VAT number, VAT, value added
(VAT) Number bettija,valur miżjud taxxa tax number, vat identification
in-numru, bettija identifikazzjoni number
in-numru
Mexican Personal Spanish Clave de Registro de Identidad Personal identity registration key,
Registration and Personal, Código de Mexican personal identification
Identification Number Identificación Personal mexicana, code, Mexican personal
número de identificación identification number
personal mexicana
Mexican Unique Spanish Única de registro de Población, Unique population registry, unique
Population Registry clave única, clave única de key, unique identity key, unique
Code identidad, clave personal personal identity, personal identity
Identidad, personal Identidad key
Clave, ClaveÚnica#,
clavepersonalIdentidad#
Mexico CLABE Number Spanish Clave Bancaria Estandarizada, Standardized banking code,
Estandarizado Banco número de standardized bank code number,
clave, número de clave, clave code number
número, clave#
Netherlands Bank Dutch, bancu aklarashon number, Bank account number, account
Account Number Papiamento aklarashon number, number
bankrekeningnummer,
rekeningnummer
Netherlands Driver's Dutch RIJMEWIJS, permis de conduire, Driver's license, driving permit,
License Number rijbewijs, Rijbewijsnummer, driver's license number
RIJBEWIJSNUMMER
Netherlands Passport Dutch Nederlanden paspoort nummer, Dutch passport number, passport,
Number Paspoort, paspoort, Nederlanden passport number
paspoortnummer,
paspoortnummer
Detecting international language content 886
Best practices for detecting non-English language content
Netherlands Value Dutch, Frisian wearde tafoege tax getal, BTW Value added tax number, VAT
Added Tax (VAT) nûmer, BTW-nummer number
Number
New Zealand Passport Maori uruwhenua, tau uruwhenua, Passport, passport no.
Number uruwhenua no, uruwhenua no.
Norway National Norwegian Nasjonalt ID, personlig ID, National ID, personal ID, national
Identification Number Nasjonalt ID#, personlig ID#, skatt ID #, personal ID #, tax ID, tax
id, skattenummer, skattekode, code, taxpayer ID, taxpayer
skattebetalers id, skattebetalers identification number
identifikasjonsnummer
Norway Value Added Norwegian mva, MVA, momsnummer, VAT, VAT number, VAT
Tax Number Momsnummer, registration number
momsregistreringsnummer
Norwegian Birth Norwegian fødsel nummer, Fødsel nr, fødsel Birth number
Number nei, fødselnei#, fødselnummer#
Poland Driver's Licence Polish Kierowcy Lic., prawo jazdy, Drivers license number, driving
Number numer licencyjny, zezwolenie na license, license number
prowadzenie, PRAWO JAZDY
Poland European Polish Numer EHIC, Karta Ubezpieczenia EHIC number, Health Insurance
Health Insurance Zdrowotnego, Europejska Karta Card, European Health Insurance
Number Ubezpieczenia Zdrowotnego, Card, health insurance number,
numer ubezpieczenia medical account number
zdrowotnego, numer rachunku
medycznego
Poland Passport French, Polish paszport#, numer paszportu, Nr Passport #, passport number,
Number paszportu, paszport, książka passport number, passport,
paszportowa passport book
Poland Value Added Polish Numer Identyfikacji Podatkowej, Tax identification number, tax ID
Tax (VAT) Number NIP, nip, Liczba VAT, podatek od number, VAT number, value
wartosci dodanej, faktura VAT, added tax, VAT invoice, VAT
faktura VAT# invoice #
Polish REGON Number Polish numer statystyczny, REGON, Statistical number, REGON
numeru REGON, number
numerstatystyczny#,
numeruREGON#
Polish Social Security Polish PESEL Liczba, społeczny PESEL number, social security
Number (PESEL) bezpieczeństwo liczba, społeczny number, social security ID, social
bezpieczeństwo ID, społeczny security code
bezpieczeństwo kod,
PESELliczba#,
społecznybezpieczeństwoliczba#
Polish Tax Polish Numer Identyfikacji Podatkowej, Tax identification number, Polish
Identification Number Polski numer identyfikacji tax identification number
podatkowej,
NumerIdentyfikacjiPodatkowej#
Portugal Driver's Portuguese carteira de motorista, carteira driver's license, license number,
License Number motorista, carteira de habilitação, driving license, driving license
carteira habilitação, número de Portugal
licença, número licença,
permissão de condução,
permissão condução, Licença
condução Portugal, carta de
condução
Portugal National Portuguese bilhete de identidade, número de identity card, civil identification
Identification Number identificação civil, número de number, citizen's card number,
cartão de cidadão, documento de identification document, citizen's
identificação, cartão de cidadão, card, bi number of Portugal,
número bi de portugal, número document number
do documento
Portugal Value Added Portuguese imposto sobre valor Value added tax, VAT, VAT
Tax (VAT) Number acrescentado, VAT nº, número number, VAT code
iva, vat não, código iva
Detecting international language content 889
Best practices for detecting non-English language content
Romania Driver's Romanian permis de conducere, PERMIS DE Driving license, driving license
Licence Number CONDUCERE, Permis de number
conducere, numărul permisului
de conducere, Numărul
permisului de conducere
Romania National Romanian numărul de identificare fiscală, fiscal identification number, tax
Identification Number identificarea fiscală nr #, codul identification number, fiscal code
fiscal nr. number,
Romania Value Added Romanian CIF, cif, CUI, cui, TVA, tva, TVA#, VAT, VAT #, value added tax,
Tax (VAT) Number tva#, taxa pe valoare adaugata, fiscal code, fiscal identification
cod fiscal, cod fiscal de code, unique registration code,
identificare, cod fiscal unique identification code, code
identificare, Cod Unic de unique registration
Înregistrare, cod unic de
identificare, cod unic identificare,
cod unic de înregistrare, cod unic
înregistrare
Romanian Numerical Romanian Cod Numeric Personal, cod Personal numeric code, personal
Personal Code identificare personal, cod unic identification code, unique
identificare, număr personal unic, identification code, identity
număr identitate, număr number, personal identification
identificare personal, number
număridentitate#,
CodNumericPersonal#,
numărpersonalunic#
Russian Passport Russian паспорт нет, паспорт, номер Passport no., passport, passport
Identification Number паспорта, паспорт ID, number, passport ID, Russian
Российской паспорт, Русский passport, Russian passport
номер паспорта, паспорт#, number
паспортID#, номерпаспорта#
Serbia Unique Master Serbian јединствен мајстор грађанин Unique master citizen number,
Citizen Number Број, Јединствен матични број, unique identification number,
јединствен број ид, Национални unique id number, National
идентификациони број identification number
Serbia Value Added Tax Serbian poreski identifikacioni broj, Tax identification number VAT
(VAT) Number PORESKI IDENTIFIKACIONI number, value added tax, VAT,
BROJ, Poreski br., ПДВ број, identification number, tax number
Порез на додату вредност, PDV
broj, Porez na dodatu vrednost,
porez na dodatu vrednost, PDV,
pdv, ПДВ, порески
идентификациони број, PIB, pib,
пиб, poreski broj, порески број
Detecting international language content 893
Best practices for detecting non-English language content
Slovakia Driver's Slovak vodičský preukaz, Vodičský Driving license, license number
Licence Number preukaz, VODIČSKÝ PREUKAZ,
číslo vodičského preukazu,
ovládače lic., povolenie vodiča,
povolenia vodičov, povolenie na
jazdu, povolenie jazdu, číslo
licencie
Slovakia National Hungarian, identifikačné číslo, személyi ID number, identity card number,
Identification Number Slovak igazolvány száma, national identity card number,
személyigazolvány szám, číslo national identification number,
občianského preukazu, identification number, ID card
identifikačná karta č, személyi number, identification card,
igazolvány szám, nemzeti national identity card
személyi igazolvány száma, číslo
národnej identifikačnej karty,
národná identifikačná karta č,
nemzeti személyazonosító
igazolvány, nemzeti azonosító
szám, národné identifikačné číslo,
národná identifikačná značka č,
nemzeti azonosító szám,
azonosító szám, identifikačné
číslo
Slovakia Value Added Slovak číslo DPH, číslo dane z pridanej VAT number, value added tax
Tax (VAT) Number hodnoty, identifikačné číslo vat, number, VAT, value added tax,
dph, DPH, daň z pridanej VAT identification number
hodnoty, daň pridanej hodnoty,
číslo dane pridanej hodnoty,
identifikačné číslo DPH
Slovenia Passport French, Slovenian številka potnega lista, potni list, Passport number, passport,
Number knjiga potnega lista, potni list #, passport book, passport #
passeport, Passeport
Slovenia Unique Master Slovenian EMŠO, emšo, edinstvena številka Unique national number, unique
Citizen Number državljana, enotna identifikacijska identification number, uniform
številka, Enotna maticna številka registration number, unique
obcana, enotna maticna številka registration number, citizen's
obcana, številka državljana, number, unique identification
edinstvena identifikacijska number
številka
Slovenia Value Added Slovenian številka davka na dodano Value added tax number, VAT no,
Tax (VAT) Number vrednost, DDV št, slovenia vat št Slovenia vat no
South African Personal Afrikaans nasionale identifikasie nommer, National identification number,
Identification Number nasionale identiteitsnommer, national identity number,
versekering aantal, persoonlike insurance number, personal
identiteitsnommer, unieke identity number, unique identity
identiteitsnommer, number, identity number
identiteitsnommer,
identiteitsnommer#,
versekeringaantal#,
nasionaleidentiteitsnommer#
Spain Driver's License Spanish permiso de conducción, permiso Driver's license, driver's license
Number conducción, Número licencia number, driving license, driving
conducir, Número de carnet de permit, driving permit number
conducir, Número carnet
conducir, licencia conducir,
Número de permiso de conducir,
Número de permiso conducir,
Número permiso conducir,
permiso conducir, licencia de
manejo, el carnet de conducir,
carnet conducir
Detecting international language content 895
Best practices for detecting non-English language content
Spain Value Added Tax Spanish Número IVA españa, Número de Spain VAT number, Spanish VAT
(VAT) Number IVA español, español Número number, VAT Number, VAT, value
IVA, Número de valor agregado, added tax number, value added
IVA, Número IVA, Número tax
impuesto sobre valor añadido,
Impuesto valor agregado,
Impuesto sobre valor añadido,
valor añadido el impuesto, valor
añadido el impuesto numero
Spanish Customer Spanish número cuenta cliente, código Customer account number,
Account Number cuenta, cuenta cliente ID, número account code, customer account
cuenta bancaria cliente, código ID, customer bank account
cuenta bancaria number, bank account code
Spanish DNI ID Spanish NIE número, Documento Nacional NIE number, national identity
de Identidad, Identidad único, document, unique identity,
Número nacional identidad, DNI national identity number, DNI
Número number
Spanish Passport Spanish libreta pasaporte, número passport book, passport number,
Number pasaporte, Número Pasaporte, Spanish passport, passport
España pasaporte, pasaporte
Spanish Social Security Spanish Número de la Seguridad Social, Social security number
Number número de la seguridad social
Spanish Tax ID (CIF) Spanish número de contribuyente, número taxpayer number, corporate tax
de impuesto corporativo, número number, tax identification number,
de Identificación fiscal, CIF CIF number
número, CIFnúmero#
Sri Lanka National Sinhala See user interface ID, national identity number,
Identity Number personal identification number,
National Identity Card number
Sweden Driver's Finnish, Romani, ajokortti, permis de Driver's license, driver's license
License Number Swedish, Yiddish conducere,ajokortin numero, number, driving license number
kuljettajat lic., drivere lic., körkort,
numărul permisului de
conducere, שאָפער דערלויבעניש
נומער, körkort nummer, förare lic.,
דריווערס דערלויבעניש,
körkortsnummer
Detecting international language content 896
Best practices for detecting non-English language content
Sweden Value Added Swedish moms#, sverige moms, sverige Swedish VAT, Swedish VAT
Tax (VAT) Number momsnummer, sverige moms nr, number, VAT registration number
sweden vat nummer, sweden
momsnummmer,
momsregistreringsnummer
Swedish Passport Swedish Passnummer, pass, sverige pass, Passport number, passport,
Number SVERIGE PASS, sverige Swedish passport, Swedish
Passnummer passport number
Switzerland Health German, Italian medizinische Kontonummer, Medical account number, health
Insurance Card Number Krankenversicherungskarte insurance card number, health
Nummer, numero conto medico, insurance number
tessera sanitaria assicurazione
numero, assicurazione sanitaria
numero
Detecting international language content 897
Best practices for detecting non-English language content
Switzerland Passport French, German, Passeport, passeport, numéro Passport, passport number,
Number Italian passeport, numéro de passport # passport book
passeport,passeport#, No de
Passport, passport Number,
passeport, No de passeport.,
passport #
Numéro de passeport,
PASSEPORT, LIVRE DE Passport, passport number,
PASSEPORT passport no., passport #
Passaporto, Numero di
passaporto, passaporto,
Passaporto n,Passaporto n.,
passaporto#, Passaport, numero
passaporto, numero di
passaporto, numero passaporto,
passaporto n, PASSAPORTO
Reisepass, Reisepass#,
REISEPASS
Switzerland Value French, German, T.V.A, numéro TVA, T.V.A#, VAT, VAT number, VAT #, value
Added Tax (VAT) Italian numéro taxe valeur ajoutée, added tax number, value added
Number T.V.A., taxe sur la valeur ajoutée, tax, VAT registration number,
T.V.A#, numéro enregistrement
VAT, VAT number, VAT #
TVA, Numéro TVA
VAT, VAT registration number,
I.V.A, Partita IVA, I.V.A#, numero
VAT #, VAT number
IVA
MwSt,
Umsatzsteuer-Identifikationsnummer,
MwSt#, Mehrwertsteuer-Nummer,
Mehrwertsteuer, VAT
Registrierungsnummer,
Umsatzsteuer-Identifikationsnummer
Swiss AHV Number French, German, Numéro AVS, numéro d'assuré, AVS number, insurance number,
Italian identifiant national, numéro national identifier, national
d'assurance vieillesse, numéro insurance number, social security
de sécurité soclale, Numéro AVH number, AVH number
Ukraine Identity Card Ukrainian посвідчення особи України Ukraine identity card
United Arab Emirates Arabic فريدة,رقم التعريف الشخصي, الهوية الشخصية رقمPersonal ID Number, PIN, Unique
Personal Number هوية,التأمينرقم,التأمين رقم, من نوعها هوية رقمID Number, Insurance Number,
فريدة# Unique Identity #
■ A certain type of match is likely to occur only in a document of a certain type, such as a
Word document.
The detection engine does not rely on the file name extension to match file format type. The
engine checks the binary signature of supported file formats. For example, if a user changes
a .doc file's extension to .txt and emails the file, the detection engine can still register a match
because it checks the binary signature of the file to detect it as an DOC file.
See “Supported formats for file type identification” on page 964.
Note: File type matching does not detect the content of the file; it only detects the file type
based on its binary signature. To detect content, use a content matching condition.
See “Configuring the Message Attachment or File Type Match condition” on page 904.
See “About custom file type identification” on page 901.
Note: The Symantec Data Loss Prevention Scripting Language only identifies custom file
formats; it does not extract content from custom file types.
Detecting file properties 902
Introducing file property detection
Note: If the Total Attachment File Size and Total Attachment File Count conditions are
ANDed together with a content matching rule, the rules will be applied to all message
components. Components will only match one condition in an incident, even if they violate
more than one of the conditions.
The Total Attachment File Size and Total Attachment File Count rules are available on
both Windows and Mac endpoints. On Windows, they apply to Microsoft Outlook and IBM
(Lotus) Notes events. On Mac, they apply to Outlook for Mac events.
See “Configuring the Message Attachment or File Size Match condition” on page 905.
Message Attachment or File Detect or except specific files and attachments by type.
Type Match
See “About file type matching” on page 900.
See “Configuring the Message Attachment or File Type Match condition” on page 904.
Message Attachment or File Detect or except specific files and attachments by size.
Size Match
See “About file size matching” on page 902.
See “Configuring the Message Attachment or File Size Match condition” on page 905.
Message Attachment or File Detect or except specific files and attachments by name.
Name Match
See “About file name matching” on page 903.
See “Configuring the Message Attachment or File Name Match condition” on page 906.
Action Description
Select the file type or types Select all of the formats you want to match.
to match.
See “Supported formats for file type identification” on page 964.
To select all formats within a certain category (for example, all word-processing formats),
click the section heading.
The system implies an OR operator among all file types you select. For example, if you
select Microsoft Word and Microsoft Excel file type attachments, the system detects all
messages with Word or Excel documents attached, not messages with both attachment
types
Match on attachments only. This condition only matches on the Message Attachments component.
Also match on one or more Select this option to create a compound condition. All conditions must match to trigger
additional conditions. or except an incident.
Action Description
Single File Size Select More Than to specify the minimum file size of the file to match or Less Than to
specify the maximum file size to qualify a match.
Enter a number, and select the unit of measure: bytes, kilobytes (KB), megabytes (MB),
or gigabytes (GB).
Total Attachment File Size Enter a number, and select the unit of measure: bytes, kilobytes (KB), megabytes (MB),
or gigabytes (GB) to qualify a match.
Total Attachment File Enter a number to specify the number of files to qualify a match
Count
Match on the. Select one or both of the following message components on which to base the match:
Action Description
Also match one or more Select this option to create a compound condition. All conditions must match to trigger or
additional conditions. except an incident.
Action Description
Specify the File Name. Specify the file name to match using the DOS pattern matching language to represent
patterns in the file name.
Separate multiple matching patterns with commas or by placing them on separate lines.
Match on attachments. This condition only matches on the Message Attachments component.
Action Description
Also match one or more Select this option to create a compound condition. All conditions must match to trigger or
additional conditions. except an incident.
Operator Description
* Use an asterisk as a wild card to match any number of characters (including none).
To match a Word file name that begins with ENG- followed ENG-????????.doc
by any eight characters:
If you are not sure how many characters are in the name: ENG-*.*
Detecting file properties 908
Configuring file property matching
To match all file names that begin with ENG- and all file Enter as comma separated values:
names that begin with ITA-:
ENG-*.*,ITA-*
ENG-*.*
ITA-*
Action Description
Enter the Script Name. Specify the name of the script. The name must be unique across policies.
Enter the custom file Enter the File Type Matches Signature script for detecting the binary signature of the custom
type script. file type.
See the Symantec Data Loss Prevention Detection Customization Guide for details on
writing custom scripts.
Match only on This condition only matches on the Message Attachments component.
attachments.
See “Detection messages and message components” on page 391.
Also match one or more Select this option to create a compound condition. All conditions must match to trigger or
additional conditions. except an incident.
You can Add any condition available from the list.
For example, if you want to detect CAD files that contain IP diagrams, you could index these
files and apply IDM rules to detect them. Alternatively, you could create a policy that contains
a file type rule that detects on the CAD file format plus a file size rule that specifies a threshold
size. The file property approach is preferred because in this scenario all you really care about
is protecting large CAD files potentially leaving the company. There is no need to gather and
index these files for IDM if you can simply create rules that will detect on the file type and the
size.
Example
Any characters you enter (other than the DOS operators) match exactly.
For example, to match a Word file name that begins with ENG- followed by any eight characters, enter:
ENG-????????.doc
If you are not sure how many characters follow ENG-, enter: ENG-*.*
To match all file names that begin with ENG- and all file names that begin with ITA-, enter: ENG-*.*,ITA-* (comma
separated), or you can separate the file names by line space.
recognition, it may be easier to write a script than an SPI plugin. But, there may be occasions
where using a script is inadequate.
The scripting language does not support loops; you cannot iterate over the file type bytes and
do some processing. The scripting language is designed to detect a known signature at a
relatively known offset. You cannot use the scripting language detect subtypes of the same
document type. For example, , if you wanted to detect password protected PDF files, you could
not use the scripting language. Or, if you wanted to detect only Word documents with track
changes enabled, you would have to write a plugin. On the other hand, you can deploy a script
to the endpoint; currently plugins are server-based only.
For more information, refer to the Symantec Data Loss Prevention Content Extraction
Plugin Developers Guide and the Symantec Data Loss Prevention Detection
Customization Guide on writing custom plugins and scripts, respectively.
Chapter 37
Detecting network incidents
This chapter includes the following topics:
Protocol Description
Email/SMTP Simple Mail Transfer Protocol (SMTP) is a protocol for sending email messages between servers.
FTP The file transfer protocol (FTP) is used on the Internet for transferring files from one computer
to another.
HTTP The hypertext transfer protocol (HTTP) is the underlying protocol that supports the World Wide
Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers
and browsers should take in response to various commands.
HTTP/SSL Hypertext transfer protocol over Secure Sockets Layer (HTTPS) is a protocol for sending data
securely between a client and server.
NNTP Network News Transport Protocol (NNTP), which is used to send, distribute, and retrieve USENET
messages.
Detecting network incidents 913
Configuring the Protocol Monitoring condition for network detection
Protocol Description
TCP:custom_protocol The Transmission Control Protocol (TCP) is used to reliably exchange data between computers
across the Internet. This option is only available if you have defined a custom TCP port.
See “Configuring the Protocol Monitoring condition for network detection” on page 913.
Action Description
Add or modify the Protocol Add a new Protocol or Endpoint Monitoring condition to a policy rule or exception, or
or Endpoint Monitoring modify an existing rule or exception condition.
condition.
See “Configuring policies” on page 413.
Select one or more To detect Network incidents, select one or more Protocols.
protocols to match.
■ Email/SMTP
■ FTP
■ HTTP
■ HTTPS/SSL
■ NNTP
Configure endpoint See “Configuring the Endpoint Monitoring condition” on page 918.
monitoring.
Detecting network incidents 914
Best practices for using network protocol matching
Action Description
Match on the entire The Protocol Monitoring condition matches on the entire message, not individual message
message. components.
The Envelope option is selected by default. You cannot select individual message
components.
Also match one or more Select this option to create a compound condition. All conditions must match to trigger or
additional conditions. except an incident.
Protocol Description
Email/SMTP Simple Mail Transfer Protocol (SMTP) is a protocol for sending email messages between servers.
FTP The file transfer protocol (FTP) is used on the Internet for transferring files from one computer
to another.
Detecting endpoint events 916
Introducing endpoint event detection
Protocol Description
HTTP The hypertext transfer protocol (HTTP) is the underlying protocol that supports the World Wide
Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers
and browsers should take in response to various commands.
HTTP/SSL Hypertext transfer protocol over Secure Sockets Layer (HTTPS) is a protocol for sending data
securely between a client and server.
Destination Description
CD/DVD The CD/DVD burner on the endpoint computer. This destination can be any type of
third-party CD/DVD burning software.
Removable Storage Device Detect data that is transferred to any eSATA, FireWire, or USB connected storage
device.
Copy to Network Share Detect data that is transferred to any network share or remote file access.
Printer/Fax Detect data that is transferred to a printer or to a fax that is connected to the endpoint
computer. This destination can also be print-to-file documents.
Clipboard The Windows Clipboard used to copy and paste data between Windows applications.
Endpoint Device or Class ID Detect when users move endpoint data to a specific device.
Endpoint Location Detect when the endpoint is on or off the corporate network.
Note: This topic does not address network protocol monitoring configuration.
See “Configuring the Protocol Monitoring condition for network detection” on page 913.
Action Description
Add or modify the Add a new Protocol or Endpoint Monitoring condition to a policy rule or
Endpoint Monitoring exception, or modify an existing rule or exception condition.
condition.
See “Configuring policy rules” on page 417.
Action Description
Select one or more To detect Endpoint incidents, select one or more Endpoint Protocols:
endpoint protocols to
■ Email/SMTP
match.
■ HTTP
■ HTTPS/SSL
■ FTP
Select one or more To detect when users move data on the endpoint, select one or more Endpoint
endpoint destinations. Destinations:
■ Local Drive
■ CD/DVD
■ Removable Storage Device
■ Copy to Network Share
■ Printer/Fax
■ Clipboard
Monitor endpoint To detect when endpoint applications access files, select the Application File
applications. Access option.
Match on the entire The DLP Agent evaluates the entire message, not individual message
message. components.
The Envelope option is selected by default. You cannot select the other
message components.
Also match one or more Select this option to create a compound condition. All conditions must match
additional conditions. to trigger or except an incident.
Action Description
Add or modify the Add a new Endpoint Location detection condition to a policy rule or exception,
Endpoint Location or modify an existing policy rule or exception.
condition.
See “Configuring policy rules” on page 417.
Select the location to Select one of the following endpoint locations to monitor:
monitor.
■ Off the corporate network
Select this option to detect or except events when the endpoint computer is
off of the corporate network.
■ On the corporate network
Select this option to detect or except events when the endpoint computer is
on the corporate network.
This option is the default selection.
Match on the entire The DLP Agent evaluates the entire message, not individual message
message. components.
Also match one or Select this option to create a compound condition. All conditions must match to
more additional trigger or except an incident.
conditions.
You can Add any condition available from the list.
Action Description
Add or modify an Add a new Endpoint Device Class or ID condition to a policy rule or exception,
Endpoint Device or modify an existing one.
condition.
See “Configuring policy rules” on page 417.
Select one or more The condition matches when users move data from an endpoint computer to the
devices. selected device(s).
Match on the entire The DLP Agent matches on the entire message, not individual message
message. components.
The Envelope option is selected by default. You cannot select other components.
Also match one or Select this option to create a compound condition. All conditions must match to
more additional trigger or except an incident.
conditions.
You can Add any condition available from the drop-down menu.
Note: You can use the DeviceID utility for Windows and Mac endpoints to generate removable
storage device information. See “About the Device ID utilities” on page 2496.
CD Drive IDE\\DISKST9160412ASG__________________0002SDM1\\4&F4ACADA&0&0\.0\.0
SD Card SDC&346128262
■ You might often combine group and detection methods on the endpoint. Keep in mind that
the policy language ANDs detection and group methods, whereas methods of the same
type, two rules for example, are ORed.
See “Policy detection execution” on page 394.
Chapter 39
Detecting described
identities
This chapter includes the following topics:
fr, cu All SMTP email that is addressed Any email that is addressed to
to a .fr (France) or .cu (Cuba) French company with the .com
addresses. extension instead of .fr.
company.com All SMTP email that is addressed Any SMTP email that is not
to the specific domain URL, such addressed to the specific domain
as symantec.com. URL.
3rdlevel.company.com All SMTP email that is addressed Any SMTP email that is not
to the specific 3rd level domain, addressed to the specific 3rd level
such as dlp.symantec.com. domain.
[email protected] All SMTP email that is addressed Any email not specifically
to [email protected]. addressed to [email protected],
such as:
All SMTP email that is addressed
to [email protected] (the ■ [email protected]
pattern is not case-sensitive). ■ [email protected]
■ [email protected]
*/dlp/qa/test/local/Sym*
Sender/User Matches Pattern Matches on an email address, domain address, IP address, Windows user
name, or IM screen name/handle.
Recipient Matches Pattern Matches on an email address, domain address, IP address, or newsgroup.
Action Description
john.smith, jsmith
IM Screen Name
Enter one or more IM screen names that are used in instant messaging systems, for
example:
john_smith, jsmith
IP Address
Enter one or more IP addresses that map to the domain you want to match, for example:
Select a Reusable Sender You can select a Sender Pattern that you have saved for reuse in your policies. Select
Pattern Reusable Sender Pattern, then choose the pattern you want from the dropdown list.
Detecting described identities 929
Configuring described identity matching policy conditions
Action Description
Match on the entire message. This condition matches on the entire message. The Envelope option is selected by
default. You cannot select any other message component.
Also match additional Select this option to create a compound condition. All conditions must match to trigger
conditions. an incident.
2 In the General section on the Configure Reusable Sender Pattern page, enter a Name
and Description for your Reusable Sender Pattern.
3 In the Sender Pattern section, enter the User Patterns and IP Addresses as described
in the "Configuring the Sender/User Matches Pattern condition table".
See Table 39-3 on page 928.
4 Click Save.
Detecting described identities 930
Configuring described identity matching policy conditions
5 To edit a saved Reusable Sender Pattern, on the Manage > Policies > Sender/Recipient
Patterns page, click the dropdown arrow next to the name of the pattern you want to edit,
then select Edit.
6 To delete a saved Reusable Sender Pattern, on the Manage > Policies >
Sender/Recipient Patterns page, click the dropdown arrow next to the name of the
pattern you want to delete, then select Delete.
Note: You cannot delete a Reusable Sender Pattern that is currently in use in any policy.
Action Description
Enter one or more IP address patterns that resolve to the domain that you want to
match. You can use the asterisk (*) wildcard character for one or more fields. You can
enter both IPv4 and IPv6 addresses separated by commas.
URL Domain
Enter one or more URL Domains to match Web-based traffic, including Web-based
email and postings to a Web site. For example, if you want to prohibit the receipt of
certain types of data using Hotmail, enter hotmail.com.
Detecting described identities 931
Configuring described identity matching policy conditions
Action Description
Select a Reusable Recipient You can select a Recipient Pattern that you have saved for reuse in your policies.
Pattern Select Reusable Recipient Pattern, then choose the pattern you want from the
dropdown list.
Configure match counting. Select one of the following options to specify the number of email recipients that must
match:
■ All recipients must match (Email Only) does not count a match unless ALL email
message recipients match the specified pattern.
■ At least _ recipients must match (Email Only) lets you specify the minimum
number of email message recipients that must match to be counted.
Select one of the following options to specify how you want to count the matches:
Match on the entire message. This condition matches on the entire message. The Envelope option is selected by
default. You cannot select any other message component.
Also match additional Select this option to create a compound condition. All conditions in a rule or exception
conditions. must match to trigger an incident.
You can Add any available condition from the list.
■ If you are configuring a policy with a Recipient Matches Pattern rule, from the Manage
> Policies > Policy List > Configure Policy - Edit Rule page, click Create Reusable
Recipient Pattern.
■ In the Enforce Server administration console, navigate to Manage > Policies >
Sender/Recipient Patterns, then click Add > Recipient Pattern.
2 In the General section on the Configure Reusable Recipient Pattern page, enter a
Name and Description for your Reusable Recipient Pattern.
3 In the Recipient Pattern section, enter the Email Addresses, IP Addresses, and URL
Domains as described in the "Recipient Matches Pattern condition table".
See Table 39-4 on page 930.
4 Click Save.
5 To edit a saved Reusable Recipient Pattern, on the Manage > Policies >
Sender/Recipient Patterns page, click the dropdown arrow next to the name of the
pattern you want to edit, then select Edit.
6 To delete a saved Reusable Recipient Pattern, on the Manage > Policies >
Sender/Recipient Patterns page, click the dropdown arrow next to the name of the
pattern you want to delete, then select Delete.
Note: You cannot delete a Reusable Recipient Pattern that is currently in use in any policy.
The email address field does not match the sender or recipient of a Web post. For example,
the email address [email protected] does not match if Bob uses a Web browser to send or
receive email. In this case, you must use the domain pattern mail.yahoo.com to match
[email protected].
IP address of all Web traffic from outside your organization appears to go to the Web proxy.
The best practice is to match on domain names instead of IP addresses.
Chapter 40
Detecting synchronized
identities
This chapter includes the following topics:
member. You then define a policy exception that references the CEO User Group. At runtime
the policy will ignore messages sent or received by the CEO.
See “User Groups” on page 376.
Note: DLP Agents installed on Mac endpoints support User Groups that use Active Directory
(AD) group conditions in policies.
Note: If this is the first time you are configuring the User Group, you must select the option
Refresh the group directory index on Save to populate the User Group.
4 After you locate the users you want, use the Add and Remove options to include or
exclude them in the User Group.
5 Click Save.
Action Description
Enter the group The Group Name is the name that you want to use to identify this group.
name.
Use a descriptive name so that you can easily identify it later on.
View which policies Initially, when you create a new User Group, the Used in Policy field displays None.
use the group.
If the User Group already exists and you modify it, the system displays a list of the policies that
implement the User Group, assuming one or more group-based policies is created for this User
Group.
Refresh the group Select (check) the Refresh the group directory index on Save option to synchronize the user
directory index on group profile with the most recent directory server index immediately on Save of the profile. If
Save. you leave this box unselected (unchecked), the profile is synchronized with the directory server
index based on the Directory Connection setting.
If this is the first time you are configuring the User Group profile, you must select the Refresh
the group directory index on Save option to populate the profile with the latest directory server
index replication.
Select the directory Select the directory server you want to use from the Directory Server list.
server.
You must establish a connection to the directory server before you create the User Group profile.
Include email Check the Include Mail Aliases box to index user email aliases along with primary email
aliases. addresses. For example, if a user has the primary email address "[email protected]"
and an email alias "[email protected]," checking this box will index both email
addresses. Be aware that indexing email aliases will increase your index size.
Detecting synchronized identities 938
Configuring synchronized DGM policy conditions
Action Description
Search the directory Enter the search string in the search field and click Search to search the directory for specific
for specific users. users. You can search using literal text or wildcard characters (*).
The search results display the Common Name (CN) and the Distinguished Name (DN) of the
directory server that contains the user. These names give you the specific user identity. Results
are limited to 1000 entries.
Click Clear to clear the results and begin a new search of the directory.
Literal text search criteria options:
Browse the directory You can browse the directory tree for groups and users by clicking on the individual nodes and
for user groups. expanding them until you see the group or node that you want.
The browse results display the name of each node. These names give you the specific user
identity.
The results are limited to 20 entries by default. Click See More to view up to 1000 results.
Add a user group to To add a group or user to the User Group profile, select it from the tree and click Add.
the profile.
After you select and add the node to the Added Groups column, the system displays the
Common Name (CN) and the Distinguished Name (DN).
Save the user group. Click Save to save the User Group profile you have configured.
associate the User Groups with the Sender/User based on a Directory Server Group group
rule or the Recipient matches User Group based on a Directory Server group rule.
See “Introducing synchronized Directory Group Matching (DGM)” on page 935.
Table 40-2 describes the process for implementing synchronized DGM.
1 Create the connection to the Establish the connection from the Enforce Server to a directory server such
directory server. as Microsoft Active Directory.
2 Create the User Group. Create one or more User Groups on the Enforce Server and populate the
User Groups with the exact identities from the users, groups, and business
units that are defined in the directory server
4 Configure one or more group Choose the type of synchronized DGM rule you want to implement and
rules or exceptions. reference the User Group. After the policy and the group are linked, the
policy applies only to those identifies in the referenced User Group.
Note: If the identity being detected is a user, the user must be actively logged on to a DLP
Agent-enabled system for the policy to match.
Detecting synchronized identities 940
Configuring synchronized DGM policy conditions
Parameter Description
Select User Groups to Select one or more User Groups that you want this policy to detect.
include in this policy
If you have not created a User Group, click Create a new User Group.
Match On This condition matches on the entire message. The Envelope option is selected by default.
You cannot select any other message component.
Also Match Select this option to create a compound condition. All conditions in a rule or exception
must match to trigger an incident.
Note: The Recipient based on a Directory Server Group condition requires two-tier detection.
See “About two-tier detection for synchronized DGM” on page 936.
Table 40-4 Configuring the Recipient based on a Directory Server Group condition
1 Select User Groups to Select the User Group(s) that you want this policy to match on.
include in this policy
If you have not created a User Group, click Create a new Endpoint User
Group option.
2 Match On This rule detects the entire message, not individual components. The Envelope
option is selected by default. You cannot select any other message component.
Table 40-4 Configuring the Recipient based on a Directory Server Group condition
(continued)
3 Also Match Select this option to create a compound condition. All conditions in a rule or
exception must match to trigger an incident.
You cannot combine either type of profiled DGM condition with an Endpoint: Block or
Endpoint: Notify response rule in a policy. If you do, the system reports that the policy is
misconfigured.
See “Troubleshooting policies” on page 445.
1 Create the data source file. Create a data source file from the directory server or database you want to
profile. Make sure the data source file contains the appropriate fields.
The following fields are supported for profiled DGM:
■ Email address
■ IP address
■ Window user name (in the format domain\user)
■ IM screen name
See “Creating the exact data source file for profiled DGM for EDM”
on page 537.
2 Prepare the data source See “Configuring Exact Data profiles for EDM” on page 534.
file for indexing.
See “Preparing the exact data source file for indexing for EDM” on page 537.
3 Create the Exact Data This includes uploading the data source file to the Enforce Server, mapping
Profile. the data fields, and indexing the data source.
See “Uploading exact data source files for EDM to the Enforce Server”
on page 539.
See “Creating and modifying Exact Data Profiles for EDM” on page 541.
See “Mapping Exact Data Profile fields for EDM” on page 545.
See “Scheduling Exact Data Profile indexing for EDM” on page 548.
Detecting profiled identities 944
Configuring profiled DGM policy conditions
4 Define the profiled DGM See “Configuring the Sender/User based on a Profiled Directory condition”
condition. on page 944.
5 Test the profiled DGM Use a test policy group and verify that the matches the policy generates are
policy. accurate.
See “Test and tune policies to improve match accuracy” on page 453.
Sender/User based on a Directory If this condition is implemented as a policy rule, a match occurs only if the
from <EDM Profile> sender or user of the data is contained in the index profile. If this condition is
implemented as a policy exception, the data will be excepted from matching
if it is sent by a sender/user listed in the index profile
Recipient based on a Directory from If this condition is implemented as a policy rule, a match occurs only if the
<EDM Profile> recipient of the data is contained in the index profile. If this condition is
implemented as a policy exception, the data will be excepted from matching
if it is received by a recipient listed in the index profile.
After you select the Exact Data Profile, when you configure the rule, the directory you selected
and the sender identifier(s) appear at the top of the page.
Table 41-3 describes the parameters for configuring the Sender/User based on a Directory
an EDM Profile condition.
Table 41-3 Configuring the Sender/User based on a Directory from an EDM Profile condition
Parameter Description
Where Select this option to have the system match on the specified field values. Specify the values by
selecting a field from the drop-down list and typing the values for that field in the adjacent text box.
If you enter more than one value, separate the values with commas.
For example, for an Employees directory group profile that includes a Department field, you would
select Where, select Department from the drop-down list, and enter Marketing,Sales in the text
box. If the condition is implemented as a rule, in this example a match occurs only if the sender or
user works in Marketing or Sales (as long as the other input content meets all other detection criteria).
If the condition is implemented as an exception, in this example the system ignores from matching
messages from a sender or user who works in Marketing or Sales.
Is Any Of Enter or modify the information you want to match. For example, if you want to match any sender
in the Sales department, select Department from the drop-down list, and then enter Sales in this
field (assuming that your data includes a Department column). Use a comma-separated list if you
want to specify more than one value.
Table 41-4 Configuring the Recipient based on a Directory from an EDM profile condition
Parameter Description
Where Select this option to have the system match on the specified field values. Specify the values by
selecting a field from the drop-down list and typing the values for that field in the adjacent text box.
If you enter more than one value, separate the values with commas.
For example, for an Employees directory group profile that includes a Department field, you would
select Where, select Department from the drop-down list, and enter Marketing, Sales in the text
box. For a detection rule, this example causes the system to capture an incident only if at least one
recipient works in Marketing or Sales (as long as the input content meets all other detection criteria).
For an exception, this example prevents the system from capturing an incident if at least one recipient
works in Marketing or Sales.
Is Any Of Enter or modify the information you want to match. For example, if you want to match any recipient
in the Sales department, select Department from the drop-down list, and then enter Sales in this
field (assuming that your data includes a Department column). Use a comma-separated list if you
want to specify more than one value.
Include an email address field in the Exact Data Profile for profiled
DGM
You must include the appropriate fields in the Exact Data Profile to implement profiled DGM.
See “Creating the exact data source file for profiled DGM for EDM” on page 537.
If you include the email address field in the Exact Data Profile for profiled DGM and map it to
the email data validator, email address will appear in the Directory EDM drop-down list (at
the remediation page).
Detecting profiled identities 947
Best practices for using profiled DGM
Use profiled DGM for Network Prevent for Web identity detection
If you want to implement DGM for Network Prevent for Web, use one of the profiled DGM
conditions to implement identity matching. For example, you may want to use identity matching
to block all web traffic for a specific users. For Network Prevent for Web, you cannot use
synchronized DGM conditions for this use case.
See “Creating the exact data source file for profiled DGM for EDM” on page 537.
See “Configuring the Sender/User based on a Profiled Directory condition” on page 944.
Chapter 42
Using contextual attributes
for Application Detection
This chapter includes the following topics:
General attributes
General attributes apply to all data types and applications.
Using contextual attributes for Application Detection 950
Configuring contextual attribute conditions
Securlets:
■ Amazon S3
■ Amazon Web Services
■ Box
■ Cisco Spark
■ Dropbox
■ Facebook Workplace
■ Google Calendar
■ Google Drive
■ Gmail
■ Microsoft Azure
■ Microsoft Teams
■ Office 365 Email
■ Office 365 OneDrive
■ Office 365 SharePoint
■ Salesforce
■ SAP
■ ServiceNow
■ Slack
■ Workday
■ Yammer
Gatelets:
■ 4Shared
■ 4Sync
■ Acrobat.com
■ AIM Mail
■ Alfresco
■ Amazon CloudDrive
■ Amazon Web Services
■ Amazon WorkDocs
■ BitCasa
■ Box
■ BV ShareX
■ cCloud
■ CentralDesktop
■ CloudMe
■ CloudProvider
Using contextual attributes for Application Detection 952
Configuring contextual attribute conditions
■ Confluence
■ Copy
■ Cubby
■ DigitalBucket
■ Digital Ocean
■ DocuSign
■ Dropbox
■ Dynamics
■ Egnyte
■ FilesAnywhere
■ Flow
■ Ftopia
■ Gmail
■ GroupDocs
■ Hightail
■ Huddle
■ IBM Connections
■ iCloud
■ iDrive
■ Intralinks
■ Jive
■ Joyent
■ Just Cloud
■ MailerLite
■ MediaFire
■ Microsoft Azure
■ Office 365
■ OneDrive
■ OneHub
■ OneUbuntu
■ Outlook.com
■ OwnCloud
■ Oxygen
■ Podio
■ Rackspace
■ RapidShare
■ SafeSync
■ Salesforce
Using contextual attributes for Application Detection 953
Configuring contextual attribute conditions
■ SeaCloud
■ ShareFile
■ Sites
■ Slack
■ SmartFile
■ Soonr
■ SugarSync
■ SurveyMonkey
■ Syncplicity
■ Uploaded
■ WatchDocs
■ WebCargo
■ Workshare
■ Wuala
■ Xero
■ Yahoo Mail
■ Yammer
■ Zoho Docs
Bluecoat WSS:
■ Custom
Application Type ■ Web Security Services (Cloud Specifies the type of application:
Proxy) Symantec Web Security Services,
■ Gatelet Symantec CloudSOC Gatelets,
■ Securlet Symantec CloudSOC Securlets, or a
■ Custom custom application.
User attributes
User attributes address specific information about the user that is associated with an incident.
Using contextual attributes for Application Detection 954
Configuring contextual attribute conditions
Client Tenant Domain Enter the name in the Match field. Specifies the client tenant domain of
the user. You can match exactly with
or without case sensitivity, or match
on a regular expression.
Client Tenant User ID Enter the user identifier in the Match Specifies the client tenant identifier of
field. the user. You can match exactly with
or without case sensitivity, or match
on a regular expression.
Exposed Document Count ■ Is Greater Than Specifies the users with a number of
■ Is Less Than exposed documents above or below
■ Is Greater Than or Equals a certain value, or within a range you
specify.
■ Is Less Than or Equals
■ Equals Symantec Web Security Service does
■ Range not use this attribute.
User Threat Score ■ Is Greater Than Specifies the Shadow IT threat score
■ Is Less Than of the user, above or below a certain
■ Is Greater Than or Equals value, or within a range you specify.
■ Is Less Than or Equals This attribute applies only to Securlet
■ Equals policies.
■ Range
Using contextual attributes for Application Detection 955
Configuring contextual attribute conditions
Document Creation Date ■ After Specifies the date the document was
■ Before created.
■ On or After
■ On or Before
■ On
■ Range
Document Last Accessed ■ After Specifies the date the document was
■ Before last accessed.
■ On or After
■ On or Before
■ On
■ Range
Document Last Modified ■ After Specifies the date the document was
■ Before last modified.
■ On or After
■ On or Before
■ On
■ Range
Country Select a country from the drop-down Specifies the name of the country that
list of country names. is associated with the detection
request.
Custom attributes
Custom attributes let you enter any attributes for your Application Detection policies that are
not provided by default.
Note: While there is some overlap among file types supported for extraction and for identification
(because if the system can crack the file it must be able to identify its type), the supported
formats for each operation are distinct and implemented using different match conditions. The
number of file formats supported for type identification is much broader than those supported
for content extraction.
File type Symantec Data Loss Prevention does Explicitly using the Message See “Supported formats for file
identification not rely on file extensions to identify the Attachment or File Type type identification”
format. File type is identified by the Match file property condition. on page 964.
unique binary signature of the file
format.
File contents File contents is any text-based content Implicitly using one or more See “Supported formats for
extraction that can be viewed through the native content match conditions, content extraction”
or source application. including EDM, IDM, VML, on page 980.
data identifiers, keyword,
regular expressions.
Subfile Subfiles are files encapsulated in a Implicitly using one or more See “Supported encapsulation
extraction parent file. Subfiles are extracted and content match conditions, formats for subfile extraction”
(Subfile) processed individually for identification including EDM, IDM, VML, on page 987.
and content extraction. If the subfile data identifiers, keyword,
format is not supported by default, a regular expressions.
custom method can be used to detect
and crack the file.
Supported file formats for detection 964
Supported formats for file type identification
Metadata Metadata is information about the file, Available for content-based See “Supported file formats
extraction such as author, version, or user-defined match conditions. Must be for metadata extraction”
(Metadata) tags. Generally limited to Microsoft enabled. on page 989.
Office documents (OLE-enabled) and
Adobe PDF files. Metadata support may
differ between agent and server.
Note: The Message Attachment or File Type Match condition is a context-based match
condition that only supports file type identification. This condition does not support file contents
extraction. To extract file contents for policy evaluation you must use a content-based detection
rule. See “Supported formats for content extraction” on page 980.
ACT
Adobe FrameMaker
Adobe PDF
ANSI
Apple Double
Apple Single
Applix Alis
Applix Asterix
Applix Graphics
Applix Presents
Applix Spreadsheets
Applix Words
ARC/PAK Archive
Supported file formats for detection 966
Supported formats for file type identification
ASCII
AutoCAD Drawing
AutoDesk WHIP
AutoShade Rendering
BinHex
Corel Presentations
CorelDRAW
CPT Communication
dBase Database
DCX Fax
DECdx
DG CEOwrite
DIF Spreadsheet
Supported file formats for detection 968
Supported formats for file type identification
DisplayWrite
ENABLE
Enhanced Metafile
Envoy (EVY)
Executable- Other
Executable- UNIX
Executable- VAX
Executable- SUN
FileMaker (Macintosh)
Framework
Framework II
Fujitsu Oasys
GIF
GZIP
Supported file formats for detection 969
Supported formats for file type identification
Harvard Graphics
Hewlett-Packard
HTML
IBM DCA-FFT
iCalendar
Informix SmartWare II
Interleaf
Java Archive
JPEG
JustSystems Ichitaro
KW ODA G4 (G4)
Lasergraphics Language
Legato Extender
Lotus Pic
Lotus SmartMaster
Lyrix MacBinary
MacBinary
Macintosh Raster
MacPaint
Supported file formats for detection 971
Supported formats for file type identification
MacWrite
MacWrite II
MASS-11
Micrografx Designer
Microsoft Access
Microsoft OneNote
Microsoft Outlook
Microsoft PowerPoint PC
Microsoft Project
Microsoft Publisher
Microsoft Visio
Microsoft Word PC
Microsoft Works
Microstation
MIDI
MPEG-1 Video
MPEG-2 Audio
MultiMate 4.0
Supported file formats for detection 974
Supported formats for file type identification
Multiplan Spreadsheet
Navy DIF
NeXT/Sun Audio
NIOS TOP
Nota Bene
ODA/ODIF
Office Writer
OLIDIF
OmniOutliner (OO3)
Open PGP
PC COM executable
PC Library Module
PC Object Module
PC PaintBrush
PCD Image
PeachCalc Spreadsheet
Persuasion Presentation
Philips Script
PKZIP
Supported file formats for detection 976
Supported formats for file type identification
Plan Perfect
PostScript File
PRIMEWORD
QuickTime Movie
RAR archive
Real Audio
Reflex Database
RIFF MIDI
SAMNA Word IV
SGML
SMTP document
Supercalc Spreadsheet
SYLK Spreadsheet
Symphony Spreadsheet
Tape Archive
Truevision Targa
Ultracalc Spreadsheet
Unicode Text
Supported file formats for detection 978
Supported formats for file type identification
Uniplex (V6.01)
UNIX Compress
UNKNOWN
Usenet format
UUEncoding
Vcard
VCF
Volkswriter
VRML
WANG PC
Wang WITA
Windows Bitmap
Windows Metafile
Windows Palette
WinZip
Word Connection
WordERA (V 1.0)
WordPad
WordPerfect Graphics 1
WordPerfect Graphics 2
WordStar
WordStar 2000
WordStar 6.0
WriteNow
X Bitmap (XBM)
X Image
X Pixmap (XPM)
XHTML
XML (generic)
XyWrite
Supported file formats for detection 980
Supported formats for content extraction
Word-processing file formats See “Supported word-processing formats for content extraction” on page 980.
Presentation file formats See “Supported presentation formats for content extraction” on page 982.
Spreadsheet file formats See “Supported spreadsheet formats for content extraction” on page 983.
Text and markup file formats See “Supported text and markup formats for content extraction” on page 984.
Email file formats See “Supported email formats for content extraction” on page 985.
CAD file formats See “Supported CAD formats for content extraction” on page 985.
Graphics file formats See “Supported graphics formats for content extraction” on page 986.
Database file formats See “Supported database formats for content extraction” on page 986.
Microsoft Office Open XML formats See “About high-performance content extraction for Office Open XML formats”
on page 996.
Other file formats See “Other file formats supported for content extraction” on page 986.
Encapsulation file formats See “Supported encapsulation formats for subfile extraction” on page 987.
Table 43-4 Supported word-processing file formats for content extraction (continued)
ApplixWords AW
DisplayWrite IP
OpenOfficeWriter SXW
Supported file formats for detection 982
Supported formats for content extraction
Table 43-4 Supported word-processing file formats for content extraction (continued)
OpenOfficeWriter ODT
StarOfficeWriter SXW
StarOfficeWriter ODT
WordPad RTF
XyWrite XY4
Applix Presents AG
Table 43-5 Supported presentation formats for files content extraction (continued)
Applix Spreadsheets AS
Table 43-6 Supported spreadsheet formats for file contents extraction (continued)
Table 43-7 Supported text and markup file formats for content extraction
ANSI TXT
ASCII TXT
HTML HTM
Table 43-7 Supported text and markup file formats for content extraction (continued)
XHTML HTM
Microstation DGN
iCalendar ICS
File Share Encryption (PGP You can decrypt Symantec File Share encrypted files and extract file contents for
Netshare) policy evaluation using the File Share plugin. Refer to the Symantec Data Loss
Prevention Encryption Insight Implementation Guide.
Note: Encryption Insight is only available with Network Discover.
Custom You can write a plug-in to perform content, subfile, and metadata extraction
operations on custom file formats. Refer to the Symantec Data Loss Prevention
Content Extraction Plug-in Developers Guide.
Note: Content extraction plug-ins are limited to detection servers.
Virtual Card File VCF and VCARD electronic business card files
Table 43-13 lists the file formats whose content Symantec Data Loss Prevention can extract
for content evaluation.
7-Zip 7Z
BinHex HQX
GZIP GZ
iCalendar ICS
PKZIP ZIP
WinZip ZIP
UNIX Compress Z
UUEncoding UUE
Virtual Card File VCF and VCARD electronic business card files
Example fields:
Microsoft Office documents, for
example: ■ Title
For Microsoft Office documents, the
■ Subject
■ Word (DOC, DOCX) system extracts Object Linking and
Embedding (OLE) metadata. ■ Author
■ Excel (XLS, XLSX)
■ Keywords
■ PowerPoint (PPT, PPTX)
■ Other custom fields
Example fields:
For Adobe PDF files, the system
extracts Document Information ■ Author
Dictionary (DID) metadata. The system ■ Title
Adobe PDF files
does not support Adobe Extensible ■ Subject
Metadata Platform (XMP) metadata ■ Creation
extraction.
■ Update dates
Use the filter utility to verify metadata See “Always use the filter utility to
Other file formats (including binary and
extraction for other file formats. verify file format metadata support”
text)
on page 991.
For example, consider a business that uses Microsoft Office templates for their Word, Excel,
and PowerPoint documents. The business applies Microsoft OLE metadata properties in the
form of keywords to each template. The business has enabled metadata extraction and
deployed keyword policies to match on metadata keywords. These policies can detect keywords
in documents that are derived from the templates. The business also has the flexibility to use
policy exceptions to avoid generating incidents if certain metadata keywords are present.
Consideration Topic
Always use filter to verify file format metadata support. See “Always use the filter utility to verify file format
metadata support” on page 991.
Enable metadata detection only if it is necessary. See “Distinguish metadata from file content and application
data” on page 993.
Avoid generating false positives by selecting keywords See “Use and tune keyword lists to avoid false positives
carefully. on metadata” on page 995.
Understand resource implications of endpoint metadata See “Understand performance implications of enabling
extraction. endpoint metadata detection” on page 995.
Create a separate endpoint configuration for metadata See “Create a separate endpoint configuration for
detection. metadata detection” on page 995.
Use response rules to add metadata tags to incidents. See “Use response rules to tag incidents with metadata”
on page 995.
Always use the filter utility to verify file format metadata support
To help you create policies that detect file format metadata, use the filter utility that is available
with any Symantec Data Loss Prevention detection or Endpoint Server installation. This utility
provides an easy way to determine which metadata fields the system returns for a given file
format. The utility generates output that contains the metadata the system will extract at runtime
for each file format you test using filter.
To verify file format metadata extraction support using filter describes how to use the filter
utility. It is recommended that you always follow this process so that you can create and tune
policies that accurately detect file format metadata.
Note: The data output by the filter utility is in ASCII format. Symantec Data Loss Prevention
processes data in Unicode format. Therefore, you may rely on the existence of the fields
returned by the filter utility, but the metadata detected by Symantec Data Loss Prevention may
not look identical to the filter output.
Supported file formats for detection 992
Supported file formats for metadata extraction
3 Issue the following command to run the filter program and display its syntax and optional
parameters.
filter -help
As indicated by the help, you use the following syntax to execute the filter utility:
filter [options] inputfile outputfile
The inputfile is an instance of the file format you want to verify. The outputfile is a
file the filter utility writes the extracted data to.
Note the following extraction options:
■ To verify metadata extraction, use the "get doc summary info" option:-i
■ To verify content extraction, use no options: filter inputfile outputfile
4 Execute filter against an instance of the file format to verify metadata extraction.
For example, on Windows you would issue the following command:
filter -i \temp\myfile.doc \temp\metadata_output.txt
Where myfile.doc is a file containing metadata you want to verify and have copied to the
\temp directory, and metadata_output.txt is the name of the file you want the system to
generate and write the extracted data to.
5 Review the filter output. The output data should be similar to the following:
6 Refer to the following tables for an explanation of each metadata extraction field output
by the filter utility.
Table 43-16 repeats the output from Step 5, formatted for readability.
Table 43-17 explains each column field.
Supported file formats for detection 993
Supported file formats for metadata extraction
1 2 1252 CodePage
1 1 "S" Title
0 0 (null)
1 1 "P" Author
0 0 (null)
0 0 (null)
0 1 "" (null)
1 1 "m" LastAuthor
1 1 "1" RevNumber
1 = valid field The type of data: The data payload for the The name of the field (empty
field. or null if the field is invalid).
0 = invalid field 1 = String
Note: You may ignore rows 2 = Integer
where the first column is 0.
3 = Date/Time
5 = Boolean
Note: This list is not exhaustive and is provided for quick reference only. There may be other
types of data that are not extracted as metadata. The best practice is to use the filter utility to
verify file format metadata support. See “Always use the filter utility to verify file format metadata
support” on page 991.
Application data Application data including message transport information is extracted separately from
file format extraction. For all inbound messages, the system extracts message envelope
(header) and subject information as text at the application layer. The type of application
data that is extracted depends on the channels supported by the detection server or
endpoint.
Headers and footers Document header and footer text is extracted as content, not metadata. To avoid false
positives, it is recommended that you remove or whitelist headers and footers from
documents.
See “Use white listing to exclude non-sensitive content from partial matching”
on page 651.
See the Indexed Document Matching (IDM) chapter in the Symantec Data Loss
Prevention Administration Guide for details.
Markup text Markup text is extracted as content, not metadata. Markup text extraction is supported
for HTML, XML, SGML, and more. Markup text extraction is disabled by default.
See the "Advanced Server Settings" topic in the Symantec Data Loss Prevention
Administration Guide to enable it.
Hidden text Hidden text is extracted as content, not metadata. Hidden text extraction in the form
of tracked changes is supported for some Microsoft Office file formats. Hidden text
extraction is disabled by default.
See the "Advanced Server Settings" topic in the Symantec Data Loss Prevention
Administration Guide to enable it.
Watermarks Text-based watermarks are extracted as content, not metadata. Text-based watermark
detection is supported for Microsoft Word documents (versions 2003 and 2007). It is
not supported for other file formats.
Supported file formats for detection 995
Supported file formats for metadata extraction
Warning: Do not enable Office Open XML high-performance content extraction on detection
servers using Indexed Document Matching (IDM) policies.
Table 44-1 Office Open XML formats for high-performance content extraction
The following procedure describes how to enable Office Open XML high-performance content
extraction on your on-premises detection servers. Note that PowerPoint content extraction is
not enabled by default. If you want to extract content from PowerPoint files, follow the optional
third step in this procedure.
To enable Office Open XML high-performance content extraction
1 On your detection server, open the manifest.xml file, located in one of these locations:
■ Linux:
opt/Symantec/DataLossPrevention/ContentExtractionService/15.5/Plugins/Protect/
plugins/contentextraction/OfficeOpenXMLPlugin
■ Windows: \Program
Files\Symantec\DataLossPrevention\ContentExtractionService\15.5\Plugins\
Protect\plugins\contentextraction\OfficeOpenXMLPlugin
2 Locate the plugin id="OfficeOpenXMLPlugin" line, and set the disabled value to
false. The resulting line should read as follows (line breaks added for legibility):
<plugin id="OfficeOpenXMLPlugin"
version="1.0"
spiVersion="1.1"
disabled="false"
extractsAllSubfiles="true">
3 (Optional): To enable PowerPoint content extraction, add the following lines to the
manifest.xml file:
<documentType type="pptx">
<supportedOperations>
<operation type="FileTypeIdentification"/>
<operation type="TextExtraction"/>
<operation type="SubFileExtraction"/>
<operation type="MetadataExtraction"/>
</supportedOperations>
</documentType>
Supported Office Open XML formats for high-performance content extraction 999
About metadata extraction for Office Open XML files
Category
ContentStatus
ContentType
Create_DTM
Description
Identifier
Keywords
Language
LastAuthor
LastPrinted
LastSave_DTM
RevNumber
Subject
Title
Version
AppVersion
Supported Office Open XML formats for high-performance content extraction 1000
About subfile extraction for Office Open XML files
CharCount
CharactersWithSpaces
Company
EditTime
HyperlinkBase
HyperlinksChanged
LineCount
LinksDirty
Manager
PageCount
Parcount
ScaleCrop
Security
SharedDoc
Template
TitleOfParts
WordCount
Table 44-3
File format Embedding type
Bitmap OLE
Visio OLE
Word OLE/OPC
Word 97 OLE/OPC
WordPad OLE
■ On Windows: \Program
Files\Symantec\DataLossPrevention\ContentExtractionService\
15.5\Plugins\Protect\plugins\contentextraction\OfficeOpenXMLPlugin
Supported Office Open XML formats for high-performance content extraction 1003
About subfile extraction for Office Open XML files
The plugin_settings.txt file contains these settings (line breaks added for legibility):
dotnetcoreDir=/publish
extractEmfWmf=on
streamConfiguration=EmbeddedOdf,false,false;
CONTENTS,false,false;
Package,false,false;
AttachContents,false,false;
skipFilesWithSignatures=0x38,0x42,0x50,0x53;
imageSignatures=0x42,0x4d;
0xff,0xd8,0xff,0xe0;
0xff,0xd8,0xff,0xe1;
0xff,0xd8,0xff,0xe8;
0xff,0xd8,0xff,0xe2;
0xff,0xd8,0xff,0xe3;
0x89,0x50,0x4e,0x47,0x0d,0x0a,0x1a,0x0a;
0xd7,0xcd,0xc6,0x9a;
■ Burgerservicenummer
■ Codice Fiscale
■ Colombian Addresses
■ CUSIP Number
■ Hong Kong ID
■ IBAN Central
■ IBAN East
■ IBAN West
■ IP Address
■ IPv6 Address
■ Spanish DNI ID
■ SWIFT Code
■ Taiwan ROC ID
■ UK Passport Number
■ UK Tax ID Number
■ US Passport Number
Pattern
[0123678]\d{8}
Library of system data identifiers 1014
ABA Routing Number
Pattern
[0123678]\d{3}-\d{4}-\d
ABA Checksum Every ABA routing number must start with the following
two digits: 00-15,21-32,61-72,80 and pass an ABA-specific,
position-weighted checksum.
Pattern
[0123678]\d{8}
[0123678]\d{3}-\d{4}-\d
ABA Checksum Computes the checksum and validates the pattern against
it.
Exclude beginning characters Data beginning with any of the following list of values is
not matched:
123456789
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[0123678]\d{8}
[0123678]\d{3}-\d{4}-\d
ABA Checksum Computes the checksum and validates the pattern against
it.
Exclude beginning characters Data beginning with any of the following list of values is
not matched:
123456789
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
■ The medium breadth detects an 11-digit number with checksum validation. It also checks
for common test numbers and duplicate digits.
See “Argentina Tax Identification Number medium breadth” on page 1016.
■ The narrow breadth detects an 11-digit number that passes checksum validation. It also
checks for common test numbers, duplicate digits, and requires the presence of related
keywords.
See “Argentina Tax Identification Number narrow breadth” on page 1017.
Pattern
20-\d{8}-\d
23-\d{8}-\d
27-\d{8}-\d
30-\d{8}-\d
33-\d{8}-\d
34-\d{8}-\d
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
20-\d{8}-\d
23-\d{8}-\d
Library of system data identifiers 1017
Argentina Tax Identification Number
Pattern
27-\d{8}-\d
30-\d{8}-\d
33-\d{8}-\d
34-\d{8}-\d
Argentinian Tax Identity Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
20-\d{8}-\d
23-\d{8}-\d
27-\d{8}-\d
30-\d{8}-\d
33-\d{8}-\d
34-\d{8}-\d
Duplicate digits Ensures that a string of digits is not all the same.
Argentinian Tax Identity Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
Tax ID, tax number, Tax No., taxpayer ID, tax identity
number, tax identification no, tax identification number,
TaxID#, taxidnumber#, taxpayer number, Argentina
taxpayer ID
Pattern
[A-Za-z]\d\d\d\d\d
\d\d\d[-]\d\d\d[-]\d\d\d\d
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[A-Za-z]\d\d\d\d\d
\d\d\d[-]\d\d\d[-]\d\d\d\d
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
\d{11}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{11}
Australian Business Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{11}
Library of system data identifiers 1022
Australian Company Number
Pattern
Duplicate digits Ensures that a string of digits is not all the same.
Australian Business Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
Pattern
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
Australian Company Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
Australian Company Number Validation Check Computes the checksum and validates the pattern against
it.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[2-6]\d{10}
[2-6]\d{9}
[2-6]\d{3}-\d{5}-\d{1}
[2-6]\d{9}[ -/]\d{1}
[2-6]\d{3}-\d{5}-\d{1}[ -/]\d{1}
[2-6]\d{3} \d{5} \d \d
[2-6]\d{3}-\d{5}-\d-\d
Validator Description
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[2-6]\d{10}
[2-6]\d{9}
[2-6]\d{3}-\d{5}-\d{1}
[2-6]\d{9}[ -/]\d{1}
[2-6]\d{3}-\d{5}-\d{1}[ -/]\d{1}
Library of system data identifiers 1026
Australian Medicare Number
Pattern
[2-6]\d{3} \d{5} \d \d
[2-6]\d{3}-\d{5}-\d-\d
Validator Description
Australian Medicare Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[2-6]\d{10}
[2-6]\d{9}
[2-6]\d{3}-\d{5}-\d{1}
[2-6]\d{9}[ -/]\d{1}
[2-6]\d{3}-\d{5}-\d{1}[ -/]\d{1}
[2-6]\d{3} \d{5} \d \d
[2-6]\d{3}-\d{5}-\d-\d
Validator Description
Duplicate digits Ensures that a string of digits is not all the same.
Library of system data identifiers 1027
Australian Passport Number
Validator Description
Australian Medicare Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
Pattern
[XBCEGTHJLMNP]\d{7}
[XBCEGTHJLMNP] \d{7}
Library of system data identifiers 1028
Australian Passport Number
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[XBCEGTHJLMNP]\d{7}
[XBCEGTHJLMNP] \d{7}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\d{8}
\d{9}
Australian Tax File validation check Computes the checksum and validates the pattern against
it.
Patterns
\d{8}
Library of system data identifiers 1030
Austria Passport Number
Patterns
\d{9}
Australian Tax File validation check Computes the checksum and validates the pattern
against it.
Inputs:
Patterns
\l[ ]\d{7}
\l\d{7}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\l[ ]\d{7}
\l\d{7}
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
The Austria Tax Identification Number data identifier detects a nine-digit number that matches
the Austria Tax Identification Number format.
The Austria Tax Identification Number provides two breadths of detection:
■ The wide breadth detects a nine-digit number without checksum validation.
See “Austria Tax Identification Number wide breadth” on page 1032.
■ The narrow breadth detects a nine-digit number. It also requires the presence of related
keywords.
See “Austria Tax Identification Number narrow breadth” on page 1032.
Pattern
\d{2}-\d{3}/\d{4}
\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\d{2}-\d{3}/\d{4}
\d{9}
Library of system data identifiers 1033
Austria Value Added Tax (VAT) Number
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Table 45-51 Austria Value Added Tax (VAT) Number wide-breadth patterns
Patterns
[Aa][Tt][Uu]\d{8}
[Aa][Tt] [Uu]\d{8}
[Aa][Tt][Uu] \d{8}
[Aa][Tt][Uu]\d{3} \d{4} \d
Table 45-52 Austria Value Added Tax (VAT) Number wide-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Table 45-53 Austria Value Added Tax (VAT) Number medium-breadth patterns
Patterns
[Aa][Tt][Uu]\d{8}
[Aa][Tt] [Uu]\d{8}
[Aa][Tt][Uu] \d{8}
[Aa][Tt][Uu]\d{3} \d{4} \d
Table 45-54 Austria Value Added Tax (VAT) Number medium-breadth validators
Austria VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Table 45-55 Austria Value Added Tax (VAT) Number narrow-breadth patters
Patterns
[Aa][Tt][Uu]\d{8}
[Aa][Tt] [Uu]\d{8}
[Aa][Tt][Uu] \d{8}
[Aa][Tt][Uu]\d{3} \d{4} \d
Table 45-56 Austria Value Added Tax (VAT) Number narrow breadth-validators
Austria VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Exclude ending characters Data ending with any of the following list of values is not
matched:
Table 45-56 Austria Value Added Tax (VAT) Number narrow breadth-validators (continued)
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{10}
\d{4}-\d{6}
\d{4} \d{6}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{10}
\d{4}-\d{6}
\d{4} \d{6}
Austrian Social Security Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{10}
\d{4}-\d{6}
\d{4} \d{6}
Duplicate digits Ensures that a string of digits is not all the same.
Austrian Social Security Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1039
Belgian National Number
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
zdravstveno zavarovanje
Pattern
\d{11}
\d{2}.\d{2}.\d{2}-\d{3}.\d{2}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{11}
\d{2}.\d{2}.\d{2}-\d{3}.\d{2}
Belgian National Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{11}
\d{2}.\d{2}.\d{2}-\d{3}.\d{2}
Belgian National Number Validation Check Computes the checksum and validates the pattern against
it.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{10}
Library of system data identifiers 1043
Belgium Driver's Licence Number
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{10}
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\l{2}\d{6}
Patterns
\l{2}\d{6}
Library of system data identifiers 1045
Belgium Tax Identification Number
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
passport number
Patterns
\d{2}[01]\d[0123]\d{6}
Library of system data identifiers 1046
Belgium Tax Identification Number
Patterns
\d{2}.[01]\d.[0123]\d-\d{3}.\d{2}
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\d{2}[01]\d[0123]\d{6}
\d{2}.[01]\d.[0123]\d-\d{3}.\d{2}
Belgian Tax Identification Number Validation Check Checksum validator for Belgium Tax Identification Number.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Table 45-81 Belgium Value Added Tax (VAT) Number wide-breadth patterns
Patterns
[Bb][Ee][0][123456789]\d{8}
[Bb][Ee][0][123456789].\d{4}.\d{4}
[Bb][Ee][0][123456789]-\d{4}-\d{4}
Table 45-82 Belgium Value Added Tax (VAT) Number wide-breadth validator
Table 45-83 Belgium Value Added Tax (VAT) Number medium breadth patterns
Patterns
[Bb][Ee][0][123456789]\d{8}
[Bb][Ee][0][123456789].\d{4}.\d{4}
[Bb][Ee][0][123456789]-\d{4}-\d{4}
Table 45-84 Belgium Value Added Tax (VAT) Number medium-breadth validators
Belgium VAT Number Validation Check Checksum validator for the Belgian Value Added Tax (VAT)
Number.
Library of system data identifiers 1049
Brazilian Election Identification Number
Table 45-85 Belgium Value Added Tax (VAT) Number narrow-breadth patterns
Pattern
[Bb][Ee][0][123456789]\d{8}
[Bb][Ee][0][123456789].\d{4}.\d{4}
[Bb][Ee][0][123456789]-\d{4}-\d{4}
Table 45-86 Belgium Value Added Tax (VAT) Number narrow-breadth validators
Belgium VAT Number Validation Check Checksum validator for the Belgian Value Added Tax (VAT)
Number.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\d{5}[0]\d{3}
\d{5}[12]\d\d{2}
\d{6}[0]\d{3}
\d{6}[0]\d[/]\d{2}
\d{6}[12]\d\d{2}
\d{6}[12]\d[/]\d{2}
\d{7}[0]\d{3}
\d{7}[0]\d[/]\d{2}
\d{7}[12]\d[/]\d{2}
\d{7}[12]\d\d{2}
\d{8}[0]\d{3}
\d{8}[0]\d[/]\d{2}
\d{8}[0]\d{3}[/]\d{2}
\d{8}[12]\d[/]\d{2}
\d{8}[12]\d\d{2}
\d{8}[12]\d\d{2}[/]\d{2}
Library of system data identifiers 1051
Brazilian Election Identification Number
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\d{5}[0]\d{3}
\d{5}[12]\d\d{2}
\d{6}[0]\d{3}
\d{6}[0]\d[/]\d{2}
\d{6}[12]\d\d{2}
\d{6}[12]\d[/]\d{2}
\d{7}[0]\d{3}
\d{7}[0]\d[/]\d{2}
\d{7}[12]\d[/]\d{2}
\d{7}[12]\d\d{2}
\d{8}[0]\d{3}
\d{8}[0]\d[/]\d{2}
\d{8}[0]\d{3}[/]\d{2}
\d{8}[12]\d[/]\d{2}
\d{8}[12]\d\d{2}
\d{8}[12]\d\d{2}[/]\d{2}
Library of system data identifiers 1052
Brazilian Election Identification Number
Brazil Election Identification Number Validation Check Computes Brazil Election Identification Number checksum
every Brazil Election Identification Number must pass.
Patterns
\d{5}[0]\d{3}
\d{5}[12]\d\d{2}
\d{6}[0]\d{3}
\d{6}[0]\d[/]\d{2}
\d{6}[12]\d\d{2}
\d{6}[12]\d[/]\d{2}
\d{7}[0]\d{3}
\d{7}[0]\d[/]\d{2}
\d{7}[12]\d[/]\d{2}
\d{7}[12]\d\d{2}
\d{8}[0]\d{3}
\d{8}[0]\d[/]\d{2}
\d{8}[0]\d{3}[/]\d{2}
\d{8}[12]\d[/]\d{2}
\d{8}[12]\d\d{2}
\d{8}[12]\d\d{2}[/]\d{2}
Library of system data identifiers 1053
Brazilian National Registry of Legal Entities Number
Duplicate digits Ensures that a string of digits is not all the same.
Brazil Election Identification Number Validation Check Computes Brazil Election Identification Number checksum
every Brazil Election Identification Number must pass.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Table 45-93 Brazilian National Registry of Legal Entities Number wide-breadth patterns
Pattern
\d{14}
\d{8}[/]\d{6}
\d{8}[/]\d{4}-\d{2}
\d{2}.\d{3}.\d{3}[/]\d{4}-\d{2}
Table 45-94 Brazilian National Registry of Legal Entities Number wide-breadth validator
Duplicate digits Ensures that a string of digits is not all the same.
Table 45-95 Brazilian National Registry of Legal Entities Number medium-breadth patterns
Pattern
\d{14}
\d{8}[/]\d{6}
\d{8}[/]\d{4}-\d{2}
\d{2}.\d{3}.\d{3}[/]\d{4}-\d{2}
Table 45-96 Brazilian National Registry of Legal Entities Number medium-breadth validator
Brazilian National Registry of Legal Entities Number Computes the checksum and validates the pattern against
Validation Check it.
Library of system data identifiers 1055
Brazilian Natural Person Registry Number (CPF)
Table 45-97 Brazilian National Registry of Legal Entities Number narrow-breadth patterns
Pattern
\d{14}
\d{8}[/]\d{6}
\d{8}[/]\d{4}-\d{2}
\d{2}.\d{3}.\d{3}[/]\d{4}-\d{2}
Table 45-98 Brazilian National Registry of Legal Entities Number narrow-breadth validator
Duplicate digits Ensures that a string of digits is not all the same.
Brazilian National Registry of Legal Entities Number Computes the checksum and validates the pattern against
Validation Check it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{11}
\d{9}[-]\d{2}
\d{3}[.]\d{3}[.]\d{3}[-]\d{2}
Duplicate digits Ensures that a string of digits is not all the same.
Table 45-101 Brazilian Natural Person Registry Number medium-breadth patterns Pattern
Pattern
\d{11}
\d{9}[-]\d{2}
\d{3}[.]\d{3}[.]\d{3}[-]\d{2}
Library of system data identifiers 1057
Brazilian Natural Person Registry Number (CPF)
Brazilian Natural Person Registry Number Validation Computes Brazilian Natural Person Registry Number
Check checksum every Brazilian Natural Person Registry Number
must pass.
Pattern
\d{11}
\d{9}[-]\d{2}
\d{3}[.]\d{3}[.]\d{3}[-]\d{2}
Duplicate digits Ensures that a string of digits is not all the same.
Brazilian Natural Person Registry Number Validation Computes Brazilian Natural Person Registry Number
Check checksum every Brazilian Natural Person Registry Number
must pass.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[9]\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[9]\d{9}
British Columbia Personal Healthcare Number Computes British Columbia Personal Healthcare Number
Validation Check checksum that every British Columbia Personal Healthcare
Number must pass.
Pattern
[9]\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
British Columbia Personal Healthcare Number Computes British Columbia Personal Healthcare Number
Validation Check checksum that every British Columbia Personal Healthcare
Number must pass.
Library of system data identifiers 1060
Bulgaria Value Added Tax (VAT) Number
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Table 45-111 Bulgaria Value Added Tax (VAT) Number wide-breadth patterns
Pattern
[bB][gG]\d{9}
[bB][gG] \d{9}
[bB][gG]\d{10}
[bB][gG] \d{10}
Table 45-112 Bulgaria Value Added Tax (VAT) Number wide-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Table 45-113 Bulgaria Value Added Tax (VAT) Number medium-breadth patterns
Pattern
[bB][gG]\d{9}
[bB][gG] \d{9}
[bB][gG]\d{10}
[bB][gG] \d{10}
Library of system data identifiers 1062
Bulgaria Value Added Tax (VAT) Number
Table 45-114 Bulgaria Value Added Tax (VAT) Number medium-breadth validators
Bulgaria Value Added Tax (VAT) Number Validation Computes the checksum and validates the pattern against
Check it.
Table 45-115 Bulgaria Value Added Tax (VAT) Number narrow-breadth patterns
Pattern
[bB][gG]\d{9}
[bB][gG] \d{9}
[bB][gG]\d{10}
[bB][gG] \d{10}
Table 45-116 Bulgaria Value Added Tax (VAT) Number narrow-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Bulgaria Value Added Tax (VAT) Number Validation Computes the checksum and validates the pattern against
Check it.
Library of system data identifiers 1063
Bulgarian Uniform Civil Number - EGN
Table 45-116 Bulgaria Value Added Tax (VAT) Number narrow-breadth validators (continued)
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
vat number, vat, VAT, vat#, VAT#, vat no., vatno#, value
added tax number, vatin, VATIN, value added tax, vat
no
Pattern
\d\d[024][123456789]0[123456789]\d{4}
Library of system data identifiers 1064
Bulgarian Uniform Civil Number - EGN
Table 45-117 Bulgarian Uniform Civil Number - EGN wide-breadth pattern (continued)
Pattern
\d\d[135][012]0[123456789]\d{4}
\d\d[024][123456789][12]\d{5}
\d\d[135][012][12]\d{5}
\d\d[024][123456789]3[01]\d{4}
\d\d[135][012]3[01]\d{4}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d\d[024][123456789]0[123456789]\d{4}
\d\d[135][012]0[123456789]\d{4}
\d\d[024][123456789][12]\d{5}
\d\d[135][012][12]\d{5}
\d\d[024][123456789]3[01]\d{4}
\d\d[135][012]3[01]\d{4}
Bulgarian Uniform Civil Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1065
Bulgarian Uniform Civil Number - EGN
Pattern
\d\d[024][123456789]0[123456789]\d{4}
\d\d[135][012]0[123456789]\d{4}
\d\d[024][123456789][12]\d{5}
\d\d[135][012][12]\d{5}
\d\d[024][123456789]3[01]\d{4}
\d\d[135][012]3[01]\d{4}
Duplicate digits Ensures that a string of digits is not all the same.
Bulgarian Uniform Civil Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Burgerservicenummer
In the Netherlands, the Burgerservicenummer is used to uniquely identify citizens and is printed
on driving licenses, passports and international ID cards under the header Personal Number.
The Burgerservicenummer data identifier detects an eight- or nine-digit number that matches
the Burgerservicenummer format and passes checksum validation.
The Burgerservicenummer data identifier provides two breadths of detection:
■ The wide breadth detects an eight- or nine-digit number that passes checksum validation.
See “Burgerservicenummer wide breadth” on page 1066.
■ The narrow breadth detects an eight- or nine-digit number that passes checksum validation.
It also requires the presence of related keywords.
See “Burgerservicenummer narrow breadth” on page 1066.
Pattern
\d{9}
Burgerservicenummer Check Computes the checksum and validates the pattern against
it.
Pattern
\d{9}
Library of system data identifiers 1067
Canada Driver's License Number
Burgerservicenummer Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d\d\d\d\d\d-\d\d\d
[Dd]\d\d\d\d\d\d\d\d\d
[A-Za-z]{2}-[A-Za-z]{2}-[A-Za-z]{2}-[A-Za-z]\d\d\d[A-Za-z]{2}
[A-Za-z]\d\d\d\d-\d\d\d\d\d-\d\d\d\d\d
[A-Za-z]{5}\d\d\d\d\d\d\d\d\d
[A-Za-z]\d\d\d\d-\d\d\d\d\d\d-\d\d
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
\d\d\d\d\d\d-\d\d\d
[Dd]\d\d\d\d\d\d\d\d\d
[A-Za-z]{2}-[A-Za-z]{2}-[A-Za-z]{2}-[A-Za-z]\d\d\d[A-Za-z]{2}
Library of system data identifiers 1069
Canada Driver's License Number
Pattern
[A-Za-z]\d\d\d\d-\d\d\d\d\d-\d\d\d\d\d
[A-Za-z]{5}\d\d\d\d\d\d\d\d\d
[A-Za-z]\d\d\d\d-\d\d\d\d\d\d-\d\d
Canada Driver's License Number Check Computes the checksum and validates the pattern against
it.
Pattern
\d\d\d\d\d\d-\d\d\d
[Dd]\d\d\d\d\d\d\d\d\d
[A-Za-z]{2}-[A-Za-z]{2}-[A-Za-z]{2}-[A-Za-z]\d\d\d[A-Za-z]{2}
[A-Za-z]\d\d\d\d-\d\d\d\d\d-\d\d\d\d\d
[A-Za-z]{5}\d\d\d\d\d\d\d\d\d
[A-Za-z]\d\d\d\d-\d\d\d\d\d\d-\d\d
Exclude ending characters Data ending with any of the following list of values is not
matched:
Canada Driver's License Number Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
permis de conduire
Pattern
[a-zA-Z]{2}\d{6}
[a-zA-Z]{2}\d{7}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[a-zA-Z]{2}\d{6}
[a-zA-Z]{2}\d{7}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
[a-zA-Z]{2}\d{7}
[a-zA-Z]{2}\d{10}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[a-zA-Z]{2}\d{7}
[a-zA-Z]{2}\d{10}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
■ The narrow breadth detects nine-digit numbers with the format DDD-DDD-DDD separated
by dashes or spaces. It also performs Luhn-check validation; eliminates non-assigned
numbers, fictitiously assigned numbers, and common test numbers; and requires the
presence of related keywords.
See “Canadian Social Insurance Number narrow breadth” on page 1076.
Patterns
\d{9}
\d{3}/\d{3}/\d{3}
\d{3}.\d{3}.\d{3}
\d{3}-\d{3}-\d{3}
Patterns
\d{3}.\d{3}.\d{3}
\d{3}-\d{3}-\d{3}
Library of system data identifiers 1076
Canadian Social Insurance Number
Exclude beginning characters Data beginning with any of the following list of values is
not matched:
8, 123456789
Patterns
\d{3}-\d{3}-\d{3}
Exclude beginning characters Data beginning with any of the following list of values is
not matched:
0, 8, 123456789
Library of system data identifiers 1077
Chilean National Identification Number
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\d{7}[0123456789Kk]
\d{7}[-][0123456789Kk]
\d[.]\d{3}[.]\d{3}[-][0123456789Kk]
Library of system data identifiers 1078
Chilean National Identification Number
Patterns
\d{8}[0123456789Kk]
\d{8}[-][0123456789Kk]
\d{2}[.]\d{3}[.]\d{3}[-][0123456789Kk]
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\d{7}[0123456789Kk]
\d{7}[-][0123456789Kk]
\d[.]\d{3}[.]\d{3}[-][0123456789Kk]
\d{8}[0123456789Kk]
\d{8}[-][0123456789Kk]
\d{2}[.]\d{3}[.]\d{3}[-][0123456789Kk]
Chilean National Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Patterns
\d{7}[0123456789Kk]
\d{7}[-][0123456789Kk]
\d[.]\d{3}[.]\d{3}[-][0123456789Kk]
\d{8}[0123456789Kk]
\d{8}[-][0123456789Kk]
\d{2}[.]\d{3}[.]\d{3}[-][0123456789Kk]
Duplicate digits Ensures that a string of digits is not all the same.
Chilean National Identification Number Validation Computes the checksum and validates the pattern against
Check it .
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
RUT, RUN, national identification number, Chilean
identity no., national unique role, rut#, run#,
identificationnumber, identityno.#, identity number
Patterns
\d{9}
\l\d{8}
\l{2}\d{8}
Patterns
\d{9}
\l\d{8}
\l{2}\d{8}
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Codice Fiscale
The Codice Fiscale uniquely identifies an Italian citizen or permanent resident alien and
issuance of the code is centralized to the Ministry of Treasure. The Codice Fiscale is issued
to every Italian at birth.
The Codice Fiscale data identifier detects a 16-character identifier that matches the Codice
Fiscale format.
The Codice Fiscale data identifier provides two breadths of detection:
■ The wide breadth detects a 16-character identifier with checksum validation.
See “Codice Fiscale wide breadth” on page 1081.
■ The narrow breadth detects a 16-character identifier with checksum validation. It also
requires the presence of related keywords.
See “Codice Fiscale narrow breadth” on page 1082.
Patterns
[A-Z]{6}[0-9LMNPQRSTUV]{2}[ABCDEHLMPRST][0-9LMNPQRSTUV]{2}[A-Z] [0-9LMNPQRSTUV]{3}[A-Z]
Codice Fiscale Control Key Check Computes the control key and checks if it is valid.
Patterns
[A-Z]{6}[0-9LMNPQRSTUV]{2}[ABCDEHLMPRST][0-9LMNPQRSTUV]{2}[A-Z] [0-9LMNPQRSTUV]{3}[A-Z]
Codice Fiscale Control Key Check Computes the control key and checks if it is valid.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Colombian Addresses
The Colombian Addresses data identifier detects home addresses and physical locations in
Columbia.
The Colombian Addresses data identifier provides two breadths of detection:
■ The wide breadth detects an address without validation.
See “ Colombian Addresses wide breadth” on page 1083.
■ The narrow breadth detects an address with keyword validation.
See “Colombian Addresses narrow breadth” on page 1084.
Library of system data identifiers 1083
Colombian Addresses
Patterns
\d{1,3} \d{1,3}-\d{1,3}
\d{1,3}[A-Za-z] \d{1,3}[A-Za-z]-\d{1,3}
\d{1,3} \d{1,3}[A-Za-z]-\d{1,3}
\d{1,3}[A-Za-z] \d{1,3}-\d{1,3}
\d{1,3} # \d{1,3}[A-Za-z]-\d{1,3}
\d{1,3}[A-Za-z] No \d{1,3}[A-Za-z]-\d{1,3}
\d{1,3} # \d{1,3}-\d{1,3}
\d{1,3}[A-Za-z] # \d{1,3}-\d{1,3}
\d{1,3} No \d{1,3}-\d{1,3}
\d{1,3}[A-Za-z] No \d{1,3}-\d{1,3}
Patterns
\d{1,3}[A-Za-z] # \d{1,3}[A-Za-z]-\d{1,3}
\d{1,3} No \d{1,3}[A-Za-z]-\d{1,3}
The wide breadth of the Colombian Addresses data identifier does not include a validator.
Patterns
\d{1,3} \d{1,3}-\d{1,3}
\d{1,3}[A-Za-z] \d{1,3}[A-Za-z]-\d{1,3}
\d{1,3} \d{1,3}[A-Za-z]-\d{1,3}
\d{1,3}[A-Za-z] \d{1,3}-\d{1,3}
\d{1,3} # \d{1,3}[A-Za-z]-\d{1,3}
\d{1,3}[A-Za-z] No \d{1,3}[A-Za-z]-\d{1,3}
\d{1,3} # \d{1,3}-\d{1,3}
Library of system data identifiers 1085
Colombian Cell Phone Number
Patterns
\d{1,3}[A-Za-z] # \d{1,3}-\d{1,3}
\d{1,3} No \d{1,3}-\d{1,3}
\d{1,3}[A-Za-z] No \d{1,3}-\d{1,3}
\d{1,3}[A-Za-z] # \d{1,3}[A-Za-z]-\d{1,3}
\d{1,3} No \d{1,3}[A-Za-z]-\d{1,3}
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\d{8}
\d{2}.\d{3}.\d{3}
\d{2}/\d{3}/\d{3}
\d{2}-\d{3}-\d{3}
\d{2},\d{3},\d{3}
\d{9}
\d{3}-\d{3}-\d{3}
\d{3},\d{3},\d{3}
\d{3}/\d{3}/\d{3}
\d{3}.\d{3}.\d{3}
\d{10}
\d{1}/\d{3}/\d{3}/\d{3}
\d{1},\d{3},\d{3},\d{3}
\d{1}.\d{3}.\d{3}.\d{3}
\d{1}-\d{3}-\d{3}-\d{3}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\d{8}
\d{2}.\d{3}.\d{3}
\d{2}/\d{3}/\d{3}
\d{2}-\d{3}-\d{3}
\d{2},\d{3},\d{3}
\d{9}
\d{3}-\d{3}-\d{3}
\d{3},\d{3},\d{3}
\d{3}/\d{3}/\d{3}
\d{3}.\d{3}.\d{3}
\d{10}
\d{1}/\d{3}/\d{3}/\d{3}
\d{1},\d{3},\d{3},\d{3}
\d{1}.\d{3}.\d{3}.\d{3}
\d{1}-\d{3}-\d{3}-\d{3}
Require beginning characters This validator requires the following characters at the
beginning of the number:
300, 301, 302, 310, 311, 312, 313, 314, 315, 316, 317,
318, 319, 320, 321, 350
Duplicate digits Ensures that a string of digits is not all the same.
Library of system data identifiers 1088
Colombian Personal Identification Number
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\d{9}
\d{3}-\d{3}-\d{3}
\d{3},\d{3},\d{3}
Library of system data identifiers 1089
Colombian Personal Identification Number
Patterns
\d{3}/\d{3}/\d{3}
\d{3}.\d{3}.\d{3}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\d{9}
\d{3}-\d{3}-\d{3}
\d{3},\d{3},\d{3}
\d{3}/\d{3}/\d{3}
\d{3}.\d{3}.\d{3}
Exclude beginning characters Data beginning with any of the following list of values is
not matched:
300, 301, 302, 310, 310, 312, 313, 314, 315, 316, 317,
318, 319, 320, 321, 350
$ ,$
Library of system data identifiers 1090
Colombian Tax Identification Number
.00
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
cedula, cédula, c.c., c.c, C.C., C.C, cc, CC, NIE., NIE,
nie., nie, cedula de ciudadania, cédula de ciudadanía,
cc#, CC #, documento de identificacion, documento
de identificación, Nit.
Patterns
\d{9}
\d{3}-\d{3}-\d{3}
\d{3},\d{3},\d{3}
\d{3}/\d{3}/\d{3}
\d{3}.\d{3}.\d{3}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\d{9}
\d{3}-\d{3}-\d{3}
\d{3},\d{3},\d{3}
\d{3}/\d{3}/\d{3}
\d{3}.\d{3}.\d{3}
Require beginning characters Requires these characters at the beginning of the number:
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
%B3[068]\d{12}^[A-Z]{1}
%B3[068]\d{2}-\d{6}-\d{4}^[A-Z]{1}
%B4\d{12}^[A-Z]{1}
%B3[47]\d{2}-\d{6}-\d{5}^[A-Z]{1}
%B4\d{15}^[A-Z]{1}
%B3[47]\d{13}^[A-Z]{1}
%B5[1-5]\d{2}-\d{4}-\d{4}-\d{4}^[A-Z]{1}
%B4\d{3}-\d{4}-\d{4}-\d{4}^[A-Z]{1}
%B5[1-5]\d{14}^[A-Z]{1}
%B2131\d{11}^[A-Z]{1}
%B3\d{3}-\d{4}-\d{4}-\d{4}^[A-Z]{1}
%B3\d{15}^[A-Z]{1}
%B2149\d{11}^[A-Z]{1}
%B2149-\d{6}-\d{5}^[A-Z]{1}
%B2014\d{11}^[A-Z]{1}
%B2014-\d{6}-\d{5}^[A-Z]{1}
Library of system data identifiers 1094
Credit Card Magnetic Stripe Data
Table 45-176 Credit Card Magnetic Stripe Data medium-breadth patterns (continued)
;1800\d{11}=
;6011-\d{4}-\d{4}-\d{4}=
;6011\d{12}=
;3[068]\d{12}=
;3[068]\d{2}-\d{6}-\d{4}=
;4\d{12}=
;3[47]\d{2}-\d{6}-\d{5}=
;4\d{15}= ;3[47]\d{13}=
;5[1-5]\d{2}-\d{4}-\d{4}-\d{4}=
;4\d{3}-\d{4}-\d{4}-\d{4}=
;5[1-5]\d{14}= ;2131\d{11}=
;3\d{3}-\d{4}-\d{4}-\d{4}=
;3\d{15}=
;2149\d{11}=
;2149-\d{6}-\d{5}=
;2014\d{11}=
;2014-\d{6}-\d{5}=
%B1800\d{11}^[A-Z]{1}
%B6011-\d{4}-\d{4}-\d{4}^[A-Z]{1}
Table 45-176 Credit Card Magnetic Stripe Data medium-breadth patterns (continued)
%B6011\d{12}^[A-Z]{1}
Validator Description
Luhn Check Computes the Luhn checksum which every instance must
pass.
2149-\d{6}-\d{5} \d{16}
2014\d{11} \d{4}.\d{4}.\d{4}.\d{4}
2014-\d{6}-\d{5} 1800\d{11}
3[47]\d{2}.\d{6}.\d{5} 2131\d{11}
3[068]\d{2}.\d{6}.\d{4} 2149\d{11}
3[47]\d{2}-\d{6}-\d{5} 2149.\d{6}.\d{5}
3[068]\d{2}-\d{6}-\d{4}
3[47]\d{13}
3[068]\d{12}
Luhn Check Computes the Luhn checksum, which every credit card number must pass.
1800\d{11} 2720.\d{4}.\d{4}.\d{4}
2131\d{11} 2720-\d{4}-\d{4}-\d{4}
3\d{3}-\d{4}-\d{4}-\d{4} 2720\d{12}
3\d{15} 6221.[2][6-8]\d{2}.\d{4}.\d{4}
4\d{3}.\d{4}.\d{4}.\d{4} 6221-[2][6-8]\d{2}-\d{4}-\d{4}
4\d{15} 622[2-8].\d{4}.\d{4}.\d{4}
4\d{12} 622[2-8]-\d{4}-\d{4}-\d{4}
5[1-5]\d{2}-\d{4}-\d{4}-\d{4} 6229[2][0-5]\d{10}
2149.\d{6}.\d{5} 6229.[2][0-5]\d{2}.\d{4}.\d{4}
27[0-1]\d.\d{4}.\d{4}.\d{4} 3[47]\d{2}-\d{6}-\d{5}
27[0-1]\d-\d{4}-\d{4}-\d{4}
Exclude exact match Excludes anything that matches the specified text.
Inputs:
Luhn Check Validator computes the Luhn checksum, which every credit card number must pass.
222[1-9]\d{12}
222[1-9][.-]\d{4}[.-]\d{4}[.-]\d{4}
22[3-9]\d{13}
22[3-9]\d[.-]\d{4}[.-]\d{4}[.-]\d{4}
2[3-6]\d{14}
2[3-6]\d{2}.\d{4}.\d{4}.\d{4}
2[3-6]\d{2}-\d{4}-\d{4}-\d{4}
27[0-1]\d{13}
27[0-1]\d.\d{4}.\d{4}.\d{4}
27[0-1]\d-\d{4}-\d{4}-\d{4}
2720.\d{4}.\d{4}.\d{4}
2720-\d{4}-\d{4}-\d{4}
2720\d{12}
6221[2][6-8]\d{10}
6221.[2][6-8]\d{2}.\d{4}.\d{4}
6221-[2][6-8]\d{2}-\d{4}-\d{4}
622[2-8]\d{12}
622[2-8].\d{4}.\d{4}.\d{4}
622[2-8]-\d{4}-\d{4}-\d{4}
6229[2][0-5]\d{10}
6229.[2][0-5]\d{2}.\d{4}.\d{4}
6229-[2][0-5]\d{2}-\d{4}-\d{4}
2149-\d{6}-\d{5}
2014\d{11}
2014-\d{6}-\d{5}
6011-\d{4}-\d{4}-\d{4}
6011\d{12}
3[068]\d{12}
3[068]\d{2}-\d{6}-\d{4}
3[47]\d{2}-\d{6}-\d{5}
3[47]\d{13}
4\d{3}-\d{4}-\d{4}-\d{4}
3\d{3}.\d{4}.\d{4}.\d{4}
2149.\d{6}.\d{5}
2014.\d{6}.\d{5}
6011.\d{4}.\d{4}.\d{4}
3[068]\d{2}.\d{6}.\d{4}
3[47]\d{2}.\d{6}.\d{5}
4\d{3}.\d{4}.\d{4}.\d{4}
1800\d{11}
4\d{12}
4\d{15}
5[1-5]\d{2}-\d{4}-\d{4}-\d{4}
5[1-5]\d{14}
5[1-5]\d{2}.\d{4}.\d{4}.\d{4}
2131\d{11}
3\d{3}-\d{4}-\d{4}-\d{4}
3\d{15}
2149\d{11}
Exclude exact match Excludes anything that matches the specified text.
Inputs:
Luhn Check Validator computes the Luhn checksum which every Credit Card Number must
pass.
Library of system data identifiers 1104
Croatia National Identification Number
Find keywords With this option selected, at least one of the following keywords or key phrases
must be present for the data to be matched.
Inputs:
Pattern
\d{11}
[Hh][Rr]\d{11}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{11}
[Hh][Rr]\d{11}
Croatia National Identification Number Validation Computes the checksum and validates the pattern against
Check it.
checks for duplicate digits and common test numbers, and requires the presence of related
keywords.
Pattern
\d{11}
[Hh][Rr]\d{11}
Duplicate digits Ensures that a string of digits is not all the same.
Croatia National Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
CUSIP Number
The CUSIP number is a unique identifier assigned to North American stock or other securities.
This number is issued by the Committee on Uniform Security Identification Procedures (CUSIP)
to assist in clearing and settling trades. CINS is an extension of CUSIP used to identify securities
outside of North America.
The CUSIP Number data identifier detects a 9-character alphanumeric pattern that matches
the CUSIP Number format.
This data identifier provides three breadths of detection:
Library of system data identifiers 1107
CUSIP Number
■ The wide breadth detects a 9-character alphanumeric pattern with checksum validation.
See “CUSIP Number wide breadth” on page 1107.
■ The medium breadth detects a 9-character alphanumeric pattern with checksum validation.
It also requires the presence of related keywords.
See “CUSIP Number medium breadth” on page 1107.
■ The narrow breadth detects a 9-character alphanumeric pattern with checksum validation.
It also requires the presence of related keywords, excluding the NNA keyword.
See “CUSIP Number narrow breadth” on page 1108.
Pattern
w\d\w{6}\d
\w\d\w{4} \w{2} \d
Cusip Validation Validator checks for invalid CUSIP ranges and computes the CUSIP checksum
(Modulus 10 Double Add Double algorithm).
Pattern
w\d\w{6}\d
\w\d\w{4} \w{2} \d
Library of system data identifiers 1108
CUSIP Number
Cusip Validation Validator checks for invalid CUSIP ranges and computes the CUSIP
checksum (Modulus 10 Double Add Double algorithm).
Find keywords With this option selected, at least one of the following keywords or key
phrases must be present for the data to be matched.
Inputs:
Pattern
w\d\w{6}\d
\w\d\w{4} \w{2} \d
Cusip Validation Validator checks for invalid CUSIP ranges and computes the CUSIP checksum
(Modulus 10 Double Add Double algorithm).
Find keywords With this option selected, at least one of the following keywords or key phrases
must be present for the data to be matched.
Inputs:
Pattern
\d{8}[A-Za-z]
Pattern
\d{8}[A-Za-z]
Cyprus Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{8}[A-Za-z]
Cyprus Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Table 45-202 Cyprus Value Added Tax (VAT) Number wide-breadth patterns
Pattern
[Cc][Yy]\d{8}[A-Za-z]
Table 45-203 Cyprus Value Added Tax (VAT) Number wide-breadth validators
Table 45-204 Cyprus Value Added Tax (VAT) Number medium-breadth patterns
Pattern
[Cc][Yy]\d{8}[A-Za-z]
Table 45-205 Cyprus Value Added Tax (VAT) Number medium-breadth validators
Cyprus Value Added Tax (VAT) Number Validation Computes the checksum and validates the pattern against
Check it.
Table 45-206 Cyprus Value Added Tax (VAT) Number narrow-breadth patterns
Pattern
[Cc][Yy]\d{8}[A-Za-z]
Table 45-207 Cyprus Value Added Tax (VAT) Number narrow-breadth validators
Cyprus Value Added Tax (VAT) Number Validation Computes the checksum and validates the pattern against
Check it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
vat no, vat, vat number, vat#, VAT, VAT#, value added
tax, vatin, VATIN, KDV, kdv#, KDV numarası, Katma
değer Vergisi, Φόρος Προστιθέμενης Αξίας
The Czech Republic Driver's Licence Number data identifier detects an eight-character
alphanumeric pattern that matches the Czech Republic Driver's Licence Number format.
This data identifier provides the following breadths of detection:
■ The wide breadth detects an eight-character alphanumeric pattern that matches the Czech
Republic Driver's Licence Number format. It checks for common test patterns.
See “Czech Republic Driver's License Number wide breadth” on page 1113.
■ The narrow breadth detects an eight-character alphanumeric pattern that matches the
Czech Republic Driver's Licence Number format. It checks for common test patterns, and
also requires the presence of related keywords.
See “Czech Republic Driver's License Number narrow breadth” on page 1113.
Pattern
[Ee][A-Za-z] \d{6}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[Ee][A-Za-z] \d{6}
Library of system data identifiers 1114
Czech Republic Personal Identification Number
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
\d\d[0156]\d[0123]\d[/]\d\d\d
\d\d[0156]\d[0123]\d[/]\d\d\d\d
\d\d[0156]\d[0123]\d\d\d\d
\d\d[0156]\d[0123]\d\d\d\d\d
\d\d[0156]\d[012345678]\d[/]\d\d\d
\d\d[0156]\d[012345678]\d[/]\d\d\d\d
\d\d[0156]\d[012345678]\d\d\d\d
\d\d[0156]\d[012345678]\d\d\d\d\d
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d\d[0156]\d[0123]\d[/]\d\d\d
\d\d[0156]\d[0123]\d[/]\d\d\d\d
\d\d[0156]\d[0123]\d\d\d\d
\d\d[0156]\d[0123]\d\d\d\d\d
\d\d[0156]\d[012345678]\d[/]\d\d\d
\d\d[0156]\d[012345678]\d[/]\d\d\d\d
Library of system data identifiers 1116
Czech Republic Personal Identification Number
Pattern
\d\d[0156]\d[012345678]\d\d\d\d
\d\d[0156]\d[012345678]\d\d\d\d\d
Czech Personal Identity Computes the checksum and validates the pattern against it.
Number Validation Check
Pattern
\d\d[0156]\d[0123]\d[/]\d\d\d
\d\d[0156]\d[0123]\d[/]\d\d\d\d
\d\d[0156]\d[0123]\d\d\d\d
\d\d[0156]\d[0123]\d\d\d\d\d
\d\d[0156]\d[012345678]\d[/]\d\d\d
\d\d[0156]\d[012345678]\d[/]\d\d\d\d
\d\d[0156]\d[012345678]\d\d\d\d
\d\d[0156]\d[012345678]\d\d\d\d\d
Library of system data identifiers 1117
Czech Republic Tax Identification Number
Duplicate digits Ensures that a string of digits is not all the same.
Czech Personal Identity Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
See “Czech Republic Tax Identification Number narrow breadth” on page 1120.
Pattern
\d{2}[05][1-9][012]\d{4,5}
\d{2}[05][1-9]3[01]\d{3,4}
\d{2}[05][1-9][012]\d[/]\d{3,4}
\d{2}[05][1-9]3[01][/]\d{3,4}
\d{2}[16][012]{2}\d{4,5}
\d{2}[16][012]3[01]\d{3,4}
\d{2}[16][012]{2}\d[/]\d{3,4}
\d{2}[16][012]3[01][/]\d{3,4}
\d{2}[27][1-9][012]\d{5}
\d{2}[27][1-9]3[01]\d{4}
\d{2}[27][1-9][012]\d[/]\d{4}
\d{2}[27][1-9]3[01][/]\d{4}
\d{2}[38][012]{2}\d{5}
\d{2}[38][012]3[01]\d{4}
\d{2}[38][012]{2}\d[/]\d{4}
\d{2}[38][012]3[01][/]\d{4}
Table 45-219 Czech Republic Tax Identification Number wide-breadth validators (continued)
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
\d{2}[05][1-9][012]\d{4,5}
\d{2}[05][1-9]3[01]\d{3,4}
\d{2}[05][1-9][012]\d[/]\d{3,4}
\d{2}[05][1-9]3[01][/]\d{3,4}
\d{2}[16][012]{2}\d{4,5}
\d{2}[16][012]3[01]\d{3,4}
\d{2}[16][012]{2}\d[/]\d{3,4}
\d{2}[16][012]3[01][/]\d{3,4}
\d{2}[27][1-9][012]\d{5}
\d{2}[27][1-9]3[01]\d{4}
\d{2}[27][1-9][012]\d[/]\d{4}
\d{2}[27][1-9]3[01][/]\d{4}
\d{2}[38][012]{2}\d{5}
\d{2}[38][012]3[01]\d{4}
\d{2}[38][012]{2}\d[/]\d{4}
\d{2}[38][012]3[01][/]\d{4}
Library of system data identifiers 1120
Czech Republic Tax Identification Number
Czech Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{2}[05][1-9][012]\d{4,5}
\d{2}[05][1-9]3[01]\d{3,4}
\d{2}[05][1-9][012]\d[/]\d{3,4}
\d{2}[05][1-9]3[01][/]\d{3,4}
\d{2}[16][012]{2}\d{4,5}
\d{2}[16][012]3[01]\d{3,4}
\d{2}[16][012]{2}\d[/]\d{3,4}
\d{2}[16][012]3[01][/]\d{3,4}
\d{2}[27][1-9][012]\d{5}
\d{2}[27][1-9]3[01]\d{4}
\d{2}[27][1-9][012]\d[/]\d{4}
\d{2}[27][1-9]3[01][/]\d{4}
\d{2}[38][012]{2}\d{5}
\d{2}[38][012]3[01]\d{4}
\d{2}[38][012]{2}\d[/]\d{4}
\d{2}[38][012]3[01][/]\d{4}
Library of system data identifiers 1121
Czech Republic Value Added Tax (VAT) Number
Exclude ending characters Data ending with any of the following list of values is not
matched:
Czech Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
See “Czech Republic Value Added Tax (VAT) Number medium breadth” on page 1123.
■ The narrow breadth detects a 10- to 15-character alphanumeric pattern that matches the
Czech Value Added Tax (VAT) Number format with checksum validation. It checks for
common test patterns, and also requires the presence of related keywords.
See “Czech Republic Value Added Tax (VAT) Number narrow breadth” on page 1124.
Table 45-224 Czech Republic Value Added Tax (VAT) Number wide-breadth patterns
Pattern
[Cc][Zz]\d{8,13}
[Cc][Zz] \d{8,13}
Table 45-225 Czech Republic Value Added Tax (VAT) Number wide-breadth validators
Table 45-225 Czech Republic Value Added Tax (VAT) Number wide-breadth validators
(continued)
Exclude ending characters Data ending with any of the following list of values is not
matched:
Table 45-226 Czech Republic Value Added Tax (VAT) Number medium-breadth patterns
Pattern
[Cc][Zz]\d{8,13}
[Cc][Zz] \d{8,13}
Table 45-226 Czech Republic Value Added Tax (VAT) Number medium-breadth patterns
(continued)
Pattern
Table 45-227 Czech Republic Value Added Tax (VAT) Number medium-breadth validators
Czech Republic VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Table 45-228 Czech Republic Value Added Tax (VAT) Number narrow-breadth patterns
Pattern
[Cc][Zz]\d{8,13}
[Cc][Zz] \d{8,13}
Table 45-229 Czech Republic Value Added Tax (VAT) Number narrow-breadth validators
Table 45-229 Czech Republic Value Added Tax (VAT) Number narrow-breadth validators
(continued)
Exclude ending characters Data ending with any of the following list of values is not
matched:
Czech Republic VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Patterns
\d{6}[ -]\d{4}
\d{6}[ -]\l{4}
\d{10}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\d{6}[ -]\d{4}
\d{6}[ -]\l{4}
\d{10}
Denmark Personal Identification Number Checksum validator for the Denmark Personal
Validation Check Identification Number.
Patterns
\d{6}[ -]\d{4}
\d{6}[ -]\l{4}
\d{10}
Duplicate digits Ensures that a string of digits is not all the same.
Denmark Personal Identification Number Validation Checksum validator for the Denmark Personal Identification
Check Number.
Library of system data identifiers 1128
Denmark Tax Identification Number
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{6}-\d{4}
Library of system data identifiers 1129
Denmark Tax Identification Number
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{6}-\d{4}
Denmark Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{6}-\d{4}
Denmark Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Duplicate digits Ensures that a string of digits is not all the same.
Library of system data identifiers 1130
Denmark Value Added Tax (VAT) Number
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
sygesikring, Sundhedsforsikringsnummer,
sundhedskortnummer, sundhedskort,
REJSESYGESIKRINGSKORT,
Sundhedsforsikringskort, sygesikringkortnummer,
Krankenkassennummer, Gesundheitskarte Nummer,
ReisekrankenversicherungskarteNummer,
GesundheitsVersicherungkarte Nummer
See “Denmark Value Added Tax (VAT) Number narrow breadth” on page 1132.
Table 45-242 Denmark Value Added Tax (VAT) Number wide-breadth patterns
Patterns
[Dd][Kk]\d{8}
[Dd][Kk] \d{8}
[Dd][Kk] \d{3}-\d{3}-\d{2}
[Dd][Kk] \d{3}.\d{3}.\d{2}
[Dd][Kk]-\d{8}
[Dd][Kk] \d{3},\d{3},\d{2}
Table 45-243 Denmark Value Added Tax (VAT) Number wide-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Table 45-244 Denmark Value Added Tax (VAT) Number medium-breadth patterns
Patterns
[Dd][Kk]\d{8}
[Dd][Kk] \d{8}
Library of system data identifiers 1132
Denmark Value Added Tax (VAT) Number
Table 45-244 Denmark Value Added Tax (VAT) Number medium-breadth patterns (continued)
Patterns
[Dd][Kk] \d{3}-\d{3}-\d{2}
[Dd][Kk] \d{3}.\d{3}.\d{2}
[Dd][Kk]-\d{8}
[Dd][Kk] \d{3},\d{3},\d{2}
Table 45-245 Denmark Value Added Tax (VAT) Number medium-breadth validators
Denmark VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Table 45-246 Denmark Value Added Tax (VAT) Number narrow-breadth patterns
Patterns
[Dd][Kk]\d{8}
[Dd][Kk] \d{8}
[Dd][Kk] \d{3}-\d{3}-\d{2}
[Dd][Kk] \d{3}.\d{3}.\d{2}
[Dd][Kk]-\d{8}
[Dd][Kk] \d{3},\d{3},\d{2}
Table 45-247 Denmark Value Added Tax (VAT) Number narrow-breadth validators
Table 45-247 Denmark Value Added Tax (VAT) Number narrow-breadth validators (continued)
Exclude ending characters Data ending with any of the following list of values is not
matched:
Denmark VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
vat number, vat, vat#, vat no., value added tax number,
vat identification number
Pattern
\l\d{7}
Pattern
\l\d{7}
Find keywords With this option selected, at least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
driver license, drivers license, driver's license, driver licenses, drivers licenses,
driver's licenses, dl#, dls#, lic#, lics#
Find keywords With this option selected, at least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
■ The wide breadth detects any 13-character alphanumeric pattern with a letter followed by
12 numbers.
See “Driver's License Number- FL, MI, MN States wide breadth” on page 1135.
■ The medium breadth narrows the scope by requiring the presence keywords.
See “Driver's License Number- FL, MI, MN States medium breadth” on page 1135.
Table 45-251 Driver's License Number- FL, MI, MN States wide-breadth patterns
Patterns
\l\d{12}
\l\d{3}-\d{3}-\d{2}-\d{3}-\d
\l-\d{3}-\d{3}-\d{3}-\d{3}
Table 45-252 Driver's License Number- FL, MI, MN States medium-breadth patterns
Patterns
\l\d{12}
\l\d{3}-\d{3}-\d{2}-\d{3}-\d
Library of system data identifiers 1136
Driver's License Number - IL State
Table 45-252 Driver's License Number- FL, MI, MN States medium-breadth patterns
(continued)
Patterns
\l-\d{3}-\d{3}-\d{3}-\d{3}
Table 45-253 Driver's License Number- FL, MI, MN States medium-breadth validators
Find keywords Requires at least one of the input keywords or key phrases to be present for the
data to be matched.
Inputs:
Find keywords Requires at least one of the input keywords or key phrases to be present for the
data to be matched.
Inputs:
Patterns
\l\d{3}-\d{4}-\d{4}
\l\d{11}
Patterns
\l\d{3}-\d{4}-\d{4}
\l\d{11}
Find keywords Requires at least one of the input keywords or key phrases
to be present for the data to be matched.
Inputs:
Find keywords Requires at least one of the input keywords or key phrases
to be present for the data to be matched.
Inputs:
il, illinois
Library of system data identifiers 1138
Driver's License Number - NJ State
Note: The wide breadth option does not include any validators.
Patterns
\l\d{14}
Patterns
\l\d{3}-\d{4}-\d{4}
\l\d{11}
Library of system data identifiers 1139
Driver's License Number - NY State
Find keywords Requires at least one of the input keywords or key phrases
to be present for the data to be matched.
Inputs:
Find keywords Requires at least one of the input keywords or key phrases
to be present for the data to be matched.
Inputs:
Note: The wide breadth option does not include any validators.
Patterns
Patterns
\d{9}
Patterns
\d{9}
Find keywords Requires at least one of the input keywords or key phrases to be present for the
data to be matched.
Inputs:
Find keywords Requires at least one of the input keywords or key phrases to be present for the
data to be matched.
Inputs:
Pattern
\l{5}\l[A-Za-z*]\d{3}\w{2}
\l{4}[*]\l[A-Za-z*]\d{3}\w{2}
\l{3}[*]{2}\l[A-Za-z*]\d{3}\w{2}
\l{2}[*]{3}\l[A-Za-z*]\d{3}\w{2}
\l{1}[*]{4}\l[A-Za-z*]\d{3}\w{2}
The wide breadth of the Driver's License Number - WA State data identifier does not include
a validator.
Pattern
\l{5}\l[A-Za-z*]\d{3}\w{2}
\l{4}[*]\l[A-Za-z*]\d{3}\w{2}
\l{3}[*]{2}\l[A-Za-z*]\d{3}\w{2}
\l{2}[*]{3}\l[A-Za-z*]\d{3}\w{2}
\l{1}[*]{4}\l[A-Za-z*]\d{3}\w{2}
Library of system data identifiers 1142
Driver's License Number - WI State
Driver's License Number - WA State Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\l{5}\l[A-Za-z*]\d{3}\w{2}
\l{4}[*]\l[A-Za-z*]\d{3}\w{2}
\l{3}[*]{2}\l[A-Za-z*]\d{3}\w{2}
\l{2}[*]{3}\l[A-Za-z*]\d{3}\w{2}
\l{1}[*]{4}\l[A-Za-z*]\d{3}\w{2}
Driver's License Number - WA State Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
The Driver's License Number - WI State data identifier detects a 13-digit number that matches
the Driver's License Number - WI State format.
The Driver's License Number - WI State data identifier provides three breadths of detection.
■ The wide breadth detects a 13-digit number with ending-character exclusion validation.
See “ Driver's License Number - WI State wide breadth” on page 1143.
■ The wide breadth detects a 13-digit number with ending-character exclusion and checksum
validation.
See “Driver's License Number - WI State medium breadth” on page 1143.
■ The wide breadth detects a 13-digit number with ending-character exclusion and checksum
validation. It also requires the presence of related keywords.
See “Driver's License Number - WI State narrow breadth” on page 1144.
Pattern
\l\d{3}-\d{4}-\d{4}-\d{2}
\l\d{13}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
\l\d{3}-\d{4}-\d{4}-\d{2}
\l\d{13}
Driver's License Number - WI State Validation Check Computes the checksum and validates the pattern against
it.
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
\l\d{3}-\d{4}-\d{4}-\d{2}
\l\d{13}
Driver's License Number - WI State Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1145
Drug Enforcement Agency (DEA) Number
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[ABFGMPR]\l\d{7}
[ABFGMPR]\d{8}
The wide breadth of the Drug Enforcement Agency (DEA) Number data identifier includes no
validators.
Pattern
[ABFGMPR]\l\d{7}
[ABFGMPR]\d{8}
Drug Enforcement Agency Number Validation Check Computes the checksum and validates the pattern against
it.
Exclude ending characters Data ending with any of the following list of values is not
matched:
5555555, 55555555
Pattern
[ABFGMPR]\l\d{7}
[ABFGMPR]\d{8}
Library of system data identifiers 1147
Estonia Driver's Licence Number
Drug Enforcement Agency Number Validation Check Computes the checksum and validates the pattern against
it.
Exclude ending characters Data ending with any of the following list of values is not
matched:
5555555, 55555555
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[Ee][A-Za-z]\d{6}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[Ee][A-Za-z]\d{6}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
[Kk][A-Za-z]\d{7}
[Kk]\d{7}
[Vv][A-Za-z]\d{7}
[Vv]\d{7}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[Kk][A-Za-z]\d{7}
[Kk]\d{7}
[Vv][A-Za-z]\d{7}
[Vv]\d{7}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
\d{3}[01]\d[0123]\d{5}
\d \d{2}[01]\d[0123]\d \d{4}
\d \d{2}[01]\d[0123]\d{4} \d
Duplicate digits Ensures that a string of numbers is not all the same.
Pattern
\d{3}[01]\d[0123]\d{5}
\d \d{2}[01]\d[0123]\d \d{4}
\d \d{2}[01]\d[0123]\d{4} \d
Estonia Personal Identification Number Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1153
Estonia Value Added Tax (VAT) Number
Pattern
\d{3}[01]\d[0123]\d{5}
\d \d{2}[01]\d[0123]\d \d{4}
\d \d{2}[01]\d[0123]\d{4} \d
Duplicate digits Ensures that a string of numbers is not all the same.
Estonia Personal Identification Number Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
The Estonia Value Added Tax (VAT) Number data identifier detects an 11-character
alphanumeric pattern that matches the Estonia VAT Number format.
This data identifier provides the following breadths of detection:
■ The wide breadth detects an 11-character alphanumeric pattern that matches the Estonia
VAT Number format without checksum validation. It checks for common test patterns.
See “Estonia Value Added Tax (VAT) Number wide breadth” on page 1154.
■ The medium breadth detects an 11-character alphanumeric pattern that matches the Estonia
VAT Number format with checksum validation.
See “Estonia Value Added Tax (VAT) Number medium breadth” on page 1154.
■ The narrow breadth detects an 11-character alphanumeric pattern that matches the Estonia
VAT Number format with checksum validation. It checks for common test patterns, and
also requires the presence of related keywords.
See “Estonia Value Added Tax (VAT) Number narrow breadth” on page 1155.
Table 45-293 Estonia Value Added Tax (VAT) Number wide-breadth patterns
Pattern
[Ee][Ee]\d{9}
[Ee][Ee] \d{9}
Table 45-294 Estonia Value Added Tax (VAT) Number wide-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Table 45-295 Estonia Value Added Tax (VAT) Number medium-breadth patterns
Pattern
[Ee][Ee]\d{9}
[Ee][Ee] \d{9}
Table 45-296 Estonia Value Added Tax (VAT) Number medium-breadth validators
Estonia Value Added Tax (VAT) Number Validation Computes the checksum and validates the pattern against
Check it.
Table 45-297 Estonia Value Added Tax (VAT) Number narrow-breadth patterns
Pattern
[Ee][Ee]\d{9}
[Ee][Ee] \d{9}
Table 45-298 Estonia Value Added Tax (VAT) Number narrow-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Estonia Value Added Tax (VAT) Number Validation Computes the checksum and validates the pattern against
Check it.
Library of system data identifiers 1156
European Health Insurance Card Number
Table 45-298 Estonia Value Added Tax (VAT) Number narrow-breadth validators (continued)
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
80040\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80826\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
38500\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
Library of system data identifiers 1157
European Health Insurance Card Number
Table 45-299 European Health Insurance Card Number wide-breadth patterns (continued)
Pattern
80203\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
60189\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80246\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80276\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80300\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80021\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80380\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80440\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80442\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
30066\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80620\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80703\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80724\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80752\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80756\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80616\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
Table 45-300 European Health Insurance Card Number wide-breadth validators (continued)
Table 45-300 European Health Insurance Card Number wide-breadth validators (continued)
80040000000000000000, 80040111111111111111,
80040222222222222222, 80040333333333333333,
80040444444444444444, 80040555555555555555,
80040666666666666666, 80040777777777777777,
80040888888888888888, 80040999999999999999
80826000000000000000, 80826111111111111111,
80826222222222222222, 80826333333333333333,
80826444444444444444, 80826555555555555555,
80826666666666666666, 80826777777777777777,
80826888888888888888, 80826999999999999999
38500000000000000000, 38500111111111111111,
38500222222222222222, 38500333333333333333,
38500444444444444444, 38500555555555555555,
38500666666666666666, 38500777777777777777,
38500888888888888888, 38500999999999999999
80203000000000000000, 80203111111111111111,
80203222222222222222, 80203333333333333333,
80203444444444444444, 80203555555555555555,
80203666666666666666, 80203777777777777777,
80203888888888888888, 80203999999999999999
60189000000000000000, 60189111111111111111,
60189222222222222222, 60189333333333333333,
60189444444444444444, 60189555555555555555,
60189666666666666666, 60189777777777777777,
60189888888888888888, 60189999999999999999
80246000000000000000, 80246111111111111111,
80246222222222222222, 80246333333333333333,
80246444444444444444, 80246555555555555555,
80246666666666666666, 80246777777777777777,
80246888888888888888, 80246999999999999999
80276000000000000000, 80276111111111111111,
80276222222222222222, 80276333333333333333,
80276444444444444444, 80276555555555555555,
80276666666666666666, 80276777777777777777,
80276888888888888888, 80276999999999999999
80300000000000000000, 80300111111111111111,
80300222222222222222, 80300333333333333333,
Library of system data identifiers 1160
European Health Insurance Card Number
Table 45-300 European Health Insurance Card Number wide-breadth validators (continued)
80300444444444444444, 80300555555555555555,
80300666666666666666, 80300777777777777777,
80300888888888888888, 80300999999999999999
80021000000000000000, 80021111111111111111,
80021222222222222222, 80021333333333333333,
80021444444444444444, 80021555555555555555,
80021666666666666666, 80021777777777777777,
80021888888888888888, 80021999999999999999
80380000000000000000, 80380111111111111111,
80380222222222222222, 80380333333333333333,
80380444444444444444, 80380555555555555555,
80380666666666666666, 80380777777777777777,
80380888888888888888, 80380999999999999999
80440000000000000000, 80440111111111111111,
80440222222222222222, 80440333333333333333,
80440444444444444444, 80440555555555555555,
80440666666666666666, 80440777777777777777,
8440888888888888888, 80440999999999999999
80442000000000000000, 80442111111111111111,
80442222222222222222, 80442333333333333333,
80442444444444444444, 80442555555555555555,
80442666666666666666, 80442777777777777777,
80442888888888888888, 80442999999999999999
30066000000000000000, 30066111111111111111,
30066222222222222222, 30066333333333333333,
30066444444444444444, 30066555555555555555,
30066666666666666666, 30066777777777777777,
30066888888888888888, 30066999999999999999
Pattern
80040\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
Library of system data identifiers 1161
European Health Insurance Card Number
Table 45-301 European Health Insurance Card Number narrow-breadth patterns (continued)
Pattern
80826\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
38500\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80203\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
60189\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80246\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80276\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80300\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80021\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80380\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80440\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80442\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
30066\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80620\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80703\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80724\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80752\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80756\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
80616\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
Table 45-302 European Health Insurance Card Number narrow-breadth validators (continued)
Table 45-302 European Health Insurance Card Number narrow-breadth validators (continued)
80040000000000000000, 80040111111111111111,
80040222222222222222, 80040333333333333333,
80040444444444444444, 80040555555555555555,
80040666666666666666, 80040777777777777777,
80040888888888888888, 80040999999999999999
80826000000000000000, 80826111111111111111,
80826222222222222222, 80826333333333333333,
80826444444444444444, 80826555555555555555,
80826666666666666666, 80826777777777777777,
80826888888888888888, 80826999999999999999
38500000000000000000, 38500111111111111111,
38500222222222222222, 38500333333333333333,
38500444444444444444, 38500555555555555555,
38500666666666666666, 38500777777777777777,
38500888888888888888, 38500999999999999999
80203000000000000000, 80203111111111111111,
80203222222222222222, 80203333333333333333,
80203444444444444444, 80203555555555555555,
80203666666666666666, 80203777777777777777,
80203888888888888888, 80203999999999999999
60189000000000000000, 60189111111111111111,
60189222222222222222, 60189333333333333333,
60189444444444444444, 60189555555555555555,
60189666666666666666, 60189777777777777777,
60189888888888888888, 60189999999999999999
80246000000000000000, 80246111111111111111,
80246222222222222222, 80246333333333333333,
80246444444444444444, 80246555555555555555,
80246666666666666666, 80246777777777777777,
80246888888888888888, 80246999999999999999
80276000000000000000, 80276111111111111111,
80276222222222222222, 80276333333333333333,
80276444444444444444, 80276555555555555555,
80276666666666666666, 80276777777777777777,
80276888888888888888, 80276999999999999999
80300000000000000000, 80300111111111111111,
80300222222222222222, 80300333333333333333,
Library of system data identifiers 1164
European Health Insurance Card Number
Table 45-302 European Health Insurance Card Number narrow-breadth validators (continued)
80300444444444444444, 80300555555555555555,
80300666666666666666, 80300777777777777777,
80300888888888888888, 80300999999999999999
80021000000000000000, 80021111111111111111,
80021222222222222222, 80021333333333333333,
80021444444444444444, 80021555555555555555,
80021666666666666666, 80021777777777777777,
80021888888888888888, 80021999999999999999
80380000000000000000, 80380111111111111111,
80380222222222222222, 80380333333333333333,
80380444444444444444, 80380555555555555555,
80380666666666666666, 80380777777777777777,
80380888888888888888, 80380999999999999999
80440000000000000000, 80440111111111111111,
80440222222222222222, 80440333333333333333,
80440444444444444444, 80440555555555555555,
80440666666666666666, 80440777777777777777,
8440888888888888888, 80440999999999999999
80442000000000000000, 80442111111111111111,
80442222222222222222, 80442333333333333333,
80442444444444444444, 80442555555555555555,
80442666666666666666, 80442777777777777777,
80442888888888888888, 80442999999999999999
30066000000000000000, 30066111111111111111,
30066222222222222222, 30066333333333333333,
30066444444444444444, 30066555555555555555,
30066666666666666666, 30066777777777777777,
30066888888888888888, 30066999999999999999
Library of system data identifiers 1165
Finland Driver's Licence Number
Table 45-302 European Health Insurance Card Number narrow-breadth validators (continued)
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Patterns
\d{6}-\d{4}
\d{6}-\d{3}\l
Patterns
\d{6}-\d{4}
\d{6}-\d{3}\l
Finland Driver's Licence Number Validation Check Computes the checksum and validates the pattern against
it.
Patterns
\d{6}-\d{4}
\d{6}-\d{3}\l
Finland Driver's Licence Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
8024680246\d{10}
8024680246[- ]\d{10}
Exclude beginning characters Data beginning with any of the following list of values is
not matched:
80246802460000000000, 80246802461111111111,
80246802462222222222, 80246802463333333333,
80246802464444444444, 80246802465555555555,
80246802466666666666, 80246802467777777777,
80246802468888888888, 80246802469999999999
Patterns
8024680246\d{10}
8024680246[- ]\d{10}
Exclude beginning characters Data beginning with any of the following list of values is
not matched:
80246802460000000000, 80246802461111111111,
80246802462222222222, 80246802463333333333,
80246802464444444444, 80246802465555555555,
80246802466666666666, 80246802467777777777,
80246802468888888888, 80246802469999999999
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[A-Za-z]{2}\d{7}
Pattern
[A-Za-z]{2}\d{7}
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\d{6}[Aa+-]\d{3}\w
\d{7}[-]\d
Patterns
\d{6}[Aa+-]\d{3}\w
\d{7}[-]\d
Finland Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Patterns
\d{6}[Aa+-]\d{3}\w
\d{7}[-]\d
Library of system data identifiers 1173
Finland Value Added Tax (VAT) Number
Finland Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Table 45-323 Finland Value Added Tax (VAT) Number wide-breadth patterns
Patterns
[Ff][Ii]\d{8}
[Ff][Ii] \d{8}
[Ff][Ii]\d{7}-\d
[Ff][Ii] \d{7}-\d
Table 45-324 Finland Value Added Tax (VAT) Number wide-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Table 45-325 Finland Value Added Tax (VAT) Number medium-breadth patterns
Patterns
[Ff][Ii]\d{8}
[Ff][Ii] \d{8}
[Ff][Ii]\d{7}-\d
[Ff][Ii] \d{7}-\d
Table 45-326 Finland Value Added Tax (VAT) Number medium-breadth validator
Finland VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1175
Finnish Personal Identification Number
Table 45-327 Finland Value Added Tax (VAT) Number narrow-breadth patterns
Patterns
[Ff][Ii]\d{8}
[Ff][Ii] \d{8}
[Ff][Ii]\d{7}-\d
[Ff][Ii] \d{7}-\d
Table 45-328 Finland Value Added Tax (VAT) Number narrow-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Finland VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
The Finnish Personal Identification Number data identifier provides three breadths of detection:
■ The wide breadth detects a Finnish Personal Identification Number without validation.
See “ Finnish Personal Identification Number wide breadth” on page 1176.
■ The medium breadth detects a Finnish Personal Identification Number with checksum
validation.
See “Finnish Personal Identification Number medium breadth” on page 1176.
■ The narrow breadth detects a Finnish Personal Identification Number with checksum
validation. It also requires the presence of related keywords.
See “Finnish Personal Identification Number narrow breadth” on page 1176.
Pattern
\d{6}[-+Aa]\d{3}\w
The wide breadth of the Finnish Personal Identification Number wide breadth includes no
validators.
Pattern
\d{6}[-+Aa]\d{3}\w
Finnish Personal Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Pattern
\d{6}[-+Aa]\d{3}\w
Finnish Personal Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{12}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{12}
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
permis de conduire
Pattern
\d{10} \d{10} \d
Library of system data identifiers 1180
France Health Insurance Number
Pattern
\d{21}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{10} \d{10} \d
\d{21}
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
[0123]\d{12}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
[0123]\d{12}
Library of system data identifiers 1182
France Value Added Tax (VAT) Number
Patterns
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Table 45-346 France Value Added Tax (VAT) Number wide-breadth patterns
Patterns
[Ff][Rr][0-9A-Za-z]{2}\d{9}
[Ff][Rr][0-9A-Za-z]{2} \d{9}
[Ff][Rr] [0-9A-Za-z]{2}\d{9}
[Ff][Rr]-[0-9A-Za-z]{2}\d{9}
[Ff][Rr][0-9A-Za-z]{2} \d{3}-\d{3}-\d{3}
[Ff][Rr][0-9A-Za-z]{2} \d{3}.\d{3}.\d{3}
[Ff][Rr][0-9A-Za-z]{2} \d{3},\d{3},\d{3}
Table 45-347 France Value Added Tax (VAT) Number wide-breadth validator
Table 45-348 France Value Added Tax (VAT) Number medium breadth patterns
Patterns
[Ff][Rr][0-9A-Za-z]{2}\d{9}
[Ff][Rr][0-9A-Za-z]{2} \d{9}
[Ff][Rr] [0-9A-Za-z]{2}\d{9}
[Ff][Rr]-[0-9A-Za-z]{2}\d{9}
[Ff][Rr][0-9A-Za-z]{2} \d{3}-\d{3}-\d{3}
[Ff][Rr][0-9A-Za-z]{2} \d{3}.\d{3}.\d{3}
[Ff][Rr][0-9A-Za-z]{2} \d{3},\d{3},\d{3}
Table 45-349 France Value Added Tax (VAT) Number medium breadth validators
France VAT Number Validation Check Checksum validator for the France Value Added Tax (VAT
Number.
Table 45-350 France Value Added Tax (VAT) Number narrow-breadth patterns
Patterns
[Ff][Rr][0-9A-Za-z]{2}\d{9}
[Ff][Rr][0-9A-Za-z]{2} \d{9}
[Ff][Rr] [0-9A-Za-z]{2}\d{9}
[Ff][Rr]-[0-9A-Za-z]{2}\d{9}
[Ff][Rr][0-9A-Za-z]{2} \d{3}-\d{3}-\d{3}
[Ff][Rr][0-9A-Za-z]{2} \d{3}.\d{3}.\d{3}
[Ff][Rr][0-9A-Za-z]{2} \d{3},\d{3},\d{3}
Table 45-351 France Value Added Tax (VAT) Number narrow-breadth validators
France VAT Number Validation Check Checksum validator for the France Value Added Tax (VAT
Number.
Library of system data identifiers 1185
French INSEE Code
Table 45-351 France Value Added Tax (VAT) Number narrow-breadth validators (continued)
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\d{13} \d{2}
d{15}
INSEE Control Key This validator computes the INSEE control key and compares it to the last 2 digits
of the pattern.
Pattern
\d{13} \d{2}
d{15}
INSEE Control Key This validator computes the INSEE control key and
compares it to the last 2 digits of the pattern.
Inputs:
Pattern
\d\d[A-Za-z][A-za-z]\d\d\d\d\d
Pattern
\d\d[A-Za-z][A-za-z]\d\d\d\d\d
Library of system data identifiers 1188
French Social Security Number
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[12]\d{2}[012]\d{2}[AB1234567890]\d{8}
Library of system data identifiers 1189
French Social Security Number
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[12]\d{2}[012]\d{2}[AB1234567890]\d{8}
French Social Security Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[12]\d{2}[012]\d{2}[AB1234567890]\d{8}
Duplicate digits Ensures that a string of digits is not all the same.
French Social Security Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1190
German Passport Number
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\w{9}\dD
\w{10}[dD]
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\w{9}\dD
\w{10}[dD]
German Passport Number Validation Check Computes the checksum every German Passport Number
must pass.
Patterns
\w{9}\dD
\w{10}[dD]
Library of system data identifiers 1192
German Personal ID Number
Duplicate digits Ensures that a string of digits is not all the same.
German Passport Number Validation Check Computes the checksum every German Passport Number
must pass.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Pattern
\w{9}\dD
Library of system data identifiers 1193
German Personal ID Number
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\w{9}\dD
German ID Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\w{9}\dD
Duplicate digits Ensures that a string of digits is not all the same.
German ID Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1194
Germany Driver's License Number
Find keywords If you select this option, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\w\d{2}\w{6}\d\w
Library of system data identifiers 1195
Germany Driver's License Number
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\w\d{2}\w{6}\d\w
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Table 45-382 Germany Value Added Tax (VAT) Number wide-breadth patterns
Patterns
[Dd][Ee]\d{9}
[Dd][Ee] \d{9}
Table 45-383 Germany Value Added Tax (VAT) Number wide-breadth validator
Table 45-384 Germany Value Added Tax (VAT) Number medium-breadth patterns
Patterns
[Dd][Ee]\d{9}
[Dd][Ee] \d{9}
Table 45-385 Germany Value Added Tax (VAT) Number medium breadth validator
Germany VAT Number Validation Check Checksum validator for the Germany Value Added Tax
(VAT) Number.
Table 45-386 Germany Value Added Tax (VAT) Number narrow-breadth patterns
Patterns
[Dd][Ee]\d{9}
[Dd][Ee] \d{9}
Table 45-387 Germany Value Added Tax (VAT) Number narrow-breadth validators
Germany VAT Number Validation Check Checksum validator for the Germany Value Added Tax
(VAT) Number.
Library of system data identifiers 1198
Germany Tax Identification Number
Table 45-387 Germany Value Added Tax (VAT) Number narrow-breadth validators (continued)
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\d{11}
\d{2}-\d{3}-\d{3}-\d{3}
\d{2}.\d{3}.\d{3}.\d{3}
Library of system data identifiers 1199
Germany Tax Identification Number
Patterns
\d{2},\d{3},\d{3},\d{3}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\d{11}
\d{2}-\d{3}-\d{3}-\d{3}
\d{2}.\d{3}.\d{3}.\d{3}
\d{2},\d{3},\d{3},\d{3}
Germany Tax Number Validation Check Computes the checksum and validates the pattern against
it.
Patterns
\d{11}
\d{2}-\d{3}-\d{3}-\d{3}
\d{2}.\d{3}.\d{3}.\d{3}
\d{2},\d{3},\d{3},\d{3}
Germany Tax Number Validation Check Computes the checksum and validates the pattern against
it.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
■ The wide breadth detects a nine-character alphanumeric pattern that matches the Greece
Passport Number format. It checks for common test patterns.
See “Greece Passport Number wide breadth” on page 1201.
■ The narrow breadth detects a nine-character alphanumeric pattern that matches the Greece
Passport Number format. It checks for common test patterns, and also requires the presence
of related keywords.
See “Greece Passport Number narrow breadth” on page 1201.
Pattern
[a-zA-Z]{2}\d{7}
Exclude ending characters Data ending with any of the following list of values is not
matched:
0000000, 1111111, 2222222, 3333333, 4444444,
5555555, 6666666, 7777777, 8888888, 9999999
Pattern
[a-zA-Z]{2}\d{7}
Library of system data identifiers 1202
Greece Social Security Number (AMKA)
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
\d{11}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{11}
Greece Social Security Number (AMKA) Computes the checksum and validates the pattern against
it.
Pattern
\d{11}
Library of system data identifiers 1204
Greek Tax Identification Number
Greece Social Security Number (AMKA) Computes the checksum and validates the pattern against
it.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{9}
Greek Tax Identification Number Validation Check Computes Greek Tax Identification Number checksum
every Greek Tax Identification Number must pass.
Pattern
\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Library of system data identifiers 1206
Greece Value Added Tax (VAT) Number
Greek Tax Identification Number Validation Check Computes Greek Tax Identification Number checksum
every Greek Tax Identification Number must pass.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Table 45-410 Greece Value Added Tax (VAT) Number wide-breadth patterns
Pattern
[Ee][Ll]\d{9}
[Ee][Ll] \d{9}
Table 45-411 Greece Value Added Tax (VAT) Number wide-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Table 45-412 Greece Value Added Tax (VAT) Number medium-breadth patterns
Pattern
[Ee][Ll]\d{9}
[Ee][Ll] \d{9}
Table 45-413 Greece Value Added Tax (VAT) Number medium-breadth validators
Greece VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1208
Healthcare Common Procedure Coding System (HCPCS CPT Code)
Table 45-414 Greece Value Added Tax (VAT) Number narrow-breadth patterns
Pattern
[Ee][Ll]\d{9}
[Ee][Ll] \d{9}
Table 45-415 Greece Value Added Tax (VAT) Number narrow-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Greece VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
The Healthcare Common Procedure Coding System (HCPCS CPT Code) data identifier detects
a two- or five-character alphanumeric pattern that matches the HCPCS CPT Code format.
Healthcare Common Procedure Coding System (HCPCS CPT Code) data identifier provides
two breadths of detection:
■ The medium breadth detects a two- or five-character alphanumeric pattern with checksum
validation.
See “Healthcare Common Procedure Coding System (HCPCS CPT Code) medium breadth”
on page 1209.
■ The narrow breadth detects a two- or five-character alphanumeric pattern with checksum
validation. It also requires the presence of related keywords.
See “Healthcare Common Procedure Coding System (HCPCS CPT Code) narrow breadth”
on page 1210.
Table 45-416 Healthcare Common Procedure Coding System (HCPCS CPT Code)
medium-breadth patterns
[A][AD-KMO-Z1-9] [V][1-35-9P]
[B][ALOPRU] [X][EPSU]
[C][A-NPR-T] [Z][AB]
[D][A] [L]\d{4}
[E][1-4A-EJMPTXY] [A][04-9]\d{3}
[F][1-9A-CPX] [B][459][0-29]\d{2}
[G][1-9A-HJ-Z] [C][12589]\d{3}
[H][9A-Z] [E][0128]\d{3}
[J][1-4A-FW] [G][03689]\d{3}
[K][1-4A-Z] [H][0-2]0[0-5]\d
[Q][1-9C-HJ-NPSTW-Z] [J][0-37-9]\d{3}
Library of system data identifiers 1210
Healthcare Common Procedure Coding System (HCPCS CPT Code)
Table 45-416 Healthcare Common Procedure Coding System (HCPCS CPT Code)
medium-breadth patterns (continued)
[QK]0 [K][0][0-14-9]\d{2}
[L][1CDLMR-T] [M]0[013][067][01456]
[M][2S] [P][2379][06][0-7]\d
[N][BRU] [Q][0-59][01459]\d{2}
[P][1-6A-DIL-OST] [R]007[056]
[R][A-EIRT] [S][0-589]\d{3}
[S][A-HJ-NQS-Z] [T][1245][0159][0-49]\d
[T][1-9AC-HJ-NP-W] [V][25][0-7]\d{2}
[U][1-9A-HJKNP-S]
Table 45-417 Healthcare Common Procedure Coding System (HCPCS CPT Code)
medium-breadth validator
HCPCS CPT Code Validation Check Computes the checksum and validates the pattern against
it.
Table 45-418 Healthcare Common Procedure Coding System (HCPCS CPT Code)
narrow-breadth patterns
[A][AD-KMO-Z1-9] [V][1-35-9P]
[B][ALOPRU] [X][EPSU]
[C][A-NPR-T] [Z][AB]
[D][A] [L]\d{4}
Library of system data identifiers 1211
Healthcare Common Procedure Coding System (HCPCS CPT Code)
Table 45-418 Healthcare Common Procedure Coding System (HCPCS CPT Code)
narrow-breadth patterns (continued)
[E][1-4A-EJMPTXY] [A][04-9]\d{3}
[F][1-9A-CPX] [B][459][0-29]\d{2}
[G][1-9A-HJ-Z] [C][12589]\d{3}
[H][9A-Z] [E][0128]\d{3}
[J][1-4A-FW] [G][03689]\d{3}
[K][1-4A-Z] [H][0-2]0[0-5]\d
[Q][1-9C-HJ-NPSTW-Z] [J][0-37-9]\d{3}
[QK]0 [K][0][0-14-9]\d{2}
[L][1CDLMR-T] [M]0[013][067][01456]
[M][2S] [P][2379][06][0-7]\d
[N][BRU] [Q][0-59][01459]\d{2}
[P][1-6A-DIL-OST] [R]007[056]
[R][A-EIRT] [S][0-589]\d{3}
[S][A-HJ-NQS-Z] [T][1245][0159][0-49]\d
[T][1-9AC-HJ-NP-W] [V][25][0-7]\d{2}
[U][1-9A-HJKNP-S]
Table 45-419 Healthcare Common Procedure Coding System (HCPCS CPT Code)
narrow-breadth validators
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Table 45-419 Healthcare Common Procedure Coding System (HCPCS CPT Code)
narrow-breadth validators (continued)
HCPCS CPT Code Validation Check Computes the checksum and validates the pattern against
it.
Patterns
[a-zA-Z]{1,3}-\d{6}
[a-zA-Z]{1,3}-[0-8]\d{3}[1-9]\d{4}
[a-zA-Z]{1,3}-[0-8]\d{2}[1-9]\d{5}
Library of system data identifiers 1213
Health Insurance Claim Number
Patterns
[a-zA-Z]{1,3}-[0-8]\d{2}-\d{1}[1-9]-\d{4}
[a-zA-Z]{1,3}-[0-8]\d{2}-[1-9]\d{1}-\d{4}
[0-8]\d{3}[1-9]\d{4}-[a-zA-Z]{1,3}
[0-8]\d{2}[1-9]\d{5}-[a-zA-Z]{1,3}
[0-8]\d{2}-\d{1}[1-9]-\d{4}-[a-zA-Z]{1,3}
[0-8]\d{2}-[1-9]\d{1}-\d{4}-[a-zA-Z]{1,3}
[0-8]\d{2}[1-9]\d{1}\d{4}-[a-zA-Z][0-9]
Mandatory validator
Patterns
[a-zA-Z]{1,3}-\d{6}
[a-zA-Z]{1,3}-[0-8]\d{3}[1-9]\d{4}
[a-zA-Z]{1,3}-[0-8]\d{2}[1-9]\d{5}
[a-zA-Z]{1,3}-[0-8]\d{2}-\d{1}[1-9]-\d{4}
Patterns
[a-zA-Z]{1,3}-[0-8]\d{2}-[1-9]\d{1}-\d{4}
[0-8]\d{3}[1-9]\d{4}-[a-zA-Z]{1,3}
[0-8]\d{2}[1-9]\d{5}-[a-zA-Z]{1,3}
[0-8]\d{2}-\d{1}[1-9]-\d{4}-[a-zA-Z]{1,3}
[0-8]\d{2}-[1-9]\d{1}-\d{4}-[a-zA-Z]{1,3}
[0-8]\d{2}[1-9]\d{1}\d{4}-[a-zA-Z][0-9]
Mandatory validator
Health Care Insurance Number Check Computes the checksum and validates the pattern against
it.
Patterns
[a-zA-Z]{1,3}-\d{6}
[a-zA-Z]{1,3}-[0-8]\d{3}[1-9]\d{4}
[a-zA-Z]{1,3}-[0-8]\d{2}[1-9]\d{5}
[a-zA-Z]{1,3}-[0-8]\d{2}-\d{1}[1-9]-\d{4}
[a-zA-Z]{1,3}-[0-8]\d{2}-[1-9]\d{1}-\d{4}
Library of system data identifiers 1215
Hong Kong ID
Patterns
[0-8]\d{3}[1-9]\d{4}-[a-zA-Z]{1,3}
[0-8]\d{2}[1-9]\d{5}-[a-zA-Z]{1,3}
[0-8]\d{2}-\d{1}[1-9]-\d{4}-[a-zA-Z]{1,3}
[0-8]\d{2}-[1-9]\d{1}-\d{4}-[a-zA-Z]{1,3}
[0-8]\d{2}[1-9]\d{1}\d{4}-[a-zA-Z][0-9]
Mandatory validators
Health Care Insurance Number Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Hong Kong ID
The Hong Kong ID is the unique identifier for all residents of Hong Kong that appears on the
Hong Kong Identity Card.
The Hong Kong ID data identifier detects eight-character patterns that match the Hong Kong
ID format.
The Hong Kong ID data identifier provides two breadths of detection:
■ The wide breadth detects eight characters in the form LDDDDDD(D) or LDDDDDD(A). The
last character in the detected string is used to validate a checksum.
See “Hong Kong ID wide breadth” on page 1216.
Library of system data identifiers 1216
Hong Kong ID
■ The narrow breadth detects eight characters in the form LDDDDDD(D) or LDDDDDD(A).
The last character in the detected string is used to validate a checksum. It also requires
the presence of Hong Kong ID-related keywords.
See “Hong Kong ID narrow breadth” on page 1216.
Patterns
[A-Za-z]\d{6}(\d)
[A-Za-z][A-Za-z]\d{6}(\d)
[A-Za-z]\d{6}(A)
[A-Za-z]\d{6}(a)
[A-Za-z][A-Za-z]\d{6}(A)
[A-Za-z][A-Za-z]\d{6}(a)
[A-Za-z]\d{7}
[A-Za-z][A-Za-z]\d{7}
[A-Za-z]\d{6}[Aa]
[A-Za-z][A-Za-z]\d{6}[Aa]
Hong Kong ID Computes the checksum and validates the pattern against it.
Patterns
[A-Za-z]\d{6}(\d)
[A-Za-z][A-Za-z]\d{6}(\d)
[A-Za-z]\d{6}(A)
[A-Za-z]\d{6}(a)
[A-Za-z][A-Za-z]\d{6}(A)
[A-Za-z][A-Za-z]\d{6}(a)
[A-Za-z]\d{7}
[A-Za-z][A-Za-z]\d{7}
[A-Za-z]\d{6}[Aa]
[A-Za-z][A-Za-z]\d{6}[Aa]
Hong Kong ID Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
■ The wide breadth detects an eight-character alphanumeric pattern that matches the Hungary
Driver's Licence Number format. It checks for common test patterns.
See “Hungary Driver's Licence Number wide breadth” on page 1218.
■ The narrow breadth detects an eight-character alphanumeric pattern that matches the
Hungary Driver's Licence Number format. It checks for common test patterns, and it requires
the presence of related keywords.
See “Hungary Driver's Licence Number narrow breadth” on page 1218.
Pattern
[Cc][A-Za-z]\d{6}
Exclude ending characters Data ending with any of the following list of values is not
matched:
000000, 111111, 222222, 333333, 444444, 555555,
666666, 777777, 888888, 999999
Pattern
[Cc][A-Za-z]\d{6}
Library of system data identifiers 1219
Hungary Passport Number
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
[A-Za-z]{2}[0-9]{6}
[A-Za-z]{2}[0-9]{7}
Pattern
[A-Za-z]{2}[0-9]{6}
[A-Za-z]{2}[0-9]{7}
Hungary Passport Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[A-Za-z]{2}[0-9]{6}
[A-Za-z]{2}[0-9]{7}
Hungary Passport Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{9}
Hungarian Social Security Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{9}
Library of system data identifiers 1223
Hungarian Tax Identification Number
Duplicate digits Ensures that a string of digits is not all the same.
Hungarian Social Security Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[8]\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[8]\d{9}
Hungarian Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[8]\d{9}
Library of system data identifiers 1225
Hungarian VAT Number
Duplicate digits Ensures that a string of digits is not all the same.
Hungarian Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
HU\d{8}
hu\d{8}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
HU\d{8}
hu\d{8}
Hungarian VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Patterns
HU\d{8}
hu\d{8}
Duplicate digits Ensures that a string of digits is not all the same.
Hungarian VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
IBAN Central
The International Bank Account Number (IBAN) is an international standard for identifying
bank accounts across national borders.
The IBAN Central data identifier detects IBAN numbers for Andorra, Austria, Belgium, Germany,
Italy, Liechtenstein, Luxembourg, Malta, Monaco, San Marino, and Switzerland.
The IBAN West data identifier provides two breadths of detection:
■ The wide breadth detects a country-specific IBAN number with checksum validation.
See “IBAN Central wide breadth” on page 1228.
■ The narrow breadth detects a country-specific IBAN number with checksum validation. It
also requires the presence of related keywords.
See “IBAN Central narrow breadth” on page 1229.
Library of system data identifiers 1228
IBAN Central
Note: Do not add the NIB validation to any IBAN data identifiers that apply to DLP Agents. The
NIB validator is only for use with server-side detection.
Patterns Description
AD\d{2}-\d{4}-\d{4}-\w{4}-\w{4}-\w{4}
AT\d{2}-\d{4}-\d{4}-\d{4}-\d{4}
BE\d{2}-\d{4}-\d{4}-\d{4}
CH\d{2}-\d{4}-\d\w{3}-\w{4}-\w{4}-\w
DE\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{2}
IT\d{2}-[A-Z]\d{3}-\d{4}-\d{3}\w-\w{4}-\w{4}-\w{3}
LI\d{2}-\d{4}-\d\w{3}-\w{4}-\w{4}-\w
Library of system data identifiers 1229
IBAN Central
Patterns Description
LU\d{2}-\d{3}\w-\w{4}-\w{4}-\w{4}
MC\d{2}-\d{4}-\d{4}-\d{2}\w{2}-\w{4}-\w{4}-\w\d{2}
MT\d{2}-[A-Z]{4}-\d{4}-\d\w{3}-\w{4}-\w{4}-\w{4}-\w{3}
SM\d{2}-[A-Z]\d{3}-\d{4}-\d{3}\w-\w{4}-\w{4}-\w{3}
Validator Description
Mod 97 Validator Computes the ISO 7064 Mod 97-10 checksum of the
complete match.
Patterns Description
AD\d{2}-\d{4}-\d{4}-\w{4}-\w{4}-\w{4}
Library of system data identifiers 1230
IBAN Central
Patterns Description
AT\d{2}-\d{4}-\d{4}-\d{4}-\d{4}
BE\d{2}-\d{4}-\d{4}-\d{4}
CH\d{2}-\d{4}-\d\w{3}-\w{4}-\w{4}-\w
DE\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{2}
IT\d{2}-[A-Z]\d{3}-\d{4}-\d{3}\w-\w{4}-\w{4}-\w{3}
LI\d{2}-\d{4}-\d\w{3}-\w{4}-\w{4}-\w
LU\d{2}-\d{3}\w-\w{4}-\w{4}-\w{4}
MC\d{2}-\d{4}-\d{4}-\d{2}\w{2}-\w{4}-\w{4}-\w\d{2}
MT\d{2}-[A-Z]{4}-\d{4}-\d\w{3}-\w{4}-\w{4}-\w{4}-\w{3}
Library of system data identifiers 1231
IBAN East
Patterns Description
SM\d{2}-[A-Z]\d{3}-\d{4}-\d{3}\w-\w{4}-\w{4}-\w{3}
Validators Description
Mod 97 Validator Computes the ISO 7064 Mod 97-10 checksum of the
complete match.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
IBAN East
The International Bank Account Number (IBAN) is an international standard for identifying
bank accounts across national borders.
The IBAN East data identifier detects IBAN numbers for Bosnia, Bulgaria, Croatia, Cyprus,
Czech Republic, Estonia, Greece, Hungary, Israel, Latvia, Lithuania, Macedonia, Montenegro,
Poland, Romania, Serbia, Slovakia, Slovenia, Turkey, and Tunisia.
The IBAN West data identifier provides two breadths of detection:
■ The wide breadth detects a country-specific IBAN number with checksum validation.
See “IBAN East wide breadth” on page 1232.
■ The narrow breadth detects a country-specific IBAN number with checksum validation. It
also requires the presence of related keywords.
See “IBAN East narrow-breadth” on page 1234.
Note: Do not add the NIB validation to any IBAN data identifiers that apply to DLP Agents. The
NIB validator is only for use with server-side detection.
Library of system data identifiers 1232
IBAN East
Patterns Description
BA\d{2}-\d{4}-\d{4}-\d{4}-\d{4}
BG\d{2}-[A-Z]{4}-\d{4}-\d{2}\w{2}-\w{4}-\w{2}
CY\d{2}-\d{4}-\d{4}-\w{4}-\w{4}-\w{4}-\w{4}
CZ\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
EE\d{2}-\d{4}-\d{4}-\d{4}-\d{4}
GR\d{2}-\d{4}-\d{3}\w-\w{4}-\w{4}-\w{4}-\w{3}
HR\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d
HU\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
Library of system data identifiers 1233
IBAN East
Patterns Description
IL\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{3}
LT\d{2}-\d{4}-\d{4}-\d{4}-\d{4}
LV\d{2}-[A-Z]{4}-\w{4}-\w{4}-\w{4}-\w
ME\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{2}
MK\d{2}-\d{3}\w-\w{4}-\w{4}-\w\d{2}
PL\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
RO\d{2}-[A-Z]{4}-\w{4}-\w{4}-\w{4}-\w{4}
RS\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{2}
SI\d{2}-\d{4}-\d{4}-\d{4}-\d{3}
Library of system data identifiers 1234
IBAN East
Patterns Description
SK\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
TN59-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
TR\d{2}-\d{4}-\d\w{3}-\w{4}-\w{4}-\w{4}-\w{2}
Validator Description
Mod 97 Validator Computes the ISO 7064 Mod 97-10 checksum of the
complete match.
Patterns Description
BA\d{2}-\d{4}-\d{4}-\d{4}-\d{4}
BG\d{2}-[A-Z]{4}-\d{4}-\d{2}\w{2}-\w{4}-\w{2}
Library of system data identifiers 1235
IBAN East
Patterns Description
CY\d{2}-\d{4}-\d{4}-\w{4}-\w{4}-\w{4}-\w{4}
CZ\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
EE\d{2}-\d{4}-\d{4}-\d{4}-\d{4}
GR\d{2}-\d{4}-\d{3}\w-\w{4}-\w{4}-\w{4}-\w{3}
HR\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d
HU\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
IL\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{3}
LT\d{2}-\d{4}-\d{4}-\d{4}-\d{4}
LV\d{2}-[A-Z]{4}-\w{4}-\w{4}-\w{4}-\w
Library of system data identifiers 1236
IBAN East
Patterns Description
ME\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{2}
MK\d{2}-\d{3}\w-\w{4}-\w{4}-\w\d{2}
PL\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
RO\d{2}-[A-Z]{4}-\w{4}-\w{4}-\w{4}-\w{4}
RS\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{2}
SI\d{2}-\d{4}-\d{4}-\d{4}-\d{3}
SK\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
TN59-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
TR\d{2}-\d{4}-\d\w{3}-\w{4}-\w{4}-\w{4}-\w{2}
Library of system data identifiers 1237
IBAN West
Validators Description
Mod 97 Validator Computes the ISO 7064 Mod 97-10 checksum of the
complete match.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
IBAN West
The International Bank Account Number (IBAN) is an international standard for identifying
bank accounts across national borders.
The IBAN West data identifier detects IBAN numbers for Denmark, Faroe Islands, Finland,
France, Gibraltar, Greenland, Iceland, Ireland, Netherlands, Norway, Portugal, Spain, Sweden,
and the United Kingdom.
The IBAN West data identifier provides two breadths of detection:
■ The wide breadth detects a country-specific IBAN number with checksum validation.
See “IBAN West wide breadth” on page 1237.
■ The narrow breadth detects a country-specific IBAN number with checksum validation. It
also requires the presence of related keywords.
See “IBAN West narrow-breadth” on page 1239.
Note: Do not add the NIB validation to any IBAN data identifiers that apply to DLP Agents. The
NIB validator is only for use with server-side detection.
Patterns Description
DK\d{2}-\d{4}-\d{4}-\d{4}-\d{2}
ES\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
FI\d{2}-\d{4}-\d{4}-\d{4}-\d{2}
FO\d{2}-\d{4}-\d{4}-\d{4}-\d{2}
FR\d{2}-\d{4}-\d{4}-\d{2}\w{2}-\w{4}-\w{4}-\w\d{2}
GB\d{2}-[A-Z]{4}-\d{4}-\d{4}-\d{4}-\d{2}
GI\d{2}-[A-Z]{4}-\w{4}-\w{4}-\w{4}-\w{3}
GL\d{2}-\d{4}-\d{4}-\d{4}-\d{2}
IE\d{2}-[A-Z]{4}-\d{4}-\d{4}-\d{4}-\d{2}
Library of system data identifiers 1239
IBAN West
Patterns Description
IS\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}-\d{2}
NL\d{2}-[A-Z]{4}-\d{4}-\d{4}-\d{2}
NO\d{2}-\d{4}-\d{4}-\d{3}
PT\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}-\d
SE\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
Validator Description
Mod 97 Validator Computes the ISO 7064 Mod 97-10 checksum of the
complete match.
Patterns Description
DK\d{2}-\d{4}-\d{4}-\d{4}-\d{2}
ES\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
FI\d{2}-\d{4}-\d{4}-\d{4}-\d{2}
FO\d{2}-\d{4}-\d{4}-\d{4}-\d{2}
FR\d{2}-\d{4}-\d{4}-\d{2}\w{2}-\w{4}-\w{4}-\w\d{2}
GB\d{2}-[A-Z]{4}-\d{4}-\d{4}-\d{4}-\d{2}
GI\d{2}-[A-Z]{4}-\w{4}-\w{4}-\w{4}-\w{3}
GL\d{2}-\d{4}-\d{4}-\d{4}-\d{2}
IE\d{2}-[A-Z]{4}-\d{4}-\d{4}-\d{4}-\d{2}
Library of system data identifiers 1241
Iceland National Identification Number
Patterns Description
IS\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}-\d{2}
NL\d{2}-[A-Z]{4}-\d{4}-\d{4}-\d{2}
NO\d{2}-\d{4}-\d{4}-\d{3}
PT\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}-\d
SE\d{2}-\d{4}-\d{4}-\d{4}-\d{4}-\d{4}
Validators Description
Mod 97 Validator Computes the ISO 7064 Mod 97-10 checksum of the
complete match.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
Icelandic national identification numbers are issued to Icelandic citizens at birth and to foreign
nationals resident in Iceland upon registration. They are also issued to corporations and
institutions.
The Iceland National Identification Number data identifier detects a 10-digit number that
matches the Iceland National Identification Number format.
This data identifier provides the following breadths of detection:
■ The wide breadth detects a 10-digit number that matches the Iceland National Identification
Number format without checksum validation. It checks for common test numbers.
See “Iceland National Identification Number wide breadth” on page 1242.
■ The medium breadth detects a 10-digit number that matches the Iceland National
Identification Number format with checksum validation.
See “Iceland National Identification Number medium breadth” on page 1243.
■ The narrow breadth detects a 10-digit number that matches the Iceland National
Identification Number format with checksum validation. It checks for common test numbers,
and also requires the presence of related keywords.
See “Iceland National Identification Number narrow breadth” on page 1244.
Pattern
[04][1-9]0[1-9]\d{2}-\d{3}[09]
[1256][0-9]0[1-9]\d{2}-\d{3}[09]
[37][01]0[1-9]\d{2}-\d{3}[09]
[04][1-9]1[012]\d{2}-\d{3}[09]
[1256][0-9]1[012]\d{2}-\d{3}[09]
[37][01]1[012]\d{2}-\d{3}[09]
[04][1-9]0[1-9]\d{5}[09]
[1256][0-9]0[1-9]\d{5}[09]
[37][01]0[1-9]\d{5}[09]
[04][1-9]1[012]\d{5}[09]
Library of system data identifiers 1243
Iceland National Identification Number
Pattern
[1256][0-9]1[012]\d{5}[09]
[37][01]1[012]\d{5}[09]
Duplicate digits Ensures that a string of numbers is not all the same.
Pattern
[04][1-9]0[1-9]\d{2}-\d{3}[09]
[1256][0-9]0[1-9]\d{2}-\d{3}[09]
[37][01]0[1-9]\d{2}-\d{3}[09]
[04][1-9]1[012]\d{2}-\d{3}[09]
[1256][0-9]1[012]\d{2}-\d{3}[09]
[37][01]1[012]\d{2}-\d{3}[09]
[04][1-9]0[1-9]\d{5}[09]
[1256][0-9]0[1-9]\d{5}[09]
[37][01]0[1-9]\d{5}[09]
[04][1-9]1[012]\d{5}[09]
[1256][0-9]1[012]\d{5}[09]
[37][01]1[012]\d{5}[09]
Library of system data identifiers 1244
Iceland National Identification Number
Iceland National Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Pattern
[04][1-9]0[1-9]\d{2}-\d{3}[09]
[1256][0-9]0[1-9]\d{2}-\d{3}[09]
[37][01]0[1-9]\d{2}-\d{3}[09]
[04][1-9]1[012]\d{2}-\d{3}[09]
[1256][0-9]1[012]\d{2}-\d{3}[09]
[37][01]1[012]\d{2}-\d{3}[09]
[04][1-9]0[1-9]\d{5}[09]
[1256][0-9]0[1-9]\d{5}[09]
[37][01]0[1-9]\d{5}[09]
[04][1-9]1[012]\d{5}[09]
[1256][0-9]1[012]\d{5}[09]
[37][01]1[012]\d{5}[09]
Duplicate digits Ensures that a string of numbers is not all the same.
Library of system data identifiers 1245
Iceland Passport Number
Iceland National Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
[A-Za-z]\d{7}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[A-Za-z]\d{7}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Table 45-480 Iceland Value Added Tax (VAT) Number wide-breadth patterns
Pattern
[Ii][Ss] \d\d\d\d\d
[Ii][Ss] \d\d\d\d\d\d
Library of system data identifiers 1248
Iceland Value Added Tax (VAT) Number
Table 45-481 Iceland Value Added Tax (VAT) Number wide-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Table 45-482 Iceland Value Added Tax (VAT) Number narrow-breadth patterns
Pattern
[Ii][Ss] \d\d\d\d\d
[Ii][Ss] \d\d\d\d\d\d
Table 45-483 Iceland Value Added Tax (VAT) Number narrow-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Patterns
[2-9]\d{11}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
[2-9]\d{11}
Library of system data identifiers 1250
Indian Aadhaar Card Number
Patterns
Exclude ending characters Data ending with any of the following list of values is not
matched:
Verheoff validation check Computes the checksum and validates the pattern against
it.
Patterns
[2-9]\d{11}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Verheoff validation check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1251
Indian Permanent Account Number
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[A-Za-z]{3}[CPHFATBLJGcphfatbljg][A-Za-z]\d{4}[A-Za-z]
Duplicate digits Ensures that a string of digits is not all the same.
Library of system data identifiers 1252
India RuPay Card Number
Pattern
[A-Za-z]{3}[CPHFATBLJGcphfatbljg][A-Za-z]\d{4}[A-Za-z]
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
508[5-9]\d\d\d\d\d\d\d\d\d\d\d\d
607[0-8]\d\d\d\d\d\d\d\d\d\d\d\d
6079[0-8]\d\d\d\d\d\d\d\d\d\d\d
6069[89]\d\d\d\d\d\d\d\d\d\d\d
6521[5-9]\d\d\d\d\d\d\d\d\d\d\d
652[2345]\d\d\d\d\d\d\d\d\d\d\d\d
6531[0-4]\d\d\d\d\d\d\d\d\d\d\d
6530\d\d\d\d\d\d\d\d\d\d\d\d
608[0123]\d\d\d\d\d\d\d\d\d\d\d\d
6950\d\d\d\d\d\d\d\d\d\d\d\d
Duplicate digits Ensures that a string of numbers is not all the same.
Pattern
508[5-9]\d\d\d\d\d\d\d\d\d\d\d\d
607[0-8]\d\d\d\d\d\d\d\d\d\d\d\d
Library of system data identifiers 1254
India RuPay Card Number
Pattern
6079[0-8]\d\d\d\d\d\d\d\d\d\d\d
6069[89]\d\d\d\d\d\d\d\d\d\d\d
6521[5-9]\d\d\d\d\d\d\d\d\d\d\d
652[2345]\d\d\d\d\d\d\d\d\d\d\d\d
6531[0-4]\d\d\d\d\d\d\d\d\d\d\d
6530\d\d\d\d\d\d\d\d\d\d\d\d
608[0123]\d\d\d\d\d\d\d\d\d\d\d\d
6950\d\d\d\d\d\d\d\d\d\d\d\d
Luhn Check Computes the checksum and validates the pattern against
it.
Pattern
508[5-9]\d\d\d\d\d\d\d\d\d\d\d\d
607[0-8]\d\d\d\d\d\d\d\d\d\d\d\d
6079[0-8]\d\d\d\d\d\d\d\d\d\d\d
6069[89]\d\d\d\d\d\d\d\d\d\d\d
6521[5-9]\d\d\d\d\d\d\d\d\d\d\d
652[2345]\d\d\d\d\d\d\d\d\d\d\d\d
6531[0-4]\d\d\d\d\d\d\d\d\d\d\d
Library of system data identifiers 1255
Indonesian Identity Card Number
Pattern
6530\d\d\d\d\d\d\d\d\d\d\d\d
608[0123]\d\d\d\d\d\d\d\d\d\d\d\d
6950\d\d\d\d\d\d\d\d\d\d\d\d
Duplicate digits Ensures that a string of numbers is not all the same.
Luhn Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
■ The narrow breadth detects a 16-digit number that passes checksum validation. It also
requires the presence of related keywords.
See “Indonesian Identity Card Number narrow breadth” on page 1256.
Pattern
\d{2}[01237]\d{3}[01234567]\d[01]\d{7}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{2}[01237]\d{3}[01234567]\d[01]\d{7}
Indonesian Kartu Tanda Penduduk Validation Check Validator computes the checksum that every Indonesian
Kartu Tanda Penduduk must pass.
Pattern
\d{2}[01237]\d{3}[01234567]\d[01]\d{7}
Duplicate digits Ensures that a string of digits is not all the same.
Indonesian Kartu Tanda Penduduk Validation Check Validator computes the checksum that every Indonesian
Kartu Tanda Penduduk must pass.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
■ The narrow breadth detects a 15-digit number with duplicate digit and Luhn check validation.
It also requires the presence of related keywords.
See “International Mobile Equipment Identity Number narrow breadth” on page 1259.
Patterns
\d{15}
\d{2}-\d{6}-\d{6}-\d
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\d{15}
\d{2}-\d{6}-\d{6}-\d
Luhn Check Computes the Luhn checksum and validates the pattern
against it.
Exclude beginning characters Data beginning with any of the following list of values is
not matched:
000000000000000
Library of system data identifiers 1259
International Securities Identification Number
Patterns
\d{15}
\d{2}-\d{6}-\d{6}-\d
Luhn Check Computes the Luhn checksum and validates the pattern
against it.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
imei, IMEI, imei no, IMEI No, IMEI Number, imei number,
International Mobile Station Equipment Identity
Number, International Mobile Station Equipment
Identity
■ The narrow breadth detects a 12-character alphanumeric pattern with checksum validation.
It also requires the presence of related keywords.
See “International Securities Identification Number narrow breadth” on page 1260.
Pattern
\l{2}\w{9}\d
The wide breadth of the International Securities Identification Number includes no validators.
Pattern
\l{2}\w{9}\d
International Securities Identification Number Computes the checksum and validates the pattern against
Validation Check it.
Pattern
\l{2}\w{9}\d
Library of system data identifiers 1261
IP Address
International Securities Identification Number Computes the checksum and validates the pattern against
Validation Check it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
IP Address
An IP address is the computer networking code that is used to identify devices and facilitate
communications.
The IP Address data identifier detects IPv4 addresses.
This data identifier offers three breadths of detection:
■ The wide breadth detects IP addresses and validates their format.
See “IP Address wide breadth” on page 1261.
■ The medium breadth detects IP addresses, validates their format, and eliminates fictitious
addresses.
See “IP Address medium breadth” on page 1262.
■ The narrow breadth detects IP addresses, validates their format, and eliminates fictitious
and unassigned addresses.
See “IP Address narrow breadth” on page 1263.
Patterns
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[0-9]
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[1-2][0-9]?
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[3][0-2]?
IP Basic Check Every IP address must match the format x.x.x.x and every
number must be less than 256.
Patterns
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[0-9]
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[1-2][0-9]?
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[3][0-2]?
IP Octet Check Every IP address must match the format x.x.x.x, every number must be less than 256,
and no IP address can contain only single-digit numbers (1.1.1.2).
Library of system data identifiers 1263
IPv6 Address
Patterns
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[0-9]
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[1-2][0-9]?
\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3}/[3][0-2]?
IP Octet Check Every IP address must match the format x.x.x.x, every number must be less than 256,
and no IP address can contain only single-digit numbers (1.1.1.2).
IP Reserved Range Check Checks whether the IP address falls into any of the "Bogons" ranges. If so, the match
is invalid.
IPv6 Address
Internet Protocol version 6 (IPv6) is the latest version of the Internet Protocol (IP), the
communications protocol that provides an identification and location system for computers on
networks and routes traffic across the Internet.
The IPv6 Address data identifier detects IPv6 addresses.
This data identifier offers three breadths of detection:
■ The wide breadth detects IPv6 addresses and validates their format.
See “IPv6 Address wide breadth” on page 1264.
■ The medium breadth detects IPv6 addresses and validates their format. It also validates
that they do not begin with the numeral 0.
See “IPv6 Address medium breadth” on page 1264.
Library of system data identifiers 1264
IPv6 Address
■ The narrow breadth detects IPv6 addresses and validates their format. It also validates
that they do not begin with the numeral 0. Address strings are fully compressed, not
normalized.
See “IPv6 Address narrow breadth” on page 1265.
Patterns
[0-9A-Fa-f:./%][0-9A-Fa-f:./%]
[0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%]
[0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%]
[0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%]
[0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%]
[0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%]
Validator Description
IPv6 Address Basic Validation Check Checks every IPv6 address and verifies that they match
the xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx format.
Patterns
[0-9A-Fa-f:./%][0-9A-Fa-f:./%]
[0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%]
Library of system data identifiers 1265
IPv6 Address
Patterns
[0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%]
[0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%]
[0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%]
[0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%]
IPv6 Address Medium Checks every IPv6 address and verifies that they match the
Validation Check xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx format, and that addresses do not start with
the numeral 0.
Patterns
[0-9A-Fa-f:./%][0-9A-Fa-f:./%]
[0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%]
[0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%]
[0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%]
[0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%]
[0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%][0-9A-Fa-f:./%]
IPv6 Address Reserved Checks every IPv6 address and verifies that they match the
Validation Check xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx format, do not start with the numeral 0, and
are fully compressed.
Normalizer Description
Patterns
[a-zA-Z]{2}\d{7}
[a-zA-Z]\d{6}
Library of system data identifiers 1267
Ireland Passport Number
Patterns
[a-zA-Z]\d{8}
Patterns
[a-zA-Z]{2}\d{7}
[a-zA-Z]\d{6}
[a-zA-Z]\d{8}
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\d{7}[A-Wa-w]
\d{7} [A-Wa-w]
\d{7}[A-Wa-w][A-Ia-iWw]
\d{7} [A-Wa-w][A-Ia-iWw]
Patterns
[Cc][Hh][Yy]\d{3}
[Cc][Hh][Yy] \d{3}
[Cc][Hh][Yy]\d{4}
[Cc][Hh][Yy] \d{4}
[Cc][Hh][Yy]\d{5}
[Cc][Hh][Yy] \d{5}
Patterns
\d{7}[A-Wa-w]
\d{7} [A-Wa-w]
\d{7}[A-Wa-w][A-Ia-iWw]
\d{7} [A-Wa-w][A-Ia-iWw]
[Cc][Hh][Yy]\d{3}
Library of system data identifiers 1270
Ireland Tax Identification Number
Patterns
[Cc][Hh][Yy] \d{3}
[Cc][Hh][Yy]\d{4}
[Cc][Hh][Yy] \d{4}
[Cc][Hh][Yy]\d{5}
[Cc][Hh][Yy] \d{5}
Ireland Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Patterns
\d{7}[A-Wa-w]
\d{7} [A-Wa-w]
\d{7}[A-Wa-w][A-Ia-iWw]
\d{7} [A-Wa-w][A-Ia-iWw]
[Cc][Hh][Yy]\d{3}
Library of system data identifiers 1271
Ireland Value Added Tax (VAT) Number
Patterns
[Cc][Hh][Yy] \d{3}
[Cc][Hh][Yy]\d{4}
[Cc][Hh][Yy] \d{4}
[Cc][Hh][Yy]\d{5}
[Cc][Hh][Yy] \d{5}
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Ireland Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
The Ireland Value Added Tax (VAT) Number data identifier detects a 9- to 11-character
alphanumeric pattern that matches the Ireland Value Added Tax (VAT) Number format.
The Ireland Value Added Tax (VAT) Number data identifier provides three breadths of detection:
■ The wide breadth detects a 9- to 11-character alphanumeric pattern without checksum
validation.
See “Ireland Value Added Tax (VAT) Number wide breadth” on page 1272.
■ The medium breadth detects a 9- to 11-character alphanumeric pattern with checksum
validation.
See “Ireland Value Added Tax (VAT) Number medium breadth” on page 1273.
■ The narrow breadth detects a 9- to 11-character alphanumeric pattern with checksum
validation. It also requires the presence of related keywords.
See “Ireland Value Added Tax (VAT) Number narrow breadth” on page 1273.
Table 45-540 Ireland Value Added Tax (VAT) Number wide-breadth patterns
Patterns
[Ii][Ee]\d{7}[A-Wa-w]
[Ii][Ee] \d{7}[A-Wa-w]
[Ii][Ee]\d{7}[A-Wa-w][HhAa]
[Ii][Ee] \d{7}[A-Wa-w][HhAa]
[Ii][Ee][0-9][A-Za-z+*]\d{5}[A-Wa-w]
[Ii][Ee] [0-9][A-Za-z+*]\d{5}[A-Wa-w]
Table 45-541 Ireland Value Added Tax (VAT) Number wide-breadth validator
Table 45-542 Ireland Value Added Tax (VAT) Number medium-breadth patterns
Patterns
[Ii][Ee]\d{7}[A-Wa-w]
[Ii][Ee] \d{7}[A-Wa-w]
[Ii][Ee]\d{7}[A-Wa-w][HhAa]
[Ii][Ee] \d{7}[A-Wa-w][HhAa]
[Ii][Ee][0-9][A-Za-z+*]\d{5}[A-Wa-w]
[Ii][Ee] [0-9][A-Za-z+*]\d{5}[A-Wa-w]
Table 45-543 Ireland Value Added Tax (VAT) Number medium-breadth validator
Ireland VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Table 45-544 Ireland Value Added Tax (VAT) Number narrow-breadth patterns
Patterns
[Ii][Ee]\d{7}[A-Wa-w]
[Ii][Ee] \d{7}[A-Wa-w]
Table 45-544 Ireland Value Added Tax (VAT) Number narrow-breadth patterns (continued)
Patterns
[Ii][Ee]\d{7}[A-Wa-w][HhAa]
[Ii][Ee] \d{7}[A-Wa-w][HhAa]
[Ii][Ee][0-9][A-Za-z+*]\d{5}[A-Wa-w]
[Ii][Ee] [0-9][A-Za-z+*]\d{5}[A-Wa-w]
Table 45-545 Ireland Value Added Tax (VAT) Number narrow-breadth validators
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Ireland VAT Number Validation Check Computes the checksum and validates the pattern against
it.
■ The wide breadth detects an eight-character alphanumeric pattern ending with a letter
without checksum validation.
See “Irish Personal Public Service Number wide breadth” on page 1275.
■ The medium breadth detects an eight-character alphanumeric pattern ending with a letter
with checksum validation.
See “Irish Personal Public Service Number medium breadth” on page 1275.
■ The narrow breadth detects an eight-character alphanumeric pattern ending with a letter
that passes checksum validation. It also requires the presence of related keywords.
See “Irish Personal Public Service Number narrow breadth” on page 1276.
Pattern
\d{7}[a-wA-W]
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{7}[a-wA-W]
Irish Personal Public Service Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1276
Israel Personal Identification Number
Pattern
\d{7}[a-wA-W]
Duplicate digits Ensures that a string of digits is not all the same.
Irish Personal Public Service Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
■ The narrow breadth detects a nine-digit number with checksum validation. It also requires
the presence of related keywords.
See “Israel Personal Identification Number narrow breadth” on page 1277.
Pattern
\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{9}
Israeli Identity Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{9}
Israel Personal Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
هو ية اسرائيل ية, זהותישר אלית,מספר זיהוי ישר אלי,מספר זיה וי
عدد هوية فريدة من نوعها,رقم الهوية,هوية إسرائ يلية,عدد
Pattern
[A-Za-z][A-Za-z]\d{7}[A-Za-Z]
Pattern
[A-Za-z][A-Za-z]\d{7}[A-Za-Z]
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[A-Z]{6}[0-9LMNPQRSTUV]{2}[ABCDEHLMPRST][0-9LMNPQRSTUV]
{2}[A-Z][0-9LMNPQRSTUV]{3}[A-Z]
[0-9LMNPQRSTUV]{2} [A-Z][0-9LMNPQRSTUV]{3}[A-Z]
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Pattern
[A-Z]{6}[0-9LMNPQRSTUV]{2}[ABCDEHLMPRST][0-9LMNPQRSTUV]
{2}[A-Z][0-9LMNPQRSTUV]{3}[A-Z]
[0-9LMNPQRSTUV]{2} [A-Z][0-9LMNPQRSTUV]{3}[A-Z]
Codice Fiscale Control Key Check Computes the control key and checks if it is valid.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Pattern
\l{2}\d{7}
Pattern
\l{2}\d{7}
Library of system data identifiers 1283
Italy Value Added Tax (VAT) Number
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Table 45-570 Italy Value Added Tax (VAT) Number wide-breadth pattern
Pattern
[Ii][Tt]\d{11}
[Ii][Tt] \d{11}
[Ii][Tt].\d{11}
[Ii][Tt]-\d{11}
[Ii][Tt],\d{11}
Table 45-571 Italy Value Added Tax (VAT) Number wide-breadth validator
Table 45-572 Italy Value Added Tax (VAT) Number medium-breadth patterns
[Ii][Tt]\d{11}
[Ii][Tt] \d{11}
[Ii][Tt].\d{11}
[Ii][Tt]-\d{11}
[Ii][Tt],\d{11}
Table 45-573 Italy Value Added Tax (VAT) Number medium-breadth validator
Italy VAT Number Validation Check Checksum validator for the Italy Value Added Tax
(VAT) Number.
Library of system data identifiers 1285
Japan Driver's License Number
Table 45-574 Italy Value Added Tax (VAT) Number narrow-breadth patterns
Pattern
[Ii][Tt]\d{11}
[Ii][Tt] \d{11}
[Ii][Tt].\d{11}
[Ii][Tt]-\d{11}
[Ii][Tt],\d{11}
Table 45-575 Italy Value Added Tax (VAT) Number narrow-breadth validators
Italy VAT Number Validation Check Checksum validator for the Italy Value Added Tax (VAT)
Number.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{12}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{12}
Japan Driver's License Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{12}
Japan Driver's License Number Validation Check Computes the checksum and validates the pattern against
it.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
公安委員会,番号,免許,交付,運転免許,運転免許証,ドライ
バライセンス,ドライバーズライセンス,ライセンス,運転
免許証番号
Patterns
\l{2}\d{3}\l\d{2}\l\d
\l{2}\d{4}\l\d\l\d
\l\d{4}\l\d{2}\l\d
\l\d{4}\l\d{2}\l{2}\d
\l{2}\d{3}\l\d{2}\l{2}\d
\l{2}\d{8}
\l{2}\d{7}
\l\d{8}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\l{2}\d{3}\l\d{2}\l\d
\l{2}\d{4}\l\d\l\d
\l\d{4}\l\d{2}\l\d
\l\d{4}\l\d{2}\l{2}\d
\l{2}\d{3}\l\d{2}\l{2}\d
\l{2}\d{8}
\l{2}\d{7}
\l\d{8}
Library of system data identifiers 1289
Japanese Juki-Net Identification Number
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{11}
Library of system data identifiers 1290
Japanese Juki-Net Identification Number
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{11}
Japanese Juki-Net Id Validation Check Validator computes checksum number that every Japanese
Juki-net card number must pass.
Pattern
\d{11}
Duplicate digits Ensures that a string of digits is not all the same.
Japanese Juki-Net Id Validation Check Validator computes checksum number that every Japanese
Juki-net card number must pass..
Library of system data identifiers 1291
Japanese My Number - Corporate
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{13}
Library of system data identifiers 1292
Japanese My Number - Personal
Duplicate digits Ensures that a string of digits is not all the same.
Japanese My Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{13}
Duplicate digits Ensures that a string of digits is not all the same.
Japanese My Number Validation Check Computes the checksum and validates the pattern against
it.
Exclude beginning characters Data beginning with any of the following list of values is
not matched:
000000000000
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
マイナンバー, 共通番号
The Japanese My Number - Personal data identifier detects a 12-digit number that matches
the My Number - Personal format.
■ The wide breadth detects a 12-digit number with checksum validation.
See “Japanese My Number - Personal wide breadth” on page 1293.
■ The medium breadth detects a 12-digit number with checksum validation.
See “Japanese My Number - Personal medium breadth” on page 1293.
■ The narrow breadth detects a 12-digit number with checksum validation. It also requires
the presence of related keywords.
See “Japanese My Number - Personal narrow breadth” on page 1294.
Pattern
\d{12}
Japanese My Number Validation Check Computes the checksum and validates the pattern against
it.
Exclude beginning characters Data beginning with any of the following list of values is
not matched:
000000000000
Pattern
\d{12}
\d{4}-\d{4}-\d{4}
Library of system data identifiers 1294
Japanese My Number - Personal
Pattern
\d{4}.\d{4}.\d{4}
Japanese My Number Validation Check Computes the checksum and validates the pattern against
it.
Exclude beginning characters Data beginning with any of the following list of values is
not matched:
000000000000
Pattern
\d{12}
\d{4}-\d{4}-\d{4}
\d{4}.\d{4}.\d{4}
Japanese My Number Validation Check Computes the checksum and validates the pattern against
it.
Exclude beginning characters Data beginning with any of the following list of values is
not matched:
000000000000
Library of system data identifiers 1295
Kazakhstan Passport Number
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[A-Za-z]\d\d\d\d\d\d\d
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[A-Za-z]\d\d\d\d\d\d\d
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
The Korea Passport Number data identifier detects a valid Korean passport number.
The Korea Passport Number data identifier provides two breadths of detection:
■ The wide breadth detects a valid Korean Passport Number pattern.
See “Korea Passport Number wide breadth” on page 1297.
■ The narrow breadth detects a valid Korean Passport Number pattern. It also requires the
presence of related keywords.
See “Korea Passport Number narrow breadth” on page 1297.
Patterns
\l{2}\d{7}
\l\d{8}
\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\l{2}\d{7}
\l\d{8}
\d{9}
Library of system data identifiers 1298
Korea Residence Registration Number for Foreigners
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Table 45-610 Korea Residence Registration Number for Foreigners wide-breadth patterns
Patterns
\d{2}[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d{8}
\d\d[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d[ ]\d{7}
Table 45-611 Korea Residence Registration Number for Foreigners wide-breadth validators
Duplicate digits Ensures that a string of digits is not all the same.
Table 45-612 Korea Residence Registration Number for Foreigners medium-breadth patterns
Patterns
\d{2}[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d{8}
\d\d[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d[ ]\d{7}
Table 45-613 Korea Residence Registration Number for Foreigners medium-breadth validators
KRRN Foreign Validation Check Computes the checksum and validates the pattern against
it.
Table 45-614 Korea Residence Registration Number for Foreigners narrow-breadth patterns
Patterns
\d{2}[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d{8}
\d\d[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d[ ]\d{7}
Table 45-615 Korea Residence Registration Number for Foreigners narrow-breadth validators
Duplicate digits Ensures that a string of digits is not all the same.
KRRN Foreign Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
■ The narrow breadth detects a 13-digit number with checksum validation. It also requires
the presence of related keywords.
See “Korea Residence Registration Number for Korean narrow breadth” on page 1302.
Table 45-616 Korea Residence Registration Number for Korean wide-breadth patterns
Patterns
\d{2}[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d{8}
\d\d[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d[ ]\d{7}
Table 45-617 Korea Residence Registration Number for Korean wide-breadth validator
Duplicate digits Ensures that a string of digits is not all the same.
Table 45-618 Korea Residence Registration Number for Korean medium-breadth patterns
Patterns
\d{2}[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d{8}
\d\d[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d[ ]\d{7}
Table 45-619 Korea Residence Registration Number for Korean medium-breadth validators
Table 45-619 Korea Residence Registration Number for Korean medium-breadth validators
(continued)
Advanced KRRN Validation Validates that the third and fourth digits represent a valid
month, and that the fifth and sixth digits represent a valid
day. Validates the checksum of the pattern.
Table 45-620 Korea Residence Registration Number for Korean narrow-breadth patterns
Patterns
\d{2}[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d{8}
\d\d[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d[ ]\d{7}
Table 45-621 Korea Residence Registration Number for Korean narrow-breadth validators
Duplicate digits Ensures that a string of digits is not all the same.
Advanced KRRN Validation Validates that the third and fourth digits represent a valid
month, and that the fifth and sixth digits represent a valid
day. Validates the checksum of the pattern.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
주민등록번호, 주민번호
Pattern
[a-zA-Z]{2}\d{6}
[a-zA-Z]{2}\d{7}
[a-zA-Z]{3}\d{6}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[a-zA-Z]{2}\d{6}
[a-zA-Z]{2}\d{7}
[a-zA-Z]{3}\d{6}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
[Ll][A-Za-z]\d{7}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[Ll][A-Za-z]\d{7}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Patterns
\d{2}[01]\d{3}-[012]\d{4}
\d{2}[01]\d{3}[012]\d{4}
32\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\d{2}[01]\d{3}-[012]\d{4}
\d{2}[01]\d{3}[012]\d{4}
32\d{9}
Latvia Personal Code Check Computes the checksum and validates the pattern against
it.
Patterns
\d{2}[01]\d{3}-[012]\d{4}
\d{2}[01]\d{3}[012]\d{4}
32\d{9}
Latvia Personal Code Check Computes the checksum and validates the pattern against
it.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
■ The wide breadth detects a 13-character alphanumeric pattern beginning with LV that
matches the Latvia VAT Number format without checksum validation. It checks for common
test patterns.
See “Latvia Value Added Tax (VAT) Number wide breadth” on page 1309.
■ The medium breadth detects a 13-character alphanumeric pattern beginning with LV that
matches the Latvia VAT Number format with checksum validation.
See “Latvia Value Added Tax (VAT) Number medium breadth” on page 1309.
■ The narrow breadth detects a 13-character alphanumeric pattern beginning with LV that
matches the Latvia VAT Number format with checksum validation. It checks for common
test patterns, and also requires the presence of related keywords.
See “Latvia Value Added Tax (VAT) Number narrow breadth” on page 1310.
Table 45-636 Latvia Value Added Tax (VAT) Number wide-breadth patterns
Pattern
[Ll][Vv]\d{11}
[Ll][Vv] \d{11}
Table 45-637 Latvia Value Added Tax (VAT) Number wide-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Table 45-638 Latvia Value Added Tax (VAT) Number medium-breadth patterns
Pattern
[Ll][Vv]\d{11}
[Ll][Vv] \d{11}
Table 45-639 Latvia Value Added Tax (VAT) Number medium-breadth validators
Latvia Value Added Tax (VAT) Number Validation Computes the checksum and validates the pattern against
Check it.
Table 45-640 Latvia Value Added Tax (VAT) Number narrow-breadth patterns
Pattern
[Ll][Vv]\d{11}
[Ll][Vv] \d{11}
Table 45-641 Latvia Value Added Tax (VAT) Number narrow-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Latvia Value Added Tax (VAT) Number Validation Computes the checksum and validates the pattern against
Check it.
Library of system data identifiers 1311
Liechtenstein Passport Number
Table 45-641 Latvia Value Added Tax (VAT) Number narrow-breadth validators (continued)
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
[a-zA-Z]\d\d\d\d\d
Library of system data identifiers 1312
Lithuania Personal Identification Number
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[a-zA-Z]\d\d\d\d\d
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
where identification is required, as well as for digital signatures using the national identity card
and its associated certificates.
The Lithuania Personal Identification Number data identifier detects an 11-digit number that
matches the Lithuania Personal Identification Number format.
This data identifier provides the following breadths of detection:
■ The wide breadth detects an 11-digit number that matches the Lithuania Personal
Identification Number format without checksum validation. It checks for common test
numbers.
See “Lithuania Personal Identification Number wide breadth” on page 1313.
■ The medium breadth detects an 11-digit number that matches the Lithuania Personal
Identification Number format with checksum validation.
See “Lithuania Personal Identification Number medium breadth” on page 1314.
■ The narrow breadth detects an 11-digit number that matches the Lithuania Personal
Identification Number format with checksum validation. It checks for common test numbers,
and also requires the presence of related keywords.
See “Lithuania Personal Identification Number narrow breadth” on page 1314.
Pattern
\d{3}[01]\d[0123]\d{5}
\d \d{2}[01]\d[0123]\d \d{4}
\d{3}[01]\d[0123]\d{4} \d
Duplicate digits Ensures that a string of digits is not all the same.
Library of system data identifiers 1314
Lithuania Personal Identification Number
Pattern
\d{3}[01]\d[0123]\d{5}
\d \d{2}[01]\d[0123]\d \d{4}
\d{3}[01]\d[0123]\d{4} \d
Estonia Personal Identification Number Check Computes the checksum and validates the pattern against
it.
Pattern
\d{3}[01]\d[0123]\d{5}
\d \d{2}[01]\d[0123]\d \d{4}
\d{3}[01]\d[0123]\d{4} \d
Duplicate digits Ensures that a string of digits is not all the same.
Estonia Personal Identification Number Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1315
Lithuania Tax Identification Number
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
[1-6]\d{2}[01]\d[0123]\d{5}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[1-6]\d{2}[01]\d[0123]\d{5}
Lithuania Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[1-6]\d{2}[01]\d[0123]\d{5}
Library of system data identifiers 1317
Lithuania Value Added Tax (VAT) Number
Duplicate digits Ensures that a string of digits is not all the same.
Lithuania Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
tax identification no., TIN, tin, TIN#, tin#, tin no., tax
identification number, tin no, tax id, tax id no, tax id
no., taxid, taxid#, tax number, tax no, tax#, Tax
Identification Number
Table 45-658 Lithuania Value Added Tax (VAT) Number wide-breadth patterns
Pattern
[Ll][Tt]\d{7}[1]\d
[Ll][Tt] \d{7}[1]\d
[Ll][Tt]\d{10}[1]\d
[Ll][Tt] \d{10}[1]\d
Table 45-659 Lithuania Value Added Tax (VAT) Number wide-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Table 45-660 Lithuania Value Added Tax (VAT) Number medium-breadth patterns
Pattern
[Ll][Tt]\d{7}[1]\d
[Ll][Tt] \d{7}[1]\d
[Ll][Tt]\d{10}[1]\d
[Ll][Tt] \d{10}[1]\d
Library of system data identifiers 1319
Lithuania Value Added Tax (VAT) Number
Table 45-661 Lithuania Value Added Tax (VAT) Number medium-breadth validators
Lithuania Value Added Tax (VAT) Number Validation Computes the checksum and validates the pattern against
Check it.
Table 45-662 Lithuania Value Added Tax (VAT) Number narrow-breadth patterns
Pattern
[Ll][Tt]\d{7}[1]\d
[Ll][Tt] \d{7}[1]\d
[Ll][Tt]\d{10}[1]\d
[Ll][Tt] \d{10}[1]\d
Table 45-663 Lithuania Value Added Tax (VAT) Number narrow-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Lithuania Value Added Tax (VAT) Number Validation Computes the checksum and validates the pattern against
Check it.
Library of system data identifiers 1320
Luxembourg National Register of Individuals Number
Table 45-663 Lithuania Value Added Tax (VAT) Number narrow-breadth validators (continued)
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
\d{11}
Library of system data identifiers 1321
Luxembourg National Register of Individuals Number
Duplicate digits Ensures that a string of digits is not all the same.
Table 45-666 Luxembourg National Register of Individuals Number medium breadth patterns
Pattern
\d{11}
Table 45-667 Luxembourg National Register of Individuals Number medium breadth validator
Luxembourg National Register of Individuals Number Computes the checksum and validates the pattern against
Validation Check it.
Table 45-668 Luxembourg National Register of Individuals Number narrow breadth patterns
Pattern
\d{11}
Table 45-669 Luxembourg National Register of Individuals Number narrow breadth validator
Duplicate digits Ensures that a string of digits is not all the same.
Luxembourg National Register of Individuals Number Computes the checksum and validates the pattern against
Validation Check it.
Library of system data identifiers 1322
Luxembourg Passport Number
Table 45-669 Luxembourg National Register of Individuals Number narrow breadth validator
(continued)
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\l\w{5}[0-9]
Library of system data identifiers 1323
Luxembourg Passport Number
Patterns
\l\w{5}[0-9][0-9A-Za-z]
Patterns
\l\w{5}[0-9]
\l\w{5}[0-9][0-9A-Za-z]
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
[1][89]\d{2}[01]\d[0123]\d\d{5}
[1][89]\d{2}[01]\d[0123]\d \d{5}
[1][89]\d{2}[01]\d[0123]\d-\d{5}
[1][89]\d{2}[01]\d[0123]\d,\d{5}
[1][89]\d{2}[01]\d[0123]\d.\d{5}
[2][0]\d{2}[01]\d[0123]\d\d{5}
[2][0]\d{2}[01]\d[0123]\d \d{5}
[2][0]\d{2}[01]\d[0123]\d-\d{5}
[2][0]\d{2}[01]\d[0123]\d,\d{5}
[2][0]\d{2}[01]\d[0123]\d.\d{5}
\d{11}
Library of system data identifiers 1325
Luxembourg Tax Identification Number
Patterns
\d{2}-\d{3}-\d{3}-\d{3}
\d{2}.\d{3}.\d{3}.\d{3}
\d{2},\d{3},\d{3},\d{3}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
[1][89]\d{2}[01]\d[0123]\d\d{5}
[1][89]\d{2}[01]\d[0123]\d \d{5}
[1][89]\d{2}[01]\d[0123]\d-\d{5}
[1][89]\d{2}[01]\d[0123]\d,\d{5}
[1][89]\d{2}[01]\d[0123]\d.\d{5}
[2][0]\d{2}[01]\d[0123]\d\d{5}
[2][0]\d{2}[01]\d[0123]\d \d{5}
[2][0]\d{2}[01]\d[0123]\d-\d{5}
[2][0]\d{2}[01]\d[0123]\d,\d{5}
[2][0]\d{2}[01]\d[0123]\d.\d{5}
\d{11}
Library of system data identifiers 1326
Luxembourg Tax Identification Number
Patterns
\d{2}-\d{3}-\d{3}-\d{3}
\d{2}.\d{3}.\d{3}.\d{3}
\d{2},\d{3},\d{3},\d{3}
Luxembourg Tax Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Patterns
[1][89]\d{2}[01]\d[0123]\d\d{5}
[1][89]\d{2}[01]\d[0123]\d \d{5}
[1][89]\d{2}[01]\d[0123]\d-\d{5}
[1][89]\d{2}[01]\d[0123]\d,\d{5}
[1][89]\d{2}[01]\d[0123]\d.\d{5}
[2][0]\d{2}[01]\d[0123]\d\d{5}
[2][0]\d{2}[01]\d[0123]\d \d{5}
[2][0]\d{2}[01]\d[0123]\d-\d{5}
[2][0]\d{2}[01]\d[0123]\d,\d{5}
[2][0]\d{2}[01]\d[0123]\d.\d{5}
\d{11}
Library of system data identifiers 1327
Luxembourg Value Added Tax (VAT) Number
Patterns
\d{2}-\d{3}-\d{3}-\d{3}
\d{2}.\d{3}.\d{3}.\d{3}
\d{2},\d{3},\d{3},\d{3}
Duplicate digits Ensures that a string of digits is not all the same.
Luxembourg Tax Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Sozialunterstützung, Sozialversécherung
The Luxembourg Value Added Tax (VAT) Number data identifier detects an eight-character
alphanumeric pattern that matches the Luxembourg Value Added Tax (VAT) Number format.
The Luxembourg Value Added Tax (VAT) Number provides three breadths of detecion:
■ The wide breadth detects an eight-character alphanumeric pattern beginning with LU without
checksum validation.
See “Luxembourg Value Added Tax (VAT) Number wide breadth” on page 1328.
■ The medium breadth detects an eight-character alphanumeric pattern beginning with LU
with checksum validation.
See “Luxembourg Value Added Tax (VAT) Number medium breadth” on page 1329.
■ The narrow breadth detects an eight-character alphanumeric pattern beginning with LU
with checksum validation. It also requires the presence of related keywords.
See “Luxembourg Value Added Tax (VAT) Number narrow breadth” on page 1329.
Table 45-680 Luxembourg Value Added Tax (VAT) Number wide-breadth patterns
Patterns
[Lu][Uu]\d{8}
[Lu][Uu] \d{8}
[Lu][Uu]-\d{8}
[Lu][Uu] \d{4}-\d{4}
[Lu][Uu] \d{4}.\d{4}
[Lu][Uu] \d{4},\d{4}
Table 45-681 Luxembourg Value Added Tax (VAT) Number wide-breadth validators
Table 45-681 Luxembourg Value Added Tax (VAT) Number wide-breadth validators (continued)
Exclude ending characters Data ending with any of the following list of values is not
matched:
Table 45-682 Luxembourg Value Added Tax (VAT) Number medium-breadth patterns
Patterns
[Lu][Uu]\d{8}
[Lu][Uu] \d{8}
[Lu][Uu]-\d{8}
[Lu][Uu] \d{4}-\d{4}
[Lu][Uu] \d{4}.\d{4}
[Lu][Uu] \d{4},\d{4}
Table 45-683 Luxembourg Value Added Tax (VAT) Number medium-breadth validator
Luxembourg VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Table 45-684 Luxembourg Value Added Tax (VAT) Number narrow-breadth patterns
Patterns
[Lu][Uu]\d{8}
[Lu][Uu] \d{8}
[Lu][Uu]-\d{8}
[Lu][Uu] \d{4}-\d{4}
[Lu][Uu] \d{4}.\d{4}
[Lu][Uu] \d{4},\d{4}
Table 45-685 Luxembourg Value Added Tax (VAT) Number narrow-breadth validatos
Luxembourg VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Exclude ending characters Data ending with any of the following list of values is not
matched:
00000000, 11111111, 22222222, 33333333, 44444444,
55555555, 66666666, 77777777, 88888888, 99999999
Library of system data identifiers 1331
Macau National Identification Number
Table 45-685 Luxembourg Value Added Tax (VAT) Number narrow-breadth validatos
(continued)
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
1\d\d\d\d\d\d(\d)
5\d\d\d\d\d\d(\d)
7\d\d\d\d\d\d(\d)
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
1\d\d\d\d\d\d(\d)
5\d\d\d\d\d\d(\d)
7\d\d\d\d\d\d(\d)
Duplicate digits Ensures that a string of digits is not all the same.
Library of system data identifiers 1333
Malaysia Passport Number
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
身份证号码, 唯一的识别号码
Pattern
[AaHhKk]\d\d\d\d\d\d\d\d
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[AaHhKk]\d\d\d\d\d\d\d\d
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Patterns
\d{12}
Library of system data identifiers 1336
Malaysian MyKad Number (MyKad)
Patterns
\d{6}-\d{2}-\d{4}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\d{12}
\d{6}-\d{2}-\d{4}
Malaysian My Kad Number Validation Check Computes the checksum and validates the pattern against
it.
Patterns
\d{12}
\d{6}-\d{2}-\d{4}
Library of system data identifiers 1337
Malta National Identification Number
Duplicate digits Ensures that a string of digits is not all the same.
Malaysian MyKad Number Validation Check Validator computes checksum number that every
Malaysian MyKad Number must Computes the checksum
and validates the pattern against it.pass.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{6}[1-9][APap]
[012]\d{6}[MGLHBZmglhbz]
[3][01]\d{5}[MGLHBZmglhbz]
32000\d{2}[MGLHBZmglhbz]
Exclude beginning characters Data beginning with any of the following list of values is
not matched:
Pattern
\d{6}[1-9][APap]
[012]\d{6}[MGLHBZmglhbz]
[3][01]\d{5}[MGLHBZmglhbz]
32000\d{2}[MGLHBZmglhbz]
Library of system data identifiers 1339
Malta Tax Identification Number
Exclude beginning characters Data beginning with any of the following list of values is
not matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
\d{6}[1-9][APap]
[012]\d{6}[MGLHBZmglhbz]
[3][01]\d{5}[MGLHBZmglhbz]
32000\d{2}[MGLHBZmglhbz]
[1]{2}\d{7}
[2]{2}\d{7}
[3]{2}\d{7}
[4]{2}\d{7}
[5]{2}\d{7}
[6]{2}\d{7}
[7]{2}\d{7}
[8]{2}\d{7}
Exclude beginning characters Data beginning with any of the following list of values is
not matched:
Pattern
\d{6}[1-9][APap]
[012]\d{6}[MGLHBZmglhbz]
[3][01]\d{5}[MGLHBZmglhbz]
32000\d{2}[MGLHBZmglhbz]
[1]{2}\d{7}
[2]{2}\d{7}
[3]{2}\d{7}
[4]{2}\d{7}
[5]{2}\d{7}
[6]{2}\d{7}
[7]{2}\d{7}
[8]{2}\d{7}
Exclude beginning characters Data beginning with any of the following list of values is
not matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Table 45-708 Malta Value Added Tax (VAT) Number wide-breadth patterns
Pattern
[Mm][Tt]\d{8}
\d{4}[-]\d{4}
Table 45-709 Malta Value Added Tax (VAT) Number wide-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Table 45-710 Malta Value Added Tax (VAT) Number medium-breadth patterns
Pattern
[Mm][Tt]\d{8}
\d{4}[-]\d{4}
Malta Value Added Tax (VAT) Number Validation Check Computes the checksum and validates the pattern against
it.
Table 45-712 Malta Value Added Tax (VAT) Number narrow-breadth patterns
Pattern
[Mm][Tt]\d{8}
\d{4}[-]\d{4}
Table 45-713 Malta Value Added Tax (VAT) Number narrow-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Malta Value Added Tax (VAT) Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
[1-9][A-Za-z][0-9A-Za-z][0-9][A-Za-z][0-9A-Za-z][0-9][A-Za-z]{2}[0-9]{2}
Mandatory validator
Pattern
[1-9][A-Za-z][0-9A-Za-z][0-9][A-Za-z][0-9A-Za-z][0-9][A-Za-z]{2}[0-9]{2}
Mandatory validator
Medicare Beneficiary Identifier Number Validation Computes the checksum and validates the pattern against
Check it.
Pattern
[1-9][A-Za-z][0-9A-Za-z][0-9][A-Za-z][0-9A-Za-z][0-9][A-Za-z]{2}[0-9]{2}
Mandatory validators
Medicare Beneficiary Identifier Number Validation Computes the checksum and validates the pattern against
Check it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Table 45-720 Mexican Personal Registration and Identification Number wide-breadth pattern
Pattern
\d{2}-\d{3}-\d{2}-\d{7}-\w
Table 45-721 Mexican Personal Registration and Identification Number wide-breadth validator
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
\d{2}-\d{3}-\d{2}-\d{7}-\w
Exclude ending characters Data ending with any of the following list of values is not
matched:
Mexican CRIP Validation Check Computes the checksum for the match and validates the
pattern against it.
Pattern
\d{2}-\d{3}-\d{2}-\d{7}-\w
Exclude ending characters Data ending with any of the following list of values is not
matched:
00000000000000, 11111111111111, 22222222222222,
33333333333333, 44444444444444, 55555555555555,
66666666666666, 77777777777777, 88888888888888,
99999999999999
Mexican CRIP Validation Check Computes the checksum for every number matched and
validates the pattern against it.
Library of system data identifiers 1349
Mexican Tax Identification Number
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
[a-zA-Z][a-zA-Z][a-zA-Z][a-zA-Z]\d\d[01]\d[0-3]\d\w\w\w
[a-zA-Z][a-zA-Z][a-zA-Z][a-zA-Z][- ]\d\d[01]\d[0-3]\d\w\w\w
[a-zA-Z][a-zA-Z][a-zA-Z]\d\d[01]\d[0-3]\d\w\w\w
[a-zA-Z][a-zA-Z][a-zA-Z][- ]\d\d[01]\d[0-3]\d\w\w\w
Patterns
[a-zA-Z][a-zA-Z][a-zA-Z][a-zA-Z]\d\d[01]\d[0-3]\d\w\w\w
[a-zA-Z][a-zA-Z][a-zA-Z][a-zA-Z][- ]\d\d[01]\d[0-3]\d\w\w\w
[a-zA-Z][a-zA-Z][a-zA-Z]\d\d[01]\d[0-3]\d\w\w\w
[a-zA-Z][a-zA-Z][a-zA-Z][- ]\d\d[01]\d[0-3]\d\w\w\w
Mexican TAX ID Validation Check Computes the checksum and validates the pattern against
it.
Patterns
[a-zA-Z][a-zA-Z][a-zA-Z][a-zA-Z]\d\d[01]\d[0-3]\d\w\w\w
[a-zA-Z][a-zA-Z][a-zA-Z][a-zA-Z][- ]\d\d[01]\d[0-3]\d\w\w\w
Library of system data identifiers 1351
Mexican Unique Population Registry Code
Patterns
[a-zA-Z][a-zA-Z][a-zA-Z]\d\d[01]\d[0-3]\d\w\w\w
[a-zA-Z][a-zA-Z][a-zA-Z][- ]\d\d[01]\d[0-3]\d\w\w\w
Mexican TAX ID Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
See “ Mexican Unique Population Registry Code narrow breadth” on page 1352.
Pattern
\w[AEIOUaeiou]\w{2}\d{2}[0-1]\d[0-3]\d[HMhm]\w{7}
Pattern
\w[AEIOUaeiou]\w{2}\d{2}[0-1]\d[0-3]\d[HMhm]\w{7}
Mexican Personal ID Code Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\w[AEIOUaeiou]\w{2}\d{2}[0-1]\d[0-3]\d[HMhm]\w{7}
Mexican Personal ID Code Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1353
Mexico CLABE Number
Table 45-735 Mexican Unique Population Registry Code narrow-breadth validators (continued)
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{18}
Library of system data identifiers 1354
Mexico CLABE Number
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{18}
Mexico CLABE Number Validation Check Computes the checksum and validates the pattern against
it.
Exclude beginning characters Data beginning with any of the following list of values is
not matched:
555555555555555555
Pattern
\d{18}
Mexico CLABE Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1355
National Drug Code (NDC)
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
*?\d{4}-\d{4}-\d{2}
\d{5}-*?\d{3}-\d{2}
\d{5}-\d{4}-*?\d
\d{5}-\d{4}-\d{2}
Note: The medium breadth of this data identifier does not include any validators.
Pattern
*?\d{4}-\d{4}-\d{2}
\d{5}-*?\d{3}-\d{2}
\d{5}-\d{4}-*?\d
\d{5}-\d{4}-\d{2}
This data identifier also detects the HIPAA format, an 11-digit number in the format 5-4-2. The
HIPAA format may include a single asterisk to represent a missing digit. This data identifier
also requires the presence of an NDC-related keyword.
Pattern
*?\d{4}-\d{4}-\d{2}
\d{5}-*?\d{3}-\d{2}
\d{5}-\d{4}-*?\d
\d{5}-\d{4}-\d{2}
Find keywords With this option selected, at least one of the following keywords or key phrases
must be present for the data to be matched.
Pattern
\d{10}
80840\d{10}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{10}
80840\d{10}
National Provider Identifier Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{10}
80840\d{10}
Library of system data identifiers 1359
Netherlands Bank Account Number
National Provider Identifier Number Validation Check Computes the checksum and validates the pattern against
it.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[PpGg]\d\d\d\d\d\d\d
\d\d\d\d\d\d\d\d\d\d
\d\d\d\d\d\d\d\d\d
Duplicate digits Ensures that a string of digits is not all the same.
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[PpGg]\d\d\d\d\d\d\d
\d\d\d\d\d\d\d\d\d\d
\d\d\d\d\d\d\d\d\d
Library of system data identifiers 1361
Netherlands Bank Account Number
Netherlands Bank Account Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[PpGg]\d\d\d\d\d\d\d
\d\d\d\d\d\d\d\d\d\d
\d\d\d\d\d\d\d\d\d
Duplicate digits Ensures that a string of digits is not all the same.
Exclude ending characters Data ending with any of the following list of values is not
matched:
Netherlands Bank Account Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
\d{10}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{10}
Library of system data identifiers 1363
Netherlands Passport Number
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\w{9}
Library of system data identifiers 1364
Netherlands Tax Identification Number
Pattern
\w{9}
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
■ The narrow breadth detects a nine-digit number with checksum validation. It also requires
the presence of related keywords.
See “Netherlands Tax Identification Number narrow breadth” on page 1366.
Pattern
\d{9}
\d{3}-\d{3}-\d{3}
\d{3}.\d{3}.\d{3}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{9}
\d{3}-\d{3}-\d{3}
\d{3}.\d{3}.\d{3}
Dutch Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{9}
\d{3}-\d{3}-\d{3}
\d{3}.\d{3}.\d{3}
Duplicate digits Ensures that a string of digits is not all the same.
Dutch Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1367
Netherlands Value Added Tax (VAT) Number
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
See “Netherlands Value Added Tax (VAT) Number wide breadth” on page 1368.
■ The medium breadth detects a 14-character alphanumeric pattern beginning with NL, with
checksum validation.
See “Netherlands Value Added Tax (VAT) Number medium breadth” on page 1368.
■ The narrow breadth detects a 14-character alphanumeric pattern beginning with NL, with
checksum validation. It also requires the presence of related keywords.
See “Netherlands Value Added Tax (VAT) Number narrow breadth” on page 1369.
Table 45-772 Netherlands Value Added Tax (VAT) Number wide-breadth patterns
Pattern
[Nn][Ll]\d{9}[Bb]\d{2}
[Nn][Ll]-\d{9}-[Bb]\d{2}
[Nn][Ll].\d{9}.[Bb]\d{2}
Table 45-773 Netherlands Value Added Tax (VAT) Number wide-breadth validator
Table 45-774 Netherlands Value Added Tax (VAT) Number medium-breadth patterns
Pattern
[Nn][Ll]\d{9}[Bb]\d{2}
[Nn][Ll]-\d{9}-[Bb]\d{2}
Table 45-774 Netherlands Value Added Tax (VAT) Number medium-breadth patterns
(continued)
Pattern
[Nn][Ll].\d{9}.[Bb]\d{2}
Table 45-775 Netherlands Value Added Tax (VAT) Number medium breadth validator
Netherlands VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Table 45-776 Netherlands Value Added Tax (VAT) Number narrow-breadth patterns
Pattern
[Nn][Ll]\d{9}[Bb]\d{2}
[Nn][Ll]-\d{9}-[Bb]\d{2}
[Nn][Ll].\d{9}.[Bb]\d{2}
Table 45-777 Netherlands Value Added Tax (VAT) Number narrow-breadth validators
Netherlands VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[a-zA-Z][a-zA-Z]\d\d\d\d\d\d
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[a-zA-Z][a-zA-Z]\d\d\d\d\d\d
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
raihana taraiwa
Table 45-782 New Zealand National Health Index Number wide-breadth pattern
Pattern
\l{3}\d{4}
Table 45-783 New Zealand National Health Index Number medium-breadth pattern
Pattern
\l{3}\d{4}
Table 45-784 New Zealand National Health Index Number medium-breadth validators
New Zealand National Health Index Number Validation Computes the checksum and validates the pattern against
Check it.
Table 45-785 New Zealand National Health Index Number narrow-breadth patterns
Pattern
\l{3}\d{4}
Library of system data identifiers 1373
New Zealand Passport Number
Table 45-786 New Zealand National Health Index Number narrow-breadth validators
New Zealand National Health Index Number Validation Computes the checksum and validates the pattern against
Check it.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[Ll][Aa]\d\d\d\d\d\d
[Ll][Dd]\d\d\d\d\d\d
[Ll][Ff]\d\d\d\d\d\d
[Nn]\d\d\d\d\d\d
[Ee][Aa]\d\d\d\d\d\d
[Ll][Hh]\d\d\d\d\d\d
[Ee][Pp]\d\d\d\d\d\d
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[Ll][Aa]\d\d\d\d\d\d
[Ll][Dd]\d\d\d\d\d\d
[Ll][Ff]\d\d\d\d\d\d
[Nn]\d\d\d\d\d\d
[Ee][Aa]\d\d\d\d\d\d
Library of system data identifiers 1375
Norway Driver's Licence Number
Pattern
[Ll][Hh]\d\d\d\d\d\d
[Ee][Pp]\d\d\d\d\d\d
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
Duplicate digits Ensures that a string of digits is not all the same.
Library of system data identifiers 1377
Norway National Identification Number
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
førerkort, førerkortnummer
Pattern
[0123]\d[01]\d\d\d\d\d\d\d\d
[89]\d\d\d\d\d\d\d\d\d\d
[89]\d\d\d\d\d\d\d\d
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[0123]\d[01]\d\d\d\d\d\d\d\d
[89]\d\d\d\d\d\d\d\d\d\d
[89]\d\d\d\d\d\d\d\d
Norway National Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Library of system data identifiers 1379
Norway Value Added Tax Number
Pattern
[0123]\d[01]\d\d\d\d\d\d\d\d
[89]\d\d\d\d\d\d\d\d\d\d
[89]\d\d\d\d\d\d\d\d
Duplicate digits Ensures that a string of digits is not all the same.
Norway National Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
The Norway Value Added Tax Number data identifier detects an 11- or 14-character
alphanumeric pattern that matches the Norway Value Added Tax Number format.
This data identifier provides the following breadths of detection:
■ The wide breadth detects an 11- or 14-character alphanumeric pattern that matches the
Norway Value Added Tax Number format without checksum validation. It checks for common
test patterns.
See “Norway Value Added Tax Number wide breadth” on page 1380.
■ The medium breadth detects an 11- or 14-character alphanumeric pattern that matches
the Norway Value Added Tax Number format with checksum validation.
See “Norway Value Added Tax Number medium breadth” on page 1381.
■ The narrow breadth detects an 11- or 14-character alphanumeric pattern that matches the
Norway Value Added Tax Number format with checksum validation. It checks for common
test patterns, and also requires the presence of related keywords.
See “Norway Value Added Tax Number narrow breadth” on page 1381.
Pattern
[Nn][Oo]\d\d\d-\d\d\d-\d\d\d
[Nn][Oo]\d\d\d\d\d\d\d\d\d[Mm][Vv][Aa]
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[Nn][Oo]\d\d\d-\d\d\d-\d\d\d
[Nn][Oo]\d\d\d\d\d\d\d\d\d[Mm][Vv][Aa]
Norway Value Added Tax (VAT) Number Check Computes the checksum and validates the pattern against
it.
Pattern
[Nn][Oo]\d\d\d-\d\d\d-\d\d\d
[Nn][Oo]\d\d\d\d\d\d\d\d\d[Mm][Vv][Aa]
Exclude ending characters Data ending with any of the following list of values is not
matched:
Table 45-806 Norway Value Added Tax Number narrow-breadth validators (continued)
Norway Value Added Tax (VAT) Number Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
[01234567]\d[012345]\d[56789]\d[567]\d{4}
Library of system data identifiers 1383
Norwegian Birth Number
Pattern
[01234567]\d[012345]\d\d\d[01234]\d{4}
[01234567]\d[012345]\d[456789]\d[9]\d{4}
[01234567]\d[012345]\d[0123]\d[56789]\d{4}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[01234567]\d[012345]\d[56789]\d[567]\d{4}
[01234567]\d[012345]\d\d\d[01234]\d{4}
[01234567]\d[012345]\d[456789]\d[9]\d{4}
[01234567]\d[012345]\d[0123]\d[56789]\d{4}
Norwegian Birth Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[01234567]\d[012345]\d[56789]\d[567]\d{4}
[01234567]\d[012345]\d\d\d[01234]\d{4}
[01234567]\d[012345]\d[456789]\d[9]\d{4}
[01234567]\d[012345]\d[0123]\d[56789]\d{4}
Duplicate digits Ensures that a string of digits is not all the same.
Norwegian Birth Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{18}
\d{17}[Xx]
China ID checksum validator Computes the checksum and validates the pattern against
it.
Table 45-815
Pattern
\d{18}
\d{17}[Xx]
Table 45-816
Mandatory validator Description
China ID checksum validator Computes the checksum and validates the pattern
against it.
Library of system data identifiers 1386
Poland Driver's Licence Number
Inputs:
身份证,居民信息,居民身份信息
Pattern
\d{5}\/\d{2}\/\d{4}
Library of system data identifiers 1387
Poland European Health Insurance Number
Duplicate digits Ensures that a string of numbers is not all the same.
Pattern
\d{5}\/\d{2}\/\d{4}
Duplicate digits Ensures that a string of numbers is not all the same.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
80616000\d{2}\d{10}
Exclude beginning characters Data beginning with any of the following list of values is
not matched:
80616000000000000000, 80616000111111111111,
80616000222222222222, 80616000333333333333,
80616000444444444444, 80616000555555555555,
80616000666666666666, 80616000777777777777,
80616000888888888888, 80616000999999999999
Pattern
80616000\d{2}\d{10}
Exclude beginning characters Data beginning with any of the following list of values is
not matched:
80616000000000000000, 80616000111111111111,
80616000222222222222, 80616000333333333333,
80616000444444444444, 80616000555555555555,
80616000666666666666, 80616000777777777777,
80616000888888888888, 80616000999999999999
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
■ The narrow breadth detects a nine-character alphanumeric pattern that matches the Poland
Passport Number format. It checks for common test patterns, and also requires the presence
of related keywords.
See “Poland Passport Number narrow breadth” on page 1390.
Pattern
[a-zA-Z]{2}\d{7}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[a-zA-Z]{2}\d{7}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Table 45-829 Poland Value Added Tax (VAT) Number wide-breadth patterns
Pattern
[Pp][Ll]\d{10}
[Pp][Ll] \d{10}
[Pp][Ll]\d{3}-\d{3}-\d{2}-\d{2}
[Pp][Ll]\d{3}-\d{2}-\d{2}-\d{3}
[Pp][Ll] \d{3}-\d{3}-\d{2}-\d{2}
[Pp][Ll] \d{3}-\d{2}-\d{2}-\d{3}
Table 45-830 Poland Value Added Tax (VAT) Number wide-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Table 45-831 Poland Value Added Tax (VAT) Number medium-breadth patterns
Pattern
[Pp][Ll]\d{10}
[Pp][Ll] \d{10}
[Pp][Ll]\d{3}-\d{3}-\d{2}-\d{2}
[Pp][Ll]\d{3}-\d{2}-\d{2}-\d{3}
Library of system data identifiers 1393
Poland Value Added Tax (VAT) Number
Table 45-831 Poland Value Added Tax (VAT) Number medium-breadth patterns (continued)
Pattern
[Pp][Ll] \d{3}-\d{3}-\d{2}-\d{2}
[Pp][Ll] \d{3}-\d{2}-\d{2}-\d{3}
Table 45-832 Poland Value Added Tax (VAT) Number medium-breadth validators
Poland VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Table 45-833 Poland Value Added Tax (VAT) Number narrow-breadth patterns
Pattern
[Pp][Ll]\d{10}
[Pp][Ll] \d{10}
[Pp][Ll]\d{3}-\d{3}-\d{2}-\d{2}
[Pp][Ll]\d{3}-\d{2}-\d{2}-\d{3}
[Pp][Ll] \d{3}-\d{3}-\d{2}-\d{2}
[Pp][Ll] \d{3}-\d{2}-\d{2}-\d{3}
Table 45-834 Poland Value Added Tax (VAT) Number narrow-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Table 45-834 Poland Value Added Tax (VAT) Number narrow-breadth validators (continued)
Poland VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
[A-Z]{3}\d{6}
Library of system data identifiers 1395
Polish Identification Number
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[A-Z]{3}\d{6}
Polish ID Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[A-Z]{3}\d{6}
Duplicate digits Ensures that a string of digits is not all the same.
Polish ID Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1396
Polish REGON Number
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\d{14}
\d{9}-\d{5}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\d{14}
\d{9}-\d{5}
Polish REGON Number Validation Check Computes the checksum and validates the pattern against
it.
Patterns
\d{14}
\d{9}-\d{5}
Library of system data identifiers 1398
Polish Social Security Number (PESEL)
Duplicate digits Ensures that a string of digits is not all the same.
Polish REGON Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{2}[012389]\d[0-3]\d{6}
Duplicate digits Ensures that a string of digits is not all the same.
Table 45-849 Polish Social Security Number (PESEL) medium breadth pattern
Pattern
\d{2}[012389]\d[0-3]\d{6}
Table 45-850 Polish Social Security Number (PESEL) medium breadth validators
Polish Social Security Number Validation Check Computes the checksum and validates the pattern against
it.
Table 45-851 Polish Social Security Number (PESEL) narrow breadth patterns
Pattern
\d{2}[012389]\d[0-3]\d{6}
Library of system data identifiers 1400
Polish Tax Identification Number
Table 45-852 Polish Social Security Number (PESEL) narrow breadth validator
Duplicate digits Ensures that a string of digits is not all the same.
Polish Social Security Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{10}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{10}
Polish Social Security Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{10}
Duplicate digits Ensures that a string of digits is not all the same.
Polish Tax ID Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
[A-Za-z]{2}-\d{5,6} \d
[A-Za-z]-\d{6,8} \d
Patterns
[A-Za-z]{2}-\d{5,6} \d
[A-Za-z]-\d{6,8} \d
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\d{8}
\d{7} \d
\d{7}-\d
\d{9}
\d{9}\l{2}\d
\d{8} \d
\d{8}-\d
\d{8} \d \l{2}\d
\d{8}-\d-\l{2}\d
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\d{8}
\d{7} \d
\d{7}-\d
Library of system data identifiers 1406
Portugal National Identification Number
Patterns
\d{9}
\d{9}\l{2}\d
\d{8} \d
\d{8}-\d
\d{8} \d \l{2}\d
\d{8}-\d-\l{2}\d
Portugal National Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Patterns
\d{8}
\d{7} \d
\d{7}-\d
\d{9}
\d{9}\l{2}\d
\d{8} \d
\d{8}-\d
\d{8} \d \l{2}\d
\d{8}-\d-\l{2}\d
Library of system data identifiers 1407
Portugal Passport Number
Portugal National Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[a-zA-Z]\d{6}
Pattern
[a-zA-Z]\d{6}
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\d{9}
\d{3}-\d{3}-\d{3}
\d{3}.\d{3}.\d{3}
\d{3}.\d{3}.\d{3}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\d{9}
\d{3}-\d{3}-\d{3}
\d{3}.\d{3}.\d{3}
Library of system data identifiers 1410
Portugal Tax Identification Number
Patterns
\d{3}.\d{3}.\d{3}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Portugal Tax and VAT Identification Number Validation Computes the checksum and validates the match against
Check it.
Patterns
\d{9}
\d{3}-\d{3}-\d{3}
\d{3}.\d{3}.\d{3}
\d{3}.\d{3}.\d{3}
Library of system data identifiers 1411
Portugal Value Added Tax (VAT) Number
Exclude ending characters Data ending with any of the following list of values is not
matched:
Portugal Tax and VAT Identification Number Validation Computes the checksum and validates the match against
Check it.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
■ The narrow breadth detects an 11-character alphanumeric pattern starting with PT and
followed by nine digits with checksum validation. It also requires the presence of related
keywords.
See “Portugal Value Added Tax (VAT) Number narrow breadth” on page 1413.
Table 45-878 Portugal Value Added Tax (VAT) Number wide-breadth patterns
Patterns
[Pp][Tt]\d{9}
[Pp][Tt] \d{9}
[Pp][Tt]-\d{9}
[Pp][Tt] \d{3}-\d{3}-\d{3}
Table 45-879 Portugal Value Added Tax (VAT) Number wide-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Table 45-880 Portugal Value Added Tax (VAT) Number medium-breadth patterns
Patterns
[Pp][Tt]\d{9}
[Pp][Tt] \d{9}
[Pp][Tt]-\d{9}
[Pp][Tt] \d{3}-\d{3}-\d{3}
Table 45-881 Portugal Value Added Tax (VAT) Number medium-breadth validator
Portugal Tax and VAT Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Table 45-882 Portugal Value Added Tax (VAT) Number narrow-breadth patterns
Patterns
[Pp][Tt]\d{9}
[Pp][Tt] \d{9}
[Pp][Tt]-\d{9}
[Pp][Tt] \d{3}-\d{3}-\d{3}
Table 45-883 Portugal Value Added Tax (VAT) Number narrow-breadth validators
Portugal Tax and VAT Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Exclude ending characters Data ending with any of the following list of values is not
matched:
See “Randomized US Social Security Number (SSN) narrow breadth” on page 1415.
Exclude beginning characters 666, 000, 123456789, 111111111, See “Using pattern validators”
222222222, 333333333, 444444444, on page 818.
555555555, 666666666, 77777777,
888888888
Number delimiter
Pattern
[0-8]\d{3}[1-9]\d{4}
[0-8]\d{2}[1-9]\d{5}
[0-8]\d{2}-\d{1}[1-9]-\d{4}
[0-8]\d{2}-[1-9]\d{1}-\d{4}
Table 45-887
Validator Description
Exclude beginning characters Data beginning with any of the following list of values is
not matched:
Exclude ending characters Data ending with any of the following list of values is not
matched:
0000
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
Randomized US Social Security Number Validation Computes the checksum and validates the pattern against
Check it.
The Romania Driver's Licence Number data identifier detects a 9-, 10-, or 11-character
alphanumeric pattern that matches the Romania Driver's Licence Number format.
This data identifier provides the following breadths of detection:
■ The wide breadth detects a 9-, 10-, or 11-character alphanumeric pattern that matches the
Romania Driver's Licence Number format with checksum validation. It checks for common
test patterns.
See “Romania Driver's Licence Number wide breadth” on page 1417.
■ The narrow breadth detects a 9-, 10-, or 11-character alphanumeric pattern that matches
the Romania Driver's Licence Number format with checksum validation. It checks for
common test patterns, and also requires the presence of related keywords.
See “Romania Driver's Licence Number narrow breadth” on page 1418.
Pattern
[Ii][Gg][Pp]\d{8}
[A-Za-z]\d{8}
[A-Za-z]\d{8}[A-Za-z]
Exclude ending characters Data ending with any of the following list of values is not
matched:
Romania Driver's Licence Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1418
Romania Driver's Licence Number
Pattern
[Ii][Gg][Pp]\d{8}
[A-Za-z]\d{8}
[A-Za-z]\d{8}[A-Za-z]
Exclude ending characters Data ending with any of the following list of values is not
matched:
Romania Driver's Licence Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
\d{13}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{13}
Library of system data identifiers 1420
Romania Value Added Tax (VAT) Number
Romania National Identification Number Check Computes the checksum and validates the pattern against
it.
Pattern
\d{13}
Romania National Identification Number Check Computes the checksum and validates the pattern against
it.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
The Romania Value Added Tax (VAT) Number data identifier detects a 4- to 12-character
alphanumeric pattern that matches the Romania VAT Number format.
This data identifier provides the following breadths of detection:
■ The wide breadth detects a 4- to 12-character alphanumeric pattern that matches the
Romania VAT Number format without checksum validation. It checks for common test
patterns.
See “Romania Value Added Tax (VAT) Number wide breadth” on page 1421.
■ The medium breadth detects a 4- to 12-character alphanumeric pattern that matches the
Romania VAT Number format with checksum validation.
See “Romania Value Added Tax (VAT) Number medium breadth” on page 1422.
■ The narrow breadth detects a 4- to 12-character alphanumeric pattern that matches the
Romania VAT Number format with checksum validation. It checks for common test patterns,
and also requires the presence of related keywords.
See “Romania Value Added Tax (VAT) Number narrow breadth” on page 1423.
Table 45-898 Romania Value Added Tax (VAT) Number wide-breadth patterns
Pattern
[Rr][Oo][1-9]\d{1,9}
[Rr][Oo] [1-9]\d{1,9}
Table 45-899 Romania Value Added Tax (VAT) Number wide-breadth validators
Table 45-899 Romania Value Added Tax (VAT) Number wide-breadth validators (continued)
Exclude ending characters Data ending with any of the following list of values is not
matched:
000, 111, 222, 333, 444, 555, 666, 777, 888, 999
Table 45-900 Romania Value Added Tax (VAT) Number medium-breadth patterns
Pattern
[Rr][Oo][1-9]\d{1,9}
[Rr][Oo] [1-9]\d{1,9}
Library of system data identifiers 1423
Romania Value Added Tax (VAT) Number
Table 45-901 Romania Value Added Tax (VAT) Number medium-breadth validators
Romania VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Table 45-902 Romania Value Added Tax (VAT) Number narrow-breadth patterns
Pattern
[Rr][Oo][1-9]\d{1,9}
[Rr][Oo] [1-9]\d{1,9}
Table 45-903 Romania Value Added Tax (VAT) Number narrow-breadth validators
Table 45-903 Romania Value Added Tax (VAT) Number narrow-breadth validators (continued)
Exclude ending characters Data ending with any of the following list of values is not
matched:
000, 111, 222, 333, 444, 555, 666, 777, 888, 999
Romania VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
CIF, cif, CUI, cui, TVA, tva, TVA#, tva#, taxa pe valoare
adaugata, cod fiscal, cod fiscal de identificare, cod
fiscal identificare, Cod Unic de Înregistrare, cod unic
de identificare, cod unic identificare, cod unic de
înregistrare, cod unic înregistrare
Library of system data identifiers 1425
Romanian Numerical Personal Code
Pattern
[1-9]\d\d[0-1]\d[0-3]\d{7}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[1-9]\d\d[0-1]\d[0-3]\d{7}
Library of system data identifiers 1426
Romanian Numerical Personal Code
Romanian Numerical Personal Code Check Computes the checksum and validates the pattern against
it.
Pattern
[1-9]\d\d[0-1]\d[0-3]\d{7}
Duplicate digits Ensures that a string of digits is not all the same.
Romanian Numerical Personal Code Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{10}
\d{4}[ ]\d{6}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{10}
Library of system data identifiers 1428
Russian Taxpayer Identification Number
Pattern
\d{4}[ ]\d{6}
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords If you select this option, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{10}
\d{12}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{10}
\d{12}
Russian Taxpayer Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Pattern
\d{10}
\d{12}
Duplicate digits Ensures that a string of digits is not all the same
Russian Taxpayer Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords If you select this option, you have to use at least one of
the following keywords or key phrases must be present
for the data to be matched.
Inputs:
See “SEPA Creditor Identifier Number North wide breadth” on page 1431.
■ The medium breadth detects a unique alphanumeric string that matches the SEPA Credit
Identifier North format with checksum validation.
See “SEPA Creditor Identifier Number North medium breadth” on page 1433.
■ The narrow breadth detects a unique alphanumeric string that matches the SEPA Credit
Identifier North format with checksum validation. It also requires the presence of related
keywords.
See “SEPA Creditor Identifier Number North narrow breadth” on page 1435.
Pattern
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w
Library of system data identifiers 1432
SEPA Creditor Identifier Number North
Table 45-920 SEPA Creditor Identifier Number North wide-breadth patterns (continued)
Pattern
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w
[Ss][Ee]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d
[Ss][Ee]\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
[Ii][Ee]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d
[Ii][Ee]\d\d\d\d\d\d\d\d\d\d\d
[Ff][Ii]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d
[Ff][Ii]\d\d\d\d\d\d\d\d\d\d\d\d\d
[Dd][Kk]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d\d\d
[Dd][Kk]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d\d\d
Library of system data identifiers 1433
SEPA Creditor Identifier Number North
Pattern
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w
Library of system data identifiers 1434
SEPA Creditor Identifier Number North
Table 45-922 SEPA Creditor Identifier Number North medium-breadth patterns (continued)
Pattern
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w
[Ss][Ee]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d
[Ss][Ee]\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
[Ii][Ee]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d
[Ii][Ee]\d\d\d\d\d\d\d\d\d\d\d
[Ff][Ii]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d
[Ff][Ii]\d\d\d\d\d\d\d\d\d\d\d\d\d
[Dd][Kk]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d\d\d
[Dd][Kk]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d\d\d
SEPA Creditor Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1435
SEPA Creditor Identifier Number North
Pattern
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w
Library of system data identifiers 1436
SEPA Creditor Identifier Number North
Table 45-924 SEPA Creditor Identifier Number North narrow-breadth patterns (continued)
Pattern
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w\w\w
[Gg][Bb]\d\d\d\d\d\w\w\w\w\w\w\w\d\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w
[Ss][Ee]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d
[Ss][Ee]\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
[Ii][Ee]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d
[Ii][Ee]\d\d\d\d\d\d\d\d\d\d\d
[Ff][Ii]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d
[Ff][Ii]\d\d\d\d\d\d\d\d\d\d\d\d\d
[Dd][Kk]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d\d\d
[Dd][Kk]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d\d\d
SEPA Creditor Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1437
SEPA Creditor Identifier Number South
Table 45-925 SEPA Creditor Identifier Number North narrow-breadth validators (continued)
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
See “SEPA Creditor Identifier Number South medium breadth” on page 1439.
■ The narrow breadth detects a unique alphanumeric string that matches the SEPA Credit
Identifier South format with checksum validation. It also requires the presence of related
keywords.
See “SEPA Creditor Identifier Number South narrow breadth” on page 1439.
Pattern
[Pp][Tt]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d
[Pp][Tt]\d\d\d\d\d\d\d\d\d\d\d
[Ii][Tt]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w
[Ii][Tt]\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w
[Ee][Ss]\d\d[Zz][Zz][Zz][A-Za-z]\d\d\d\d\d\d\d[A-Za-z]
[Ee][Ss]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d[A-Za-z]
[Ee][Ss]\d\d[Zz][Zz][Zz][LlMmKk]\w\w\w\w\w\w\w[A-Za-z]
[Ee][Ss]\d\d[Zz][Zz][Zz][XxYyZz]\d\d\d\d\d\d\d[A-Za-z]
[Ee][Ss]\d\d\d\d\d[A-Za-z]\d\d\d\d\d\d\d[A-Za-z]
[Ee][Ss]\d\d\d\d\d\d\d\d\d\d\d\d\d[A-Za-z]
[Ee][Ss]\d\d\d\d\d[LlMmKk]\w\w\w\w\w\w\w[A-Za-z]
[Ee][Ss]\d\d\d\d\d[XxYyZz]\d\d\d\d\d\d\d[A-Za-z]
Pattern
[Pp][Tt]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d
[Pp][Tt]\d\d\d\d\d\d\d\d\d\d\d
[Ii][Tt]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w
[Ii][Tt]\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w
[Ee][Ss]\d\d[Zz][Zz][Zz][A-Za-z]\d\d\d\d\d\d\d[A-Za-z]
[Ee][Ss]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d[A-Za-z]
[Ee][Ss]\d\d[Zz][Zz][Zz][LlMmKk]\w\w\w\w\w\w\w[A-Za-z]
[Ee][Ss]\d\d[Zz][Zz][Zz][XxYyZz]\d\d\d\d\d\d\d[A-Za-z]
[Ee][Ss]\d\d\d\d\d[A-Za-z]\d\d\d\d\d\d\d[A-Za-z]
[Ee][Ss]\d\d\d\d\d\d\d\d\d\d\d\d\d[A-Za-z]
[Ee][Ss]\d\d\d\d\d[LlMmKk]\w\w\w\w\w\w\w[A-Za-z]
[Ee][Ss]\d\d\d\d\d[XxYyZz]\d\d\d\d\d\d\d[A-Za-z]
SEPA Creditor Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[Pp][Tt]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d
[Pp][Tt]\d\d\d\d\d\d\d\d\d\d\d
[Ii][Tt]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w
[Ii][Tt]\d\d\d\d\d\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w
[Ee][Ss]\d\d[Zz][Zz][Zz][A-Za-z]\d\d\d\d\d\d\d[A-Za-z]
[Ee][Ss]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d[A-Za-z]
[Ee][Ss]\d\d[Zz][Zz][Zz][LlMmKk]\w\w\w\w\w\w\w[A-Za-z]
[Ee][Ss]\d\d[Zz][Zz][Zz][XxYyZz]\d\d\d\d\d\d\d[A-Za-z]
[Ee][Ss]\d\d\d\d\d[A-Za-z]\d\d\d\d\d\d\d[A-Za-z]
[Ee][Ss]\d\d\d\d\d\d\d\d\d\d\d\d\d[A-Za-z]
[Ee][Ss]\d\d\d\d\d[LlMmKk]\w\w\w\w\w\w\w[A-Za-z]
[Ee][Ss]\d\d\d\d\d[XxYyZz]\d\d\d\d\d\d\d[A-Za-z]
SEPA Creditor Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1441
SEPA Creditor Identifier Number West
Table 45-931 SEPA Creditor Identifier Number South narrow-breadth validators (continued)
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
■ The narrow breadth detects a unique alphanumeric string that matches the SEPA Credit
Identifier North format with checksum validation. It also requires the presence of related
keywords.
See “SEPA Creditor Identifier Number West narrow breadth” on page 1443.
Pattern
[Dd][Ee]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d\d
[Dd][Ee]\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
[Nn][Ll]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d\d\d
[Nn][Ll]\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
[Aa][Tt]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d\d
[Aa][Tt]\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
[Ll][Uu]\d\d\w\w\w0\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w
[Bb][Ee]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d
[Bb][Ee]\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
[Bb][Ee]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d\d\d\d
[Bb][Ee]\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
[Ff][Rr]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w
[Ff][Rr]\d\d\d\d\d\w\w\w\w\w\w
Pattern
[Dd][Ee]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d\d
[Dd][Ee]\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
[Nn][Ll]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d\d\d
[Nn][Ll]\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
[Aa][Tt]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d\d
[Aa][Tt]\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
[Ll][Uu]\d\d\w\w\w0\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w
[Bb][Ee]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d
[Bb][Ee]\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
[Bb][Ee]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d\d\d\d
[Bb][Ee]\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
[Ff][Rr]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w
[Ff][Rr]\d\d\d\d\d\w\w\w\w\w\w
SEPA Creditor Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[Dd][Ee]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d\d
[Dd][Ee]\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
[Nn][Ll]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d\d\d
[Nn][Ll]\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
[Aa][Tt]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d\d
[Aa][Tt]\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
[Ll][Uu]\d\d\w\w\w0\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w\w
[Bb][Ee]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d
[Bb][Ee]\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
[Bb][Ee]\d\d[Zz][Zz][Zz]\d\d\d\d\d\d\d\d\d\d\d\d\d
[Bb][Ee]\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d\d
[Ff][Rr]\d\d[Zz][Zz][Zz]\w\w\w\w\w\w
[Ff][Rr]\d\d\d\d\d\w\w\w\w\w\w
SEPA Creditor Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1445
Serbia Unique Master Citizen Number
Table 45-937 SEPA Creditor Identifier Number West narrow-breadth validators (continued)
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
■ The narrow breadth detects a 13-digit number that matches the Serbian Unique Master
Citizen Number format with checksum validation. It checks for common test numbers, and
also requires the presence of related keywords.
See “Serbia Unique Master Citizen Number narrow breadth” on page 1447.
Pattern
0[1-9]0[1-9]\d\d\d[07]\d\d\d\d\d
[12][0-9]0[1-9]\d\d\d[07]\d\d\d\d\d
3[01]0[1-9]\d\d\d[07]\d\d\d\d\d
0[1-9]1[012]\d\d\d[07]\d\d\d\d\d
[12][0-9]1[012]\d\d\d[07]\d\d\d\d\d
3[01]1[012]\d\d\d[07]\d\d\d\d\d
Duplicate digits Ensures that a string of numbers is not all the same.
Pattern
0[1-9]0[1-9]\d\d\d[07]\d\d\d\d\d
[12][0-9]0[1-9]\d\d\d[07]\d\d\d\d\d
3[01]0[1-9]\d\d\d[07]\d\d\d\d\d
Library of system data identifiers 1447
Serbia Unique Master Citizen Number
Table 45-940 Serbia Unique Master Citizen Number medium-breadth patterns (continued)
Pattern
0[1-9]1[012]\d\d\d[07]\d\d\d\d\d
[12][0-9]1[012]\d\d\d[07]\d\d\d\d\d
3[01]1[012]\d\d\d[07]\d\d\d\d\d
Slovenia Unique Master Citizen Number Validation Computes the checksum and validates the pattern against
Check it.
Pattern
0[1-9]0[1-9]\d\d\d[07]\d\d\d\d\d
[12][0-9]0[1-9]\d\d\d[07]\d\d\d\d\d
3[01]0[1-9]\d\d\d[07]\d\d\d\d\d
0[1-9]1[012]\d\d\d[07]\d\d\d\d\d
[12][0-9]1[012]\d\d\d[07]\d\d\d\d\d
3[01]1[012]\d\d\d[07]\d\d\d\d\d
Duplicate digits Ensures that a string of numbers is not all the same.
Slovenia Unique Master Citizen Number Validation Computes the checksum and validates the pattern against
Check it.
Library of system data identifiers 1448
Serbia Value Added Tax (VAT) Number
Table 45-943 Serbia Unique Master Citizen Number narrow-breadth validators (continued)
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Table 45-944 Serbia Value Added Tax (VAT) Number wide-breadth patterns
Pattern
\d{9}
[Rr][Ss]\d{9}
[Rr][Ss] \d{9}
[Ss][Rr]\d{9}
[Ss][Rr] \d{9}
Table 45-945 Serbia Value Added Tax (VAT) Number wide-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Table 45-946 Serbia Value Added Tax (VAT) Number medium-breadth patterns
Pattern
\d{9}
[Rr][Ss]\d{9}
[Rr][Ss] \d{9}
[Ss][Rr]\d{9}
Library of system data identifiers 1450
Serbia Value Added Tax (VAT) Number
Table 45-946 Serbia Value Added Tax (VAT) Number medium-breadth patterns (continued)
Pattern
[Ss][Rr] \d{9}
Table 45-947 Serbia Value Added Tax (VAT) Number medium-breadth validators
Serbia Value Added Tax (VAT) Number Validation Computes the checksum and validates the pattern against
Check it.
Table 45-948 Serbia Value Added Tax (VAT) Number narrow-breadth patterns
Pattern
\d{9}
[Rr][Ss]\d{9}
[Rr][Ss] \d{9}
[Ss][Rr]\d{9}
[Ss][Rr] \d{9}
Table 45-949 Serbia Value Added Tax (VAT) Number narrow-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Serbia Value Added Tax (VAT) Number Validation Computes the checksum and validates the pattern against
Check it.
Library of system data identifiers 1451
Singapore NRIC data identifier
Table 45-949 Serbia Value Added Tax (VAT) Number narrow-breadth validators (continued)
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
[SFTGsftg]\d{7}\w
Singapore NRIC Computes the checksum and validates the pattern against
it.
The Slovakia Driver's Licence Number data identifier detects an eight-character alphanumeric
pattern that matches the Slovak driver's license number format.
This data identifier provides the following breadths of detection:
■ The wide breadth detects an eight-character alphanumeric pattern that matches the Slovak
driver's license number format. It checks for common test patterns.
See “Slovakia Driver's Licence Number wide breadth” on page 1452.
■ The narrow breadth detects an eight-character alphanumeric pattern that matches the
Slovak driver's license number format. It checks for common test patterns, and also requires
the presence of related keywords.
See “Slovakia Driver's Licence Number narrow breadth” on page 1452.
Pattern
[A-Za-z]\d{7}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[A-Za-z]\d{7}
Library of system data identifiers 1453
Slovakia National Identification Number
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Patterns
\d{10}
\d{9}
[A-Za-z]{2} \d{6}
[A-Za-z]{2}/\d{6}
[A-Za-z]{2}/\d{6}
\d{6}/\d{3}
\d{6}-\d{3}
\d{6} \d{3}
\d{6}/\d{4}
\d{6}-\d{4}
\d{6} \d{4}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\d{10}
\d{9}
[A-Za-z]{2} \d{6}
[A-Za-z]{2}/\d{6}
[A-Za-z]{2}/\d{6}
\d{6}/\d{3}
\d{6}-\d{3}
\d{6} \d{3}
\d{6}/\d{4}
\d{6}-\d{4}
\d{6} \d{4}
Duplicate digits Ensures that a string of digits is not all the same.
Slovakia National Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Patterns
\d{10}
\d{9}
[A-Za-z]{2} \d{6}
[A-Za-z]{2}/\d{6}
[A-Za-z]{2}/\d{6}
\d{6}/\d{3}
\d{6}-\d{3}
\d{6} \d{3}
\d{6}/\d{4}
\d{6}-\d{4}
\d{6} \d{4}
Slovakia National Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Duplicate digits Ensures that a string of digits is not all the same.
Library of system data identifiers 1457
Slovakia Passport Number
Find keywords At least one of the following keywords or key phrases must
be present for he data to match when you use this option.
Inputs:
Pattern
[A-Za-z]{2}\d{7}
[A-Za-z]\d{7}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[A-Za-z]{2}\d{7}
[A-Za-z]\d{7}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Table 45-966 Slovakia Value Added Tax (VAT) Number wide-breadth patterns
Pattern
[Ss][Kk][1-9][0-9][234789]\d{7}
Table 45-967 Slovakia Value Added Tax (VAT) Number wide-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Table 45-968 Slovakia Value Added Tax (VAT) Number medium-breadth patterns
Pattern
[Ss][Kk][1-9][0-9][234789]\d{7}
Table 45-969 Slovakia Value Added Tax (VAT) Number medium-breadth validators
Slovakia Value Added Tax (VAT) Number Validation Computes the checksum and validates the pattern against
Check it.
Table 45-970 Slovakia Value Added Tax (VAT) Number narrow-breadth patterns
Pattern
[Ss][Kk][1-9][0-9][234789]\d{7}
Table 45-971 Slovakia Value Added Tax (VAT) Number narrow-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Slovakia Value Added Tax (VAT) Number Validation Computes the checksum and validates the pattern against
Check it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
[Pp][Bb]\d{7}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[Pp][Bb]\d{7}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
[1-9]\d{7}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[1-9]\d{7}
Slovenia Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[1-9]\d{7}
Library of system data identifiers 1465
Slovenia Unique Master Citizen Number
Exclude ending characters Data ending with any of the following list of values is not
matched:
Slovenia Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Pattern
\d{7}[05]\d{5}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{7}[05]\d{5}
Slovenia Unique Master Citizen Number Validation Computes the checksum and validates the pattern against
Check it.
Pattern
\d{7}[05]\d{5}
Table 45-987 Slovenia Unique Master Citizen Number narrow-breadth validators (continued)
Slovenia Unique Master Citizen Number Validation Computes the checksum and validates the pattern against
Check it.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords At least one of the following keywords or key phrases must
be present for he data to match when you use this option.
Inputs:
Table 45-988 Slovenia Value Added Tax (VAT) Number wide-breadth patterns
Pattern
[Ss][Ii]\d{8}
[Ss][Ii] \d{8}
Table 45-989 Slovenia Value Added Tax (VAT) Number wide-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Table 45-990 Slovenia Value Added Tax (VAT) Number medium-breadth patterns
Pattern
[Ss][Ii]\d{8}
[Ss][Ii] \d{8}
Table 45-991 Slovenia Value Added Tax (VAT) Number medium-breadth validators
Slovenia Value Added Tax (VAT) Number Validation Computes the checksum and validates the pattern against
Check it.
Library of system data identifiers 1469
South African Personal Identification Number
Table 45-992 Slovenia Value Added Tax (VAT) Number narrow-breadth patterns
Pattern
[Ss][Ii]\d{8}
[Ss][Ii] \d{8}
Table 45-993 Slovenia Value Added Tax (VAT) Number narrow-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Slovenia Value Added Tax (VAT) Number Validation Computes the checksum and validates the pattern against
Check it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Patterns
[0123678]\d{8}
[0123678]\d{3}-\d{4}-\d
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\d{10}[01]\d{2}
South African Personal Identification Number Computes the checksum and validates the pattern against
Validation Check it.
Patterns
\d{10}[01]\d{2}
Duplicate digits Ensures that a string of digits is not all the same.
South African Personal Identification Number Computes the checksum and validates the pattern against
Validation Check it.
Find keywords If you select this option selected, at least one of the
following keywords or key phrases must be present for the
data to be matched.
Inputs:
The South Korea Resident Registration Number detects a 13-digit number that matches the
South Korea Resident Registration Number format.
The South Korea Resident Registration Number data identifier detects the presence of this
13-digit number.
This data identifier provides three breadths of detection:
■ The wide breadth matches numbers with duplicate digit validation.
See “South Korea Resident Registration Number wide breadth” on page 1472.
■ The medium breadth matches numbers with checksum validation.
See “South Korea Resident Registration Number medium breadth” on page 1472.
■ The narrow breadth matches numbers with checksum validation. It also requires the
presence related keywords.
See “South Korea Resident Registration Number narrow breadth” on page 1473.
This data identifier does not provide a narrow breadth option.
Patterns
\d{2}[01]\d[0123]\d{8}
\d{2}[01]\d[0123]\d-\d{7}
\d\d[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d[ ]\d{7}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{2}[01]\d[0123]\d{8}
\d{2}[01]\d[0123]\d-\d{7}
\d\d[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d[ ]\d{7}
Advanced KRRN Validation Computes the checksum and validates the pattern against it.
Patterns
\d{2}[01]\d[0123]\d{8}
\d{2}[01]\d[0123]\d-\d{7}
\d\d[01]\d[0123]\d-\d{7}
\d{2}[01]\d[0123]\d[ ]\d{7}
Advanced KRRN Validation Computes the checksum and validates the pattern
against it.
Duplicate digits Ensures that a string of digits is not all the same.
Library of system data identifiers 1474
Spain Value Added Tax (VAT) Number
Inputs:
주민등록번호,주민번호
Table 45-1006 Spain Value Added Tax (VAT) Number wide-breadth patterns
Patterns
[Ee][Ss][0-9A-Za-z]\d{7}[0-9A-Za-z]
[Ee][Ss] [0-9A-Za-z]\d{7}[0-9A-Za-z]
Library of system data identifiers 1475
Spain Value Added Tax (VAT) Number
Table 45-1006 Spain Value Added Tax (VAT) Number wide-breadth patterns (continued)
Patterns
[Ee][Ss] [0-9A-Za-z]-\d{7}[0-9A-Za-z]
[Ee][Ss] [0-9A-Za-z]-\d{2}.\d{3}.\d{2}[0-9A-Za-z]
[Ee][Ss] [0-9A-Za-z]-\d{2},\d{3},\d{2}[0-9A-Za-z]
[Ee][Ss] [0-9A-Za-z]-\d{2}/\d{5}[0-9A-Za-z]
Table 45-1007 Spain Value Added Tax (VAT) Number wide-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Table 45-1008 Spain Value Added Tax (VAT) Number medium-breadth patterns
Patterns
[Ee][Ss][0-9A-Za-z]\d{7}[0-9A-Za-z]
[Ee][Ss] [0-9A-Za-z]\d{7}[0-9A-Za-z]
[Ee][Ss] [0-9A-Za-z]-\d{7}[0-9A-Za-z]
[Ee][Ss] [0-9A-Za-z]-\d{2}.\d{3}.\d{2}[0-9A-Za-z]
[Ee][Ss] [0-9A-Za-z]-\d{2},\d{3},\d{2}[0-9A-Za-z]
[Ee][Ss] [0-9A-Za-z]-\d{2}/\d{5}[0-9A-Za-z]
Library of system data identifiers 1476
Spain Value Added Tax (VAT) Number
Table 45-1009 Spain Value Added Tax (VAT) Number medium-breadth validator
Spain VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Table 45-1010 Spain Value Added Tax (VAT) Number narrow-breadth patterns
Patterns
[Ee][Ss][0-9A-Za-z]\d{7}[0-9A-Za-z]
[Ee][Ss] [0-9A-Za-z]\d{7}[0-9A-Za-z]
[Ee][Ss] [0-9A-Za-z]-\d{7}[0-9A-Za-z]
[Ee][Ss] [0-9A-Za-z]-\d{2}.\d{3}.\d{2}[0-9A-Za-z]
[Ee][Ss] [0-9A-Za-z]-\d{2},\d{3},\d{2}[0-9A-Za-z]
[Ee][Ss] [0-9A-Za-z]-\d{2}/\d{5}[0-9A-Za-z]
Table 45-1011 Spain Value Added Tax (VAT) Number narrow-breadth validators
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Table 45-1011 Spain Value Added Tax (VAT) Number narrow-breadth validators (continued)
Exclude ending characters Data ending with any of the following list of values is not
matched:
Spain VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Patterns
\d{8}\w
\d{8}[- ]\w
\d{8}[ ][-]\w
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\d{8}\w
\d{8}[- ]\w
\d{8}[ ][-]\w
DNI control key check Computes the control key and checks if it is valid.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\d{20}
0128\d{16}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\d{20}
0128\d{16}
Spanish Customer Account Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{20}
0128\d{16}
Duplicate digits Ensures that a string of digits is not all the same.
Spanish Customer Account Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to match when you use this option.
Inputs:
Spanish DNI ID
The Spanish DNI ID appears on the Documento nacional de identidad (DNI) and is issued by
the Spanish Hacienda Publica to every citizen of Spain. It is the most important unique identifier
in Spain used for opening accounts, signing contracts, taxes, and elections.
The Spanish DNI ID data identifier provides two breadths of detection:
Library of system data identifiers 1482
Spanish DNI ID
■ The wide breadth detects an 8-digit number followed by a hyphen and letter. The last letter
must match a checksum algorithm.
See “Spanish DNI ID wide breadth” on page 1482.
■ The narrow breadth detects an 8-digit number followed by a hyphen and letter. The last
letter must match a checksum algorithm. It also requires the presence of Spanish DNI-related
keywords.
See “Spanish DNI ID narrow breadth” on page 1482.
Pattern
\d{7}\w
\d{7}[- ]\w
\d{7}[ ][-]\w
DNI control key check Computes the control key and checks if it is valid.
Pattern
\d{7}\w
\d{7}[- ]\w
\d{7}[ ][-]\w
Library of system data identifiers 1483
Spanish Passport Number
Pattern
DNI control key check Computes the control key and checks if it is valid.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
Patterns
\l{2}\d{6}
\l{2}-\d{6}
\l{2} \d{6}
\l{3}\d{6}
\l{3}-\d{6}
\l{3} \d{6}
Patterns
\l{2}\d{6}
\l{2}-\d{6}
\l{2} \d{6}
\l{3}\d{6}
\l{3}-\d{6}
\l{3} \d{6}
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{12}
\d{2}[/]\d{8}[/]\d{2}
\d{2}[-]\d{8}[-]\d{2}
Library of system data identifiers 1486
Spanish Social Security Number
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
\d{12}
\d{2}[/]\d{8}[/]\d{2}
\d{2}[-]\d{8}[-]\d{2}
Spanish SSN Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
\d{12}
\d{2}[/]\d{8}[/]\d{2}
\d{2}[-]\d{8}[-]\d{2}
Library of system data identifiers 1487
Spanish Tax Identification (CIF)
Duplicate digits Ensures that a string of digits is not all the same.
Spanish SSN Number Validation Check Computes the checksum and validates the pattern against
it.
Find Keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
Pattern
[KPQS]\d{7}[A-J]
Library of system data identifiers 1488
Spanish Tax Identification (CIF)
Pattern
[KPQS]-\d{7}[A-J]
[ABEH]\d{7}[0-9]
[ABEH]-\d{7}[0-9]
[CDFGJLMNRUVW]\d{7}[A-J0-9]
[CDFGJLMNRUVW]-\d{7}[A-J0-9]
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[KPQS]\d{7}[A-J]
[KPQS]-\d{7}[A-J]
[ABEH]\d{7}[0-9]
[ABEH]-\d{7}[0-9]
[CDFGJLMNRUVW]\d{7}[A-J0-9]
[CDFGJLMNRUVW]-\d{7}[A-J0-9]
Spanish Tax ID Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1489
Spanish Tax Identification (CIF)
Pattern
[KPQS]\d{7}[A-J]
[KPQS]-\d{7}[A-J]
[ABEH]\d{7}[0-9]
[ABEH]-\d{7}[0-9]
[CDFGJLMNRUVW]\d{7}[A-J0-9]
[CDFGJLMNRUVW]-\d{7}[A-J0-9]
Duplicate digits Ensures that a string of digits is not all the same.
Spanish Tax ID Number Validation Check Computes the checksum and validates the pattern against
it.
Find Keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
tax ID, tax ID number, CIF ID, CIF no, spanish CIF ID,
cif, tax file no, spanish CIF number, tax file number,
spanish CIF no, tax no, tax number, tax id, taxid#,
taxno#, CIFid#, CIFID#, spanishCIFID#, spanishCIFno#,
cifid#, número de contribuyente, número de impuesto
corporativo, número de Identificación fiscal, CIF
número, CIFnúmero#
Library of system data identifiers 1490
Sri Lanka National Identity Number
Pattern
\d\d\d\d\d\d\d\d\d[VvXx]
[2-9]\d\d\d\d\d\d\d\d\d\d\d
Duplicate digits Ensures that a string of numbers is not all the same.
Library of system data identifiers 1491
Sri Lanka National Identity Number
Table 45-1043 Sri Lanka National Identity Number wide-breadth validators (continued)
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
\d\d\d\d\d\d\d\d\d[VvXx]
[2-9]\d\d\d\d\d\d\d\d\d\d\d
Sri Lanka National Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Pattern
\d\d\d\d\d\d\d\d\d[VvXx]
[2-9]\d\d\d\d\d\d\d\d\d\d\d
Library of system data identifiers 1492
Sweden Driver's Licence Number
Duplicate digits Ensures that a string of numbers is not all the same.
Exclude ending characters Data ending with any of the following list of values is not
matched:
Sri Lanka National Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Patterns
\d{6}-\d{4}
\d{6}+\d{4}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\d{6}-\d{4}
\d{6}+\d{4}
Sweden Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Patterns
\d{6}-\d{4}
\d{6}+\d{4}
Duplicate digits Ensures that a string of digits is not all the same.
Sweden Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
■ The medium breadth detects a 10- or 12-digit number with checksum validation.
See “Sweden Tax Identification Number medium breadth” on page 1495.
■ The narrow breadth detects a 10- or 12-digit number with checksum validation. It also
requires the presence of related keywords.
See “Sweden Tax Identification Number narrow breadth” on page 1496.
Patterns
\d{8}-\d{4}
\d{6}-\d{4}
\d{8}+\d{4}
\d{6}+\d{4}
Patterns
\d{8}-\d{4}
\d{6}-\d{4}
\d{8}+\d{4}
\d{6}+\d{4}
Library of system data identifiers 1496
Sweden Value Added Tax (VAT) Number
Sweden Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Patterns
\d{8}-\d{4}
\d{6}-\d{4}
\d{8}+\d{4}
\d{6}+\d{4}
Sweden Tax Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
tin, tin number, tin no, tin#, sweden tin, sweden tin
number, sweden tin no, sweden tin#
The Sweden Value Added Tax (VAT) Number data identifier detects a 14-character
alphanumeric pattern that matches the Sweden VAT Number format.
The Sweden Value Added Tax (VAT) Number data identifier provides three breadths of
detection:
■ The wide breadth detects a 14-character alphanumeric pattern beginning with SE and
followed by 12 digits without checksum validation.
See “Sweden Value Added Tax (VAT) Number wide breadth” on page 1497.
■ The medium breadth detects a 14-character alphanumeric pattern beginning with SE and
followed by 12 digits with checksum validation.
See “Sweden Value Added Tax (VAT) Number medium breadth” on page 1497.
■ The narrow breadth detects a 14-character alphanumeric pattern beginning with SE and
followed by 12 digits with checksum validation. It also requires the presence of related
keywords.
See “Sweden Value Added Tax (VAT) Number narrow breadth” on page 1498.
Table 45-1060 Sweden Value Added Tax (VAT) Number wide-breadth pattern
Pattern
[Ss][Ee]\d{12}
Table 45-1061 Sweden Value Added Tax (VAT) Number wide-breadth validators
Exclude ending characters Data ending with any of the following list of values is not
matched:
Table 45-1062 Sweden Value Added Tax (VAT) Number medium-breadth pattern
Pattern
[Ss][Ee]\d{12}
Table 45-1063 Sweden Value Added Tax (VAT) Number medium-breadth validator
Sweden Value Added Tax Number Validation Check Computes the checksum and validates the pattern against
it.
Table 45-1064 Sweden Value Added Tax (VAT) Number narrow-breadth pattern
Pattern
[Ss][Ee]\d{12}
Table 45-1065 Sweden Value Added Tax (VAT) Number narrow-breadth validatorsa
Exclude ending characters Data ending with any of the following list of values is not
matched:
Sweden Value Added Tax Number Validation Check Computes the checksum and validates the pattern against
it.
Library of system data identifiers 1499
Swedish Passport Number
Table 45-1065 Sweden Value Added Tax (VAT) Number narrow-breadth validatorsa (continued)
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\d{8}
\d{2}-\d{6}
Library of system data identifiers 1500
Swedish Passport Number
Patterns
\l{2}-\d{6}
Patterns
\d{8}
\d{2}-\d{6}
\l{2}-\d{6}
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d\d[01]\d[01236789]\d[-]\d\d\d\d
\d\d[01]\d[01236789]\d[+]\d\d\d\d
\d\d[01]\d[01236789]\d\d\d\d\d
[12][098]\d\d[01]\d[01236789]\d[-]\d\d\d\d
[12][098]\d\d[01]\d[01236789]\d[+]\d\d\d\d
[12][098]\d\d[01]\d[01236789]\d\d\d\d\d
Duplicate digits Ensures that a string of digits is not all the same.
Library of system data identifiers 1502
Sweden Personal Identification Number
Pattern
\d\d[01]\d[01236789]\d[-]\d\d\d\d
\d\d[01]\d[01236789]\d[+]\d\d\d\d
\d\d[01]\d[01236789]\d\d\d\d\d
[12][098]\d\d[01]\d[01236789]\d[-]\d\d\d\d
[12][098]\d\d[01]\d[01236789]\d[+]\d\d\d\d
[12][098]\d\d[01]\d[01236789]\d\d\d\d\d
Sweden Personal Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Pattern
\d\d[01]\d[01236789]\d[-]\d\d\d\d
\d\d[01]\d[01236789]\d[+]\d\d\d\d
\d\d[01]\d[01236789]\d\d\d\d\d
[12][098]\d\d[01]\d[01236789]\d[-]\d\d\d\d
[12][098]\d\d[01]\d[01236789]\d[+]\d\d\d\d
[12][098]\d\d[01]\d[01236789]\d\d\d\d\d
Library of system data identifiers 1503
SWIFT Code
Duplicate digits Ensures that a string of digits is not all the same.
Sweden Personal Identification Number Validation Computes the checksum and validates the pattern against
Check it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
SWIFT Code
The SWIFT Code is a unique identifier for banks and is managed by the Society for Worldwide
Interbank Financial Telecommunications (SWIFT). The SWIFT Code is required for monetary
transfers between financial institutions. It is also known as the Bank Identifier Code (BIC).
The SWIFT Code data identifier detects an 8- or 11-character alphanumeric pattern that
matches the SWIFT Code format.
This data identifier provides two breadths of validation:
■ The wide breadth detects an detects an 8- or 11-character alphanumeric pattern without
checksum validation. It requires the presence of related keywords.
See “SWIFT Code wide breadth” on page 1503.
■ The narrow breadth detects an 8- or 11-character alphanumeric pattern without checksum
validation. It requires the presence of related keywords.
See “SWIFT Code narrow breadth” on page 1504.
Pattern
[A-Z]{6}\w{2}
[A-Z]{6}\w{5}
Require beginning characters With this option selected, any of the following list of values are required at the
beginning of the matched data.
Inputs:
af, ax, al, dz, as, ad, ao, ai, aq, ag, ar, am, aw, au, at, az, bs, bh, bd, bb, by,
be, bz, bj, bm, bt, bo, ba, bw, bv, br, io, bn, bg, bf, bi, kh, cm, ca, cv, ky, cf,
td, cl, cn, cx, cc, co, km, cg, cd, ck, cr, ci, hr, cu, cy, cz, dk, dj, dm, do, ec,
eg, sv, gq, er, ee, et, fk, fo, fj, fi, fr, gf, pf, tf, ga, gm, ge, de, gh, gi, gr, gl, gd,
gp, gu, gt, gg, gn, gw, gy, ht, hm, va, hn, hk, hu, is, in, id, ir, iq, ie, im, il, it,
jm, jp, je, jo, kz, ke, ki, kp, kr, kw, kg, la, lv, lb, ls, lr, ly, li, lt, lu, mo, mk, mg,
mw, my, mv, ml, mt, mh, mq, mr, mu, yt, mx, md, mc, mn, me, ms, ma, mz,
mm, na, nr, np, nl, an, nc, nz, ni, ne, ng, nu, nf, mp, no, om, pk, pw, ps, pa,
pg, py, pe, ph, pn, pl, pt, pr, qa, re, ro, ru, rw, sh, kn, lc, pm, vc, ws, sm, st,
sa, sn, rs, sc, sl, sg, sk, si, sb, so, za, gs, es, lk, sd, sr, sj, sz, se, ch, sy, tw,
tj, tz, th, tl, tg, tk, to, tt, tn, tr, tm, tc, tv, ug, ua, ae, gb, us, um, uy, uz, vu, ve,
vn, vg, vi, wf, eh, ye, zm, zw
Find keywords With this option selected, at least one of the following keywords or key phrases
must be present for the data to be matched.
Inputs:
Patterns
[A-Z]{6}\w{2}
Library of system data identifiers 1505
Swiss AHV Number
Patterns
[A-Z]{6}\w{5}
Validators Description
Require beginning characters With this option selected, any of the following list of values are required at the
beginning of the matched data.
Inputs:
af, ax, al, dz, as, ad, ao, ai, aq, ag, ar, am, aw, au, at, az, bs, bh, bd, bb, by,
be, bz, bj, bm, bt, bo, ba, bw, bv, br, io, bn, bg, bf, bi, kh, cm, ca, cv, ky, cf,
td, cl, cn, cx, cc, co, km, cg, cd, ck, cr, ci, hr, cu, cy, cz, dk, dj, dm, do, ec,
eg, sv, gq, er, ee, et, fk, fo, fj, fi, fr, gf, pf, tf, ga, gm, ge, de, gh, gi, gr, gl, gd,
gp, gu, gt, gg, gn, gw, gy, ht, hm, va, hn, hk, hu, is, in, id, ir, iq, ie, im, il, it,
jm, jp, je, jo, kz, ke, ki, kp, kr, kw, kg, la, lv, lb, ls, lr, ly, li, lt, lu, mo, mk, mg,
mw, my, mv, ml, mt, mh, mq, mr, mu, yt, mx, md, mc, mn, me, ms, ma, mz,
mm, na, nr, np, nl, an, nc, nz, ni, ne, ng, nu, nf, mp, no, om, pk, pw, ps, pa,
pg, py, pe, ph, pn, pl, pt, pr, qa, re, ro, ru, rw, sh, kn, lc, pm, vc, ws, sm, st,
sa, sn, rs, sc, sl, sg, sk, si, sb, so, za, gs, es, lk, sd, sr, sj, sz, se, ch, sy, tw,
tj, tz, th, tl, tg, tk, to, tt, tn, tr, tm, tc, tv, ug, ua, ae, gb, us, um, uy, uz, vu, ve,
vn, vg, vi, wf, eh, ye, zm, zw
Find keywords With this option selected, at least one of the following keywords or keyphrases
must be present for the data to be matched.
Inputs:
■ The narrow breadth detects an 11-digit number with checksum validation. It also requires
the presence of related keywords.
See “Swiss AHV Number narrow breadth” on page 1506.
Pattern
\d{3}.\d{2}.\d{3}.\d{3}
\d{11}
Swiss AHV Computes the checksum and validates the pattern against
it.
Pattern
\d{3}.\d{2}.\d{3}.\d{3}
\d{11}
Swiss AHV Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
Pattern
[7][5][6]\d{10}
[7][5][6][.]\d{4}[.]\d{4}[.]\d{2}
[Cc][Hh][Ee]-\d\d\d[.]\d\d\d[.]\d\d\d
[Cc][Hh][Ee]\d\d\d\d\d\d\d\d\d
Validator Description
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[7][5][6]\d{10}
[7][5][6][.]\d{4}[.]\d{4}[.]\d{2}
[Cc][Hh][Ee]-\d\d\d[.]\d\d\d[.]\d\d\d
[Cc][Hh][Ee]\d\d\d\d\d\d\d\d\d
Validator Description
Swiss Social Security Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[7][5][6]\d{10}
[7][5][6][.]\d{4}[.]\d{4}[.]\d{2}
[Cc][Hh][Ee]-\d\d\d[.]\d\d\d[.]\d\d\d
[Cc][Hh][Ee]\d\d\d\d\d\d\d\d\d
Validator Description
Duplicate digits Ensures that a string of digits is not all the same.
Swiss Social Security Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Identifikationsnummer, sozialversicherungsnummer,
identification personnelle ID,
Steueridentifikationsnummer, Steuer ID, codice fiscale,
Steuernummer
Pattern
807560\d{14}
Exclude ending characters Data ending with any of the following list of values is not
matched:
80756000000000000000, 80756011111111111111,
80756022222222222222, 80756033333333333333,
80756044444444444444, 80756055555555555555,
80756066666666666666, 80756077777777777777,
80756088888888888888, 80756099999999999999
Pattern
807560\d{14}
Exclude ending characters Data ending with any of the following list of values is not
matched:
80756000000000000000, 80756011111111111111,
80756022222222222222, 80756033333333333333,
80756044444444444444, 80756055555555555555,
80756066666666666666, 80756077777777777777,
80756088888888888888, 80756099999999999999
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
■ The narrow breadth detects an eight-character alphanumeric pattern that matches the
Swiss passport number format. It checks for common test patterns, and also requires the
presence of related keywords.
See “Switzerland Passport Number narrow breadth” on page 1512.
Pattern
[a-zA-Z]\d{7}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[a-zA-Z]\d{7}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
■ The narrow breadth detects a 15- or 16-character alphanumeric pattern that matches the
Swiss VAT number format with checksum validation. It checks for common test patterns,
and also requires the presence of related keywords.
See “Switzerland Value Added Tax (VAT) Number narrow breadth” on page 1515.
Table 45-1098 Switzerland Value Added Tax (VAT) Number wide-breadth patterns
Pattern
[Cc][Hh][Ee]-\d{3}[.]\d{3}[.]\d{3} [Tt][Vv][Aa]
[Cc][Hh][Ee]-\d{3}[.]\d{3}[.]\d{3} [Mm][Ww][Ss][Tt]
[Cc][Hh][Ee]-\d{3}[.]\d{3}[.]\d{3} [Ii][Vv][Aa]
Table 45-1099 Switzerland Value Added Tax (VAT) Number wide-breadth validators
Table 45-1100 Switzerland Value Added Tax (VAT) Number medium-breadth patterns
Pattern
[Cc][Hh][Ee]-\d{3}[.]\d{3}[.]\d{3} [Tt][Vv][Aa]
[Cc][Hh][Ee]-\d{3}[.]\d{3}[.]\d{3} [Mm][Ww][Ss][Tt]
[Cc][Hh][Ee]-\d{3}[.]\d{3}[.]\d{3} [Ii][Vv][Aa]
Table 45-1101 Switzerland Value Added Tax (VAT) Number medium-breadth validators
Switzerland Value Added Tax (VAT) Number Validation Computes the checksum and validates the pattern against
Check it.
Library of system data identifiers 1515
Taiwan ROC ID
Table 45-1102 Switzerland Value Added Tax (VAT) Number narrow-breadth patterns
Pattern
[Cc][Hh][Ee]-\d{3}[.]\d{3}[.]\d{3} [Tt][Vv][Aa]
[Cc][Hh][Ee]-\d{3}[.]\d{3}[.]\d{3} [Mm][Ww][Ss][Tt]
[Cc][Hh][Ee]-\d{3}[.]\d{3}[.]\d{3} [Ii][Vv][Aa]
Table 45-1103 Switzerland Value Added Tax (VAT) Number narrow-breadth validators
Switzerland Value Added Tax (VAT) Number Validation Computes the checksum and validates the pattern against
Check it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
Taiwan ROC ID
In Taiwan an ID card is mandatory for all citizens who are over 14-years old. The ID card has
been uniformly numbered since 1965.
The Taiwan ROC ID data identifier detects the presence of Taiwan identification number based
on two types of common ID patterns. The last character matched is used to validate a checksum.
Library of system data identifiers 1516
Taiwan ROC ID
Patterns
[A-Z][12][0-3]\d{7}
[A-Z][ABCD]\d{8}
Validator Description
Patterns
[A-Z][12][0-3]\d{7}
[A-Z][ABCD]\d{8}
Validator Description
Validator Description
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
中華民國國民身分證
Pattern
[A-za-z]\d\d\d\d\d\d\d
[A-Za-z][A-Za-z]\d\d\d\d\d\d\d
[A-Za-z]\d\d\d\d\d\d
Library of system data identifiers 1518
Thailand Passport Number
Exclude ending characters Data ending with any of the following list of values is not
matched:
Pattern
[A-za-z]\d\d\d\d\d\d\d
[A-Za-z][A-Za-z]\d\d\d\d\d\d\d
[A-Za-z]\d\d\d\d\d\d
Exclude ending characters Data ending with any of the following list of values is not
matched:
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
หนังสือเดิน ทาง,หมายเลขหนังสือเดินทาง
Pattern
[1-8]\d{12}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[1-8]\d{12}
Thailand Personal ID Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[1-8]\d{12}
Duplicate digits Ensures that a string of digits is not all the same.
Thailand Personal ID Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
ประกันภัยจำนวน, หมายเลขประจำตัวส่วนบุคคล,
หมายเลขประจำตัวที่ไม่ซ้ำกัน, ประกันภัยจำนวน#,
หมายเลขประจำตัวส่วนบุคคล#, หมายเลขประจำตัวทีไ ่ มซ้ำกัน#
Pattern
[123456789]\d{10}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[123456789]\d{10}
Turkish Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[123456789]\d{10}
Library of system data identifiers 1523
UK Bank Account Number Sort Code
Turkish Identification Number Validation Check Computes the checksum and validates the pattern against
it.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Patterns
\d{2}-\d{2}-\d{2}
\d{6}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\d{2}-\d{2}-\d{2}
\d{6}
UK Bank Account Number Sort Code Check Computes the checksum and validates the pattern against
it.
Patterns
\d{2}-\d{2}-\d{2}
\d{6}
Library of system data identifiers 1525
UK Drivers Licence Number
UK Bank Account Number Sort Code Check Computes the checksum and validates the pattern against
it.
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords At least one of the following keywords or key phrases must
be present for the data to match:
Inputs:
Pattern
\w{5}\d[0156]\d{4}\w{3}\l{2}
\w{5}\d[0156]\d{4}\w{3}\l{2}\d{2}
Pattern
\w{5}\d[0156]\d{4}\w{3}\l{2}
\w{5}\d[0156]\d{4}\w{3}\l{2}\d{2}
UK Drivers License Every UK drivers license must be 16 characters and the number at the 8th and 9th
position must be larger than 00 and smaller than 32.
In addition, the narrow breadth also requires the presence of both a driver's license-related
keyword AND a UK-related keyword.
Pattern
\w{5}\d[0156]\d{4}\w{3}\l{2}
\w{5}\d[0156]\d{4}\w{3}\l{2}\d{2}
UK Drivers License Every UK drivers license must be 16 characters and the number at the 8th and 9th
position must be larger than 00 and smaller than 32.
Find keywords: driver's At least one of the following keywords or key phrases must be present for the data
license-related to match:
Inputs:
Find keywords: UK-related At least one of the following keywords or keyphrases must be present for the data
to match:
Inputs:
Pattern
\l{2,3}\d{1,4}
The narrow breadth of the Electoral Roll Number data identifier implements two validators to
require the presence of an electoral number-related keyword and a UK-related keyword.
Find keywords: electoral At least one of the following keywords or key phrases must be present for the data
number-related to match:
electoral #, electoral number, electoral roll #, electoral roll no., electoral roll
number, electoral roll#, electoral#, electoralnumber, electoralroll#,
electoralrollno
Find keywords: UK-related At least one of the following keywords or key phrases must be present for the data
to match:
Note: This data identifier does not provide a wide breadth option.
Library of system data identifiers 1529
UK National Health Service (NHS) Number
Pattern Description
The medium breadth implements three validators: one to validate the NHS checksum, another
to perform numerical validation using the final digit, and a third to check for the presence of
an NHS-related keyword.
Validator Description
Find keywords: NHS-related At least one of the following keywords or key phrases must
be present for the data to match:
Pattern Description
Table 45-1139 UK National Health Service (NHS) Number narrow-breadth patterns (continued)
Pattern Description
The narrow breadth implements four validators: one to validate the NHS checksum, another
to perform numerical validation using the final digit, a third to require the presence of an
NHS-related keyword, and a fourth to require the presence of a UK-related keyword.
Find keywords: NHS-related At least one of the following keywords or key phrases must
be present for the data to match.
Inputs:
Find keywords: UK-related At least one of the following keywords or key phrases must
be present for the data to match.
Inputs:
Patterns Description
Patterns Description
The first and second letter cannot be D, F, I, Q, U and V. The second letter also cannot be O.
Pattern Description
Find keywords: Insurance-related At least one of the following keywords or key phrases must be present for the
data to match:
UK Passport Number
The UK Passport Number identifies a United Kingdom passport using the current official
specification of the UK Government Standards of the UK Cabinet Office.
The UK Passport Number data identifier detects a nine-digit number that matches the UK
Passport Number format.
This data identifier provides three breadths of validation:
■ The wide breadth detects a nine-digit number without validation.
See “UK Passport Number wide breadth” on page 1532.
■ The medium breadth detects a nine-digit number without checksum validation. It requires
the presence of related keywords.
See “UK Passport Number medium breadth” on page 1533.
■ The narrow breadth detects a nine-digit number without checksum validation. It requires
the presence of related keywords.
See “UK Passport Number narrow breadth” on page 1533.
Pattern Description
Pattern Description
Exclude beginning characters Data beginning with any of the following list of values is not matched:
123456789
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords: Passport-related At least one of the following keywords or key phrases must be present for the
data to match.
Inputs:
Pattern Description
Exclude beginning characters Data beginning with any of the following list of values is not matched:
123456789
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords: Passport-related At least one of the following keywords or key phrases must be present for the
data to match.
Inputs:
Find keywords: UK-related At least one of the following keywords or key phrases must be present for the
data to match.
Inputs:
UK Tax ID Number
The UK Tax ID Number is a personal identification number provided by the UK Government
Standards of the UK Cabinet Office.
The UK Tax ID Number data identifier detects a 10-digit number that matches the UK Tax ID
number format.
The UK Tax ID Number data identifier provides three breadths of validation:
■ The wide breadth detects a 10-digit number without validation.
See “UK Tax ID Number wide breadth” on page 1534.
■ The medium breadth detects a 10-digit number without checksum validation.
See “UK Tax ID Number medium breadth” on page 1535.
■ The narrow breadth detects a 10-digit number without checksum validation. It requires the
presence of related keywords.
See “UK Tax ID Number narrow breadth” on page 1535.
Note: The wide breadth of the UK Tax ID Number data identifier does not include any validators.
Library of system data identifiers 1535
UK Tax ID Number
Pattern Description
Pattern Description
Duplicate digits Ensures that a string of digits is not all the same.
Exclude beginning characters Data beginning with any of the following list of values is
not matched:
Pattern Description
Duplicate digits Ensures that a string of digits is not all the same.
Exclude beginning characters Data beginning with any of the following list of values is
not matched:
Find keywords: Tax ID-related At least one of the following keywords or key phrases must
be present for the data to match:
Patterns
[Gg][Bb][Gg][Dd]\d{3}
[Gg][Bb][Hh][Aa]\d{3}
[Gg][Bb][Gg][Dd] \d{3}
Library of system data identifiers 1537
UK Value Added Tax (VAT) Number
Table 45-1155 UK Value Added Tax (VAT) Number wide-breadth patterns (continued)
Patterns
[Gg][Bb][Hh][Aa] \d{3}
[Gg][Bb]\d{9}
[Gg][Bb]\d{12}
[Gg][Bb] \d{9}
[Gg][Bb] \d{12}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Patterns
[Gg][Bb][Gg][Dd]\d{3}
[Gg][Bb][Hh][Aa]\d{3}
[Gg][Bb][Gg][Dd] \d{3}
Library of system data identifiers 1538
UK Value Added Tax (VAT) Number
Table 45-1157 UK Value Added Tax (VAT) Number medium-breadth patterns (continued)
Patterns
[Gg][Bb][Hh][Aa] \d{3}
[Gg][Bb]\d{9}
[Gg][Bb]\d{12}
[Gg][Bb] \d{9}
[Gg][Bb] \d{12}
UK VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[Gg][Bb][Gg][Dd]\d{3}
[Gg][Bb][Hh][Aa]\d{3}
[Gg][Bb][Gg][Dd] \d{3}
[Gg][Bb][Hh][Aa] \d{3}
[Gg][Bb]\d{9}
[Gg][Bb]\d{12}
[Gg][Bb] \d{9}
[Gg][Bb] \d{12}
Library of system data identifiers 1539
Ukraine Identity Card
Table 45-1159 UK Value Added Tax (VAT) Number narrow-breadth patterns (continued)
Pattern
Exclude ending characters Data ending with any of the following list of values is not
matched:
000, 111, 222, 333, 444, 555, 666, 777, 888, 999
UK VAT Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to match:
Inputs:
vat no., vat number, vat#, value added tax number, vat
no
Pattern
\d{4}[01]\d[0123]\d-\d{7}
\d{4}[01]\d[0123]\d{8}
\d{4}[01]\d[0123]\d \d{7}
Duplicate digits Ensures that a string of digits are not all the same.
\d{4}[01]\d[0123]\d-\d{7}
\d{4}[01]\d[0123]\d{8}
\d{4}[01]\d[0123]\d \d{7}
Duplicate digits Ensures that a string of digits are not all the same.
Ukraine Identity Card Check Computes the checksum and validates the pattern against
it.
Pattern
\d{4}[01]\d[0123]\d-\d{7}
\d{4}[01]\d[0123]\d{8}
\d{4}[01]\d[0123]\d \d{7}
Duplicate digits Ensures that a string of digits are not all the same.
Ukraine Identity Card Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
The Ukraine Passport (Domestic) data identifier detects a nine-digit number that matches the
Ukraine Passport (Domestic) format.
The Ukraine Passport (Domestic) data identifier provides two breadths of detection:
■ The wide breadth detects a nine-digit number without checksum validation.
See “Ukraine Passport (Domestic) wide breadth” on page 1542.
■ The narrow breadth detects a nine-digit number. It also requires the presence of related
keywords.
See “Ukraine Passport (Domestic) narrow breadth” on page 1542.
Pattern
\d{9}
Duplicate digits Ensures that a string of digits are not all the same.
Pattern
\d{9}
Duplicate digits Ensures that a string of digits are not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\w{2}\d{6}
Duplicate digits Ensures that a string of digits are not all the same.
Library of system data identifiers 1544
United Arab Emirates Personal Number
Pattern
\w{2}\d{6}
Duplicate digits Ensures that a string of digits are not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
\d{15}
\d{3}-\d{4}-\d{7}-\d{1}
Table 45-1176 United Arab Emirates Personal Number wide breadth validators
Duplicate digits Ensures that a string of digits is not all the same.
Table 45-1177 United Arab Emirates Personal Number medium breadth patterns
Pattern
\d{15}
\d{3}-\d{4}-\d{7}-\d{1}
Table 45-1178 United Arab Emirates Personal Number medium breadth validator
Luhn Check Computes the checksum and validates the pattern against
it.
Pattern
\d{15}
\d{3}-\d{4}-\d{7}-\d{1}
Duplicate digits Ensures that a string of digits is not all the same.
Luhn Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
, هوية فريدة, التأمين رقم, فريدة من نوعها هوية رقم,الهوية الشخصية رقم
التأمينرقم#
■ The narrow breadth detects nine-digit numbers without checksum validation. It requires
the presence of related keywords.
See “US Individual Tax Identification Number (ITIN) narrow breadth” on page 1548.
Note: The wide breadth of the US Individual Tax Identification Number (ITIN) data identifier
does not include any validators.
Patterns
9\d\d[78]\d\d\d\d\d
9\d\d[/][78]\d[/]\d\d\d\d
9\d\d[\\][78]\d[\\]\d\d\d\d
Patterns
9\d\d[78]\d\d\d\d\d
9\d\d[/][78]\d[/]\d\d\d\d
9\d\d[\\][78]\d[\\]\d\d\d\d
Library of system data identifiers 1548
US Passport Number
Patterns
9\d\d[78]\d\d\d\d\d
9\d\d[/][78]\d[/]\d\d\d\d
9\d\d[\\][78]\d[\\]\d\d\d\d
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords: ITIN-related At least one of the following keywords or key phrases must
be present for the data to be matched.
Inputs:
US Passport Number
United States passports are passports issued to citizens and non-citizen nationals of the United
States of America. They are issued exclusively by the U.S. Department of State.
The US Passport Number data identifier detects an eight- or nine-digit number that matches
the US Passport Number format.
The US Passport Number data identifier provides two breadths of detection:
Library of system data identifiers 1549
US Passport Number
Patterns
\d{8}
\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Patterns
\d{8}
\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
The US Individual Tax Identification Number (ITIN) is a personal identification number issued
by the Social Security Administration of the United States government. Although primarily used
for administering the Social Security program, it is widely used as a personal identification
number in many purposes.
The US Social Security Number (SSN) data identifier detects nine-digit numbers that match
the US SSN format..
The US Social Security Number (SSN) data identifier provides three breadths of validation:
■ The wide breadth detects a nine-digit number without checksum validation.
See “US Social Security Number (SSN) wide breadth” on page 1551.
■ The medium breadth detects a nine-digit number without checksum validation.
See “US Social Security Number (SSN) medium breadth” on page 1551.
■ The narrow breadth detects a nine-digit number without checksum validation. It requires
the presence of related keywords.
See “US Social Security Number (SSN) narrow breadth” on page 1552.
Library of system data identifiers 1551
US Social Security Number (SSN)
Pattern Description
\d{3}-\d{2}-\d{4} Matches the standard SSN format, which is any three digits followed by a hyphen,
two digits, a hyphen, and any four digits.
Validator Description
Advanced SSN Checks whether SSN contains zeros in any group, the area number (first group)
is less than 773 and not 666, the delimiter between the groups is the same, the
number does not consist of all the same digits, and the number is not reserved
for advertising (123-45-6789, 987-65-432x).
SSN Area-Group number For a given area number (first group), not all group numbers (second group) might
have been assigned by the SSA. Validator eliminates SSNs with invalid group
numbers.
Pattern Description
\d{3}-\d{2}-\d{4} Matches the standard SSN format, which is any three digits followed by a hyphen,
two digits, a hyphen, and any four digits.
Validator Description
Advanced SSN Checks whether SSN contains zeros in any group, the area number (first group)
is less than 773 and not 666, the delimiter between the groups is the same, the
number does not consist of all the same digits, and the number is not reserved
for advertising (123-45-6789, 987-65-432x).
SSN Area-Group number For a given area number (first group), not all group numbers (second group) might
have been assigned by the SSA. Validator eliminates SSNs with invalid group
numbers.
Pattern Description
\d{3}-\d{2}-\d{4} Matches the standard SSN format, which is any three digits followed by a hyphen,
two digits, a hyphen, and any four digits.
Advanced SSN Checks whether SSN contains zeros in any group, the area number (first group)
is less than 773 and not 666, the delimiter between the groups is the same, the
number does not consist of all the same digits, and the number is not reserved
for advertising (123-45-6789, 987-65-432x).
SSN Area-Group number For a given area number (first group), not all group numbers (second group)
might have been assigned by the SSA. Validator eliminates SSNs with invalid
group numbers.
Find keywords: Social At least one of the following keywords or key phrases must be present for the
security-related data to be matched:
Pattern
\l{2}[ ]\d{5}[-]\d{4}
\l{2}[ ]\d{9}
Library of system data identifiers 1554
US ZIP+4 Postal Codes
Exclude ending characters Data ending with any of the following list of values is not
matched:
Patterns
\l{2}[ ]\d{5}[-]\d{4}
\l{2}[ ]\d{9}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Zip+4 Postal Codes Validation Check Computes the checksum and validates the pattern against
it.
Patterns
\l{2}[ ]\d{5}[-]\d{4}
Library of system data identifiers 1555
Venezuela National Identification Number
Patterns
\l{2}[ ]\d{9}
Exclude ending characters Data ending with any of the following list of values is not
matched:
Zip+4 Postal Codes Validation Check Computes the checksum and validates the pattern against
it.
Find keywords With this option selected, at least one of the following
keywords or key phrases must be present for the data to
be matched.
Inputs:
Pattern
[VEJPGvejpg][-]\d{2}.\d{3}.\d{3}[-]\d
[VEJPGvejpg][-]\d{8}[-]\d
[VEJPGvejpg]\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Pattern
[VEJPGvejpg][-]\d{2}.\d{3}.\d{3}[-]\d
[VEJPGvejpg][-]\d{8}[-]\d
[VEJPGvejpg]\d{9}
Venezuela National ID Number Validation Check Computes the checksum and validates the pattern against
it.
Pattern
[VEJPGvejpg][-]\d{2}.\d{3}.\d{3}[-]\d
[VEJPGvejpg][-]\d{8}[-]\d
[VEJPGvejpg]\d{9}
Duplicate digits Ensures that a string of digits is not all the same.
Venezuela National ID Number Validation Check Computes the checksum and validates the pattern against
it.
Find keywords At least one of the following keywords or key phrases must
be present for the data to be matched when you use this
option.
Inputs:
■ NASD Rule 2711 and NYSE Rules 351 and 472 policy template
Patient Data and Compound EDM and This compound rule looks for a match among the following EDM data
Drug Keywords Keyword Rule fields in combination with a keyword from the "Prescription Drug
Names" dictionary. Both conditions must be satisfied for the rule to
trigger an incident.
■ Account number
■ Email
■ ID card number
■ Last name
■ Phone
■ UK NHS (National Health Service) number
■ UK NIN (National Insurance Number)
Patient Data and Compound EDM and This compound rule looks for a match among the following EDM data
Disease Keywords Keyword Rule fields in combination with a keyword from the "Disease Names"
dictionary. Both conditions must be satisfied for the rule to trigger an
incident.
■ Account number
■ Email
■ ID card number
■ Last name
■ Phone
■ UK NHS (National Health Service) number
■ UK NIN (National Insurance Number)
Library of policy templates 1562
Canadian Social Insurance Numbers policy template
Patient Data and Compound EDM and This compound rule looks for a match among the following EDM data
Treatment Keyword Rule fields in combination with a keyword from the "Medical Treatment
Keywords Keywords" dictionary. Both conditions must be satisfied for the rule
to trigger an incident:
■ Account number
■ Email
■ ID card number
■ Last name
■ Phone
■ UK NHS (National Health Service) number
■ UK NIN (National Insurance Number)
UK NHS Number Simple DCM Rule This rule looks for a keyword from "UK NIN Keywords" dictionary in
and Drug Keywords combination with a pattern matching the UK NIN data identifier and a
keyword from the "Prescription Drug Names" dictionary.
UK NHS Number Simple DCM Rule This rule looks for a keyword from "UK NIN Keywords" dictionary in
and Disease combination with a pattern matching the UK NIN data identifier and a
Keywords keyword from the "Disease Names" dictionary.
UK NHS Number Simple DCM Rule This rule looks for a keyword from "UK NIN Keywords" dictionary in
and Treatment combination with a pattern matching the UK NIN data identifier and a
Keywords keyword from the "Medical Treatment Keywords" dictionary.
This rule looks for a match to the Canadian Social Insurance Number data identifier
and a keyword from the "Canadian Social Ins. No. Words" dictionary.
Table 46-2 Detection exception: Exclude emails that contain the mandated keywords
Simple exception Content Matches Exclude emails that contain the mandated keywords (Keyword Match):
Keyword (DCM)
■ Match keyword from "[physical postal address]" or "advertisement".
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
Note: After you define the keywords, you can choose to count all
matches and require 2 keywords from the list to be matched.
The detection exception CAN-SPAM Compliant Emails excludes from detection document
content from the selected IDM index with at least 90% match.
Simple exception Content Matches Exception for CAN-SPAM compliant emails (IDM):
Document Profile
■ Exact content match (90%)
(IDM)
■ Look in the message body and attachments.
■ Check for existence.
If an exception is not met, the detection rule Monitor Email From Bulk Mailer looks for a
sender's email address that matches one from the "Bulk Mailer Email Address" list, which is
user-defined.
Library of policy templates 1564
Colombian Personal Data Protection Law 1581 policy template
Simple rule Sender/User Matches Monitor Email From Bulk Mailer (Sender):
Pattern (DCM)
■ Match sender pattern(s): [[email protected]] (user defined)
■ Severity: High.
Table 46-5
Rule Type Description
Colombian Address Number DCM Rule This rule detects Colombian street addresses using the Colombian
(Data Identifiers) Addresses data identifier.
Colombian Cell Phone Number DCM Rule This rule detects Colombian cell phone numbers using the Colombian
(Data Identifiers) Cell Phone Number data identifier.
Colombian Personal DCM Rule This rule detects Colombian personal identification numbers using the
Identification Number (Data Colombian Personal Identification Number data identifier.
Identifiers)
Colombian Tax Identification DCM Rule This rule detects Colombian tax identification numbers using the
Number (Data Identifiers) Colombian Tax Identification Number data identifier.
This is a compound rule that looks for either specified IP addresses or URLs in the
"Forbidden Websites 1" dictionary.
This rule looks for a match of a specified URL in the "Forbidden Websites 2"
dictionary.
This rule looks for keywords (domains) from the "Competitor Domains" dictionary,
which is user-defined.
Confidential Documents, Simple IDM Rule with one This rule looks for content from specific documents
Indexed condition registered as confidential; returns a match if 80% or more
of the source document is found. If you do not have an
Indexed Document Profile configured this rule is dropped.
Library of policy templates 1566
Credit Card Numbers policy template
Confidential Documents Compound DCM Rule: This rule looks for a combination of keywords from the
Attachment/File Type and "Confidential Keywords" list and the following file types:
Keyword Match. Both
■ Microsoft Excel Macro
conditions must match for
■ Microsoft Excel
the rule to trigger an
incident. ■ Microsoft Works Spreadsheet
■ SYLK Spreadsheet
■ Corel Quattro Pro
■ Multiplan Spreadsheet
■ Comma Separate Values
■ Applix Spreadsheets
■ Lotus 1-2-3
■ Microsoft Word
■ Adobe PDF
■ Microsoft PowerPoint
Proprietary Documents Compound DCM Rule: This compound rule looks for a combination of keywords
Attachment/File Type and from the "Proprietary Keywords" dictionary and the above
Keyword Match referenced file types.
Internal Use Only Compound DCM Rule: This compound rule looks for a combination of keywords
Documents Attachment/File Type and from the "Internal Use Only Keywords" dictionary and the
Keyword Match above referenced file types.
Documents Not For Compound DCM Rule: This compound rule looks for a combination of keywords
Distribution Attachment/File Type and from the "Not For Distribution Words" dictionary and the
Keyword Match above referenced file types.
This rule looks for a match to the credit card number system pattern and a keyword
from the "Credit Card Number Keywords" dictionary.
Table 46-7 EDM conditions for the Customer Data Protection policy template
Username/Password EDM Rule This rule looks for usernames and However, the following
Combinations passwords in combination with three or combinations are not a
more of the following fields: violation:
Date of Birth EDM Rule This rule looks for any three of the However, the following
following data fields in combination: combinations are not a
violation:
■ SSN
■ Phone ■ Phone, email, and first
■ Email name
■ First Name ■ Phone, email, and last
name
■ Last Name
■ Email, first name, and
■ Bank Card number
last name
■ Account Number
■ Phone, first name, and
■ ABA Routing Number
last name
■ Canadian Social Insurance Number
■ UK National Insurance Number
■ Date of Birth
Exact SSN or CCN EDM Rule This rule looks for an exact social
security number or bank card number.
Customer Directory EDM Rule This rule looks for Phone or Email.
Library of policy templates 1568
Data Protection Act 1998 policy template
Table 46-8 DCM conditions for the Customer Data Protection policy template
US Social Security Compound DCM This rule looks for a match to the See “Randomized US Social
Number Patterns Rule Randomized US Social Security Security Number (SSN)”
number data identifier and a keyword on page 1414.
from the "US SSN Keywords"
dictionary.
Credit Card Numbers, All Compound DCM This rule looks for a match to the credit See “Credit Card Number”
Rule card number system pattern and a on page 1095.
keyword from the "Credit Card Number
Keywords" dictionary.
ABA Routing Numbers Compound DCM This rule looks for a match to the ABA See “ABA Routing Number”
Rule Routing number data identifier and a on page 1013.
keyword from the "ABA Routing
Number Keywords" dictionary.
See “About the Exact Data Profile and index” on page 528.
See “Configuring policies” on page 413.
See “Exporting policy detection as a template” on page 442.
Table 46-9 Data Protection Act 1998, Personal Data detection rule
Description
This EDM rule looks for three of the following columns of data: However, the following combinations are not an
incident:
■ NIN (National Insurance Number)
■ Account number ■ First name, last name, pin
■ Pin ■ First name, last name, password
■ Bank card number ■ First name, last name, email
■ First name ■ First name, last name, phone
■ Last name ■ First name, last name, mother's maiden name
■ Drivers license
■ Password
■ Tax payer ID
■ UK NHS number
■ Date of birth
■ Mother's maiden name
■ Email address
■ Phone number
Table 46-10 Additional detection rules in the Data Protection Act 1998 policy template
Description
The UK Electoral Roll Numbers rule implements the UK Electoral Roll Number data identifier.
The UK National Insurance Numbers rule implements the narrow breadth edition of the UK National Insurance
Number data identifier.
The UK Tax ID Numbers rule implements the narrow edition of the UK Tax ID Number data identifier.
The UK Drivers License Numbers rule implements the narrow breadth edition of the UK Driver's License number
data identifier.
The UK Passport Numbers rule implements the narrow breadth edition of the UK Passport Number data identifier.
Table 46-10 Additional detection rules in the Data Protection Act 1998 policy template
(continued)
Description
The UK NHS Numbers rule implements the narrow breadth edition of the UK National Health Service (NHS) Number
data identifier.
Note: The General Data Protection Regulation (GDPR) replaces the EU Data Protection
Directives as of 25 May 2018.
Library of policy templates 1571
Data Protection Directives (EU) policy template
Method Description
■ Last Name
■ Bank Card number
■ Drivers license number
■ Account Number
■ PIN
■ Medical account number
■ Medical ID card number
■ User name
■ Password
■ ABA Routing Number
■ Email
■ Phone
■ Mother's maiden name
However, the following combinations do not create a match:
This rule looks for any two of the following data columns: last name, phone, account number,
username, and email.
This rule is an exception if the recipient is within the EU. This covers recipients with any of the country
codes from the "EU Country Codes" dictionary.
The detection rule Secret Information (Keyword Match) looks for any keywords in the "Secret
Information" dictionary.
The detection rule Classified or Restricted Information (Keyword Match) looks for any
keywords in the "Classified or Restricted Information" dictionary.
The detection rule Other Sensitive Information looks for any keywords in the "Other Sensitive
Information" dictionary.
This rule looks for content from specific design documents registered as proprietary.
It returns a match if the engine detects 80% or more of the source document.
Library of policy templates 1574
Employee Data Protection policy template
This rule looks for the specified file name extensions found in the "Design Document
Extensions" dictionary.
■ cad_draw
■ dwg
Note: Both file types and file name extensions are used because the policy does not detect
the true file type for all the required documents.
Username/Password Combinations EDM Rule This rule looks for usernames and passwords in
combination with any three of the following data fields.
■ SSN
■ Phone
■ Email
■ First Name
■ Last Name
■ Bank Card Number
■ Account Number
■ ABA Routing Number
■ Canadian Social Insurance Number
■ UK National Insurance Number
■ Date of Birth
Employee Directory EDM Rule This rule looks for Phone or Email.
Library of policy templates 1575
Encrypted Data policy template
US Social Security Number Patterns DCM Rule This rule looks for a match from the Randomized US Social
Security Number (SSN) data identifier and a keyword from
the "US SSN Keywords" dictionary.
Credit Card Numbers, All DCM Rule This rule looks for a match from the credit card number
system pattern and a keyword from the "Credit Card
Number Keywords" dictionary.
ABA Routing Numbers DCM Rule This rule looks for a match from the ABA Routing number
data identifier and a keyword from the "ABA Routing
Number Keywords" dictionary.
This rule looks for the following file types: encrypted_zip, encrypted_doc,
encrypted_xls, or encrypted_ppt.
This rule looks for a keyword from the "GPG Encryption Keywords" dictionary.
This rule looks for a keyword from the "S/MIME Encryption Keywords" dictionary.
Table 46-18 Detection rule: Indexed EAR Commerce Control List Items and Recipients
Compound rule Content Matches Exact See “Choosing an Exact Data Profile” on page 409.
Data (EDM)
Content Matches Keyword See “Configuring the Content Matches Keyword condition”
(DCM) on page 844.
The detection rule EAR Commerce Control List and Recipients looks for a country code in
the recipient from the "EAR Country Codes" list and a keyword from the "EAR CCL Keywords"
dictionary. Both conditions must match to trigger an incident.
Library of policy templates 1577
FACTA 2003 (Red Flag Rules) policy template
Table 46-19 Detection rule: EAR Commerce Control List and Recipients
Compound rule Recipient Matches Pattern EAR Commerce Control List and Recipients (Recipient):
(DCM)
■ Match: Email address OR URL domain suffixes.
■ Severity: High.
■ Check for existence.
■ At least 1 recipient(s) must match.
■ Matches on entire message.
Content Matches Keyword EAR Commerce Control List and Recipients (Keyword Match):
(DCM)
■ Match: EAR CCL Keywords
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
Simple rule Content Matches This condition detects exact data containing both of the following data
Exact Data (EDM) items:
■ User name
■ Password
The Exact SSN or CCN detection rule detects the presence of either a social security number
or a credit card number from a profiled database.
Simple rule Content Matches This condition detects exact data containing either of the following data
Exact Data (EDM) columns:
The Customer Directory detection rule detects the presence of either an email address or a
phone number from a profiled database.
Simple rule Content Matches This condition detects exact data containing either of the following data
Exact Data (EDM) columns:
■ Email address
■ Phone number
The Three or More Data Columns detection rule detects exact data containing three or more
of data items from a profiled database index.
Library of policy templates 1579
FACTA 2003 (Red Flag Rules) policy template
Simple rule Content Matches Detects exact data containing three or more of the following data items:
Exact Data (EDM)
■ ABA Routing Number
■ Account Number
■ Bank Card Number
■ Birth Date
■ Email address
■ First Name
■ Last Name
■ National Insurance Number
■ Password
■ Phone Number
■ Social Insurance Number
■ Social security number (Taxpayer ID)
■ User name
The US Social Security Number Patterns detection rule implements the narrow breadth
edition of the Randomized US Social Security Number (SSN) system data identifier.
See “Randomized US Social Security Number (SSN)” on page 1414.
This data identifier detects nine-digit numbers with the pattern DDD-DD-DDDD separated with
dashes or spaces or without separators. The number must be in valid assigned number ranges.
This condition eliminates common test numbers, such as 123456789 or all the same digit. It
also requires the presence of a Social Security keyword.
Simple rule Content Matches ■ Data Identifier: Randomized US Social Security Number (SSN) narrow
Data Identifier (DCM) breadth
■ Severity: High.
■ Count all matches.
■ Look in envelope, subject, body, attachments.
Library of policy templates 1580
FACTA 2003 (Red Flag Rules) policy template
The Credit Card Numbers, All detection rule implements the narrow breadth edition of the
Credit Card Number system Data Identifier.
See “Credit Card Number” on page 1095.
This data identifier detects valid credit card numbers that are separated by spaces, dashes,
periods, or without separators. This condition performs Luhn check validation and includes
formats for American Express, Diner's Club, Discover, Japan Credit Bureau (JCB), MasterCard,
and Visa. It eliminates common test numbers, including those reserved for testing by credit
card issuers. It also requires the presence of a credit card keyword.
Simple rule Content Matches ■ Data Identifier: Credit Card Number narrow breadth
Data Identifier (DCM) See “Credit Card Number narrow breadth” on page 1100.
■ Severity: High.
■ Count all matches.
■ Look in envelope, subject, body, attachments.
The ABA Routing Numbers detection rule implements the narrow breadth edition of the ABA
Routing Number system Data Identifier.
See “ABA Routing Number” on page 1013.
This data identifier detects nine-digit numbers. It validates the number using the final check
digit. This condition eliminates common test numbers, such as 123456789, number ranges
that are reserved for future use, and all the same digit. This condition also requires the presence
of an ABA keyword.
Simple rule Content Matches ■ Data Identifier: ABA Routing Number narrow breadth
Data Identifier (DCM) See “ABA Routing Number” on page 1013.
■ Severity: High.
■ Count all matches.
■ Look in envelope, subject, body, attachments.
This rule looks for content from specific financial information files registered as
proprietary; returns a match if 80% or more of the source document is found.
This rule looks for the combination of specified file types, keywords from the
"Financial Keywords" dictionary, and keywords from the "Confidential/Proprietary
Words" dictionary.
The specified file types are as follows:
■ excel_macro
■ xls
■ works_spread
■ sylk
■ quattro_pro
■ mod
■ csv
■ applix_spread
■ 123
Note: To process HTTP GET requests appropriately, you may need to configure the Network
Prevent for Web server. See “To enable a Forbidden Website policy to process GET requests
appropriately” on page 1582.
Forbidden Websites This rule looks for any keywords in the "Forbidden
Websites" dictionary, which is user-defined.
Library of policy templates 1582
Gambling policy template
Note: Reducing the minimum size of GETs increases the number of URLs that have to
be processed, which increases server traffic load. One approach is to calculate the number
of characters in the shortest URL specified in the list of forbidden URLs and set the
minimum size to that number. Another approach is to set the minimum URL size to 10 as
that should cover all cases.
4 You may need to adjust the "Ignore Requests Smaller Than" setting in the ICAP
configuration of the Network Prevent server from the default 4096 bytes. This value stops
processing of incoming web pages that contain fewer bytes than the number specified. If
a page of a forbidden web site URL might be smaller than that number, the setting should
be reduced appropriately.
See “Configuring policies” on page 413.
See “Exporting policy detection as a template” on page 442.
Suspicious Gambling Keywords This rule looks for five instances of keywords from the "Gambling
Keywords, Confirmed" dictionary.
Less Suspicious Gambling Keywords This rule looks for ten instances of keywords from the "Gambling
Keywords, Suspect" dictionary.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
GDPR Banking and Finance Related Keyword Match Matches a list of related keywords:
Keywords
account number, bank card number,
driver license number, ID card
number, Kontonummer,
Bankkartennummer,
Führerscheinnummer,
Ausweisnummer, Numéro de
compte, numéro carte bancaire,
numéro de permis de conduire,
numéro de carte d'identité, numero
di conto, banca carta numero, carta
d'identità numero, patente guida
numero, Número cuenta, número
tarjeta bancaria, número licencia
conducir, número tarjeta de
identificación, rekeningnummer,
bank kaart aantal, rijbewijs nummer,
ID-kaartnummer, bankkortnummer,
körkort nummer,
identitetskortnummer,
førerkortnummer, ID-kortnummer,
tilinumero, pankkikortin numero,
ajokortin numero, Henkilökortin
numero, uimhir chuntais, uimhir
chárta bainc, uimhir ceadúnas
tiomána, Uimhir chárta aitheantais,
Kontosnummer,
Identifikatiounskaart, número de
conta, número cartão bancário,
número licença motorista, Número
do cartão de identificação
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
UK Driver's Licence Number Data Identifiers The UK Drivers Licence Number is the
identification number for an individual's
driver's license issued by the Driver
and Vehicle Licensing Agency of the
United Kingdom.
Credit Card Magnetic Stripe Data Data Identifiers The magnetic stripe of a credit card
contains information about the card.
Storage of the complete version of this
data is a violation of the Payment Card
Industry (PCI) Data Security Standard.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Belgian National Number Data Identifiers All citizens of Belgium have a National
Number. Belgians 12 years of age and
older are issued a Belgian identity
card.
Czech Personal Identification Data Identifiers All citizens of the Czech Republic are
Number issued a unique personal identification
number by the Ministry of Interior.
French INSEE code Data Identifiers The INSEE code in France is used as
a social insurance number, a national
identification number, and for taxation
and employment purposes.
French Social Security Number Data Identifiers The French Social Security Number
(FSSN) is a unique number assigned
to each French citizen or resident
foreign national. It serves as a national
identification number.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Greek Tax Identification Number Data Identifiers The Arithmo Forologiko Mitro (AFM)
is a unique personal tax identification
number assigned to any individual
resident in Greece or person who
owns property in Greece.
Hungarian Social Security Number Data Identifiers The Hungarian Social Security
Number (TAJ) is a unique identifier
issued by the Hungarian government.
Irish Personal Public Service Data Identifiers The format of the number is a unique
Number 8-character alphanumeric string
ending with a letter, such as
8765432A. The number is assigned at
the registration of birth of the child and
is issued on a Public Services Card
and is unique to every person.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Polish Identification Number Data Identifiers Every Polish citizen 18 years of age
or older residing permanently in
Poland must have an Identity Card,
with a unique personal number. The
number is used as identification for
almost all purposes.
Polish Social Security Number Data Identifiers The Polish Social Security Number
(PESEL) (PESEL) is the national identification
number used in Poland. The PESEL
number is mandatory for all permanent
residents of Poland and for temporary
residents living in Poland. It uniquely
identifies a person and cannot be
transferred to another.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Polish Tax Identification Number Data Identifiers The Polish Tax Identification Number
(NIP) is a number the government
gives to every Poland citizen who
works or does business in Poland. All
taxpayers have a tax identification
number called NIP.
Romanian Numerical Personal Code Data Identifiers In Romania, each citizen has a unique
numerical personal code (Code
Numeric Personal, or CNP). The
number is used by authorities, health
care, schools, universities, banks, and
insurance companies for customer
identification.
Spanish Social Security Number Data Identifiers The Spanish Social Security Number
is a 12-digit number assigned to
Spanish workers to allow access to
the Spanish healthcare system.
Spanish Customer Account Number Data Identifiers The Spanish customer account
number is the standard customer bank
account number used across Spain.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Bulgarian Uniform Civil Number Data Identifiers The uniform civil number (EGN) is
unique number assigned to each
Bulgarian citizen or resident foreign
national. It serves as a national
identification number. An EGN is
assigned to Bulgarians at birth, or
when a birth certificate is issued.
Austrian Social Security Number Data Identifiers A social security number is allocated
to Austrian citizens who receive
available social security benefits. It is
allocated by the umbrella association
of the Austrian social security
authorities.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
See “Burgerservicenummer”
on page 1066.
Library of policy templates 1593
General Data Protection Regulation (Banking and Finance)
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Austria Tax Identification Number Data Identifiers Austria issues tax identification
numbers to individuals based on their
area of residence to identify taxpayers
and facilitate national taxes.
Belgium Tax Identification Number Data Identifiers Belgium issues a tax identification
number for persons who has
obligations to declare taxes in
Belgium.
Belgium Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that is borne
Number by the end consumer. VAT is paid for
each transaction in the manufacturing
and distribution process. For Belgium,
the Value Added Tax is issued by VAT
office for the region in which the
business is established.
Belgium Driver's License Number Data Identifiers Identification number for an individual's
driver's licence issued by the Driver
and Vehicle Licensing Agency of
Belgium.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Netherlands Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that is borne
Number by the end consumer. VAT is paid for
each transaction in the manufacturing
and distribution process. For the
Netherlands, the Value Added Tax is
issued by VAT office for the region in
which the business is established.
France Driver's License Number Data Identifiers Identification number for an individual's
driver's licence issued by the Driver
and Vehicle Licensing Agency of
France.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
France Tax Identification Number Data Identifiers France issue a tax identification
number for anyone who has
obligations to declare taxes in France.
Germany Driver's License Number Data Identifiers Identification number for an individual's
driver's licence issued by the Driver
and Vehicle Licensing Agency of
Germany.
Italy Passport Number Data Identifiers Italian passports are issued to Italian
citizens for the purpose of international
travel.
Italy Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that is borne
Number by the end consumer. VAT is paid for
each transaction in the manufacturing
and distribution process. For Italy, the
Value Added Tax is issued by VAT
office for the region in which the
business is established.
Italy Driver's License Number Data Identifiers Identification number for an individual's
driver's licence issued by the Driver
and Vehicle Licensing Agency of Italy.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Spain Driver's License Number Data Identifiers Identification number for an individual's
driver's licence issued by the Driver
and Vehicle Licensing Agency of
Spain.
Ukraine Identity Card Data Identifiers The Ukraine Identity Card has a
15-digit record number issued to
citizens of Ukraine. It is used as a form
of identification in place of Ukraine's
domestic passport as of January 2016.
Ukraine Domestic Passport Number Data Identifiers An identity document issued to citizens
of Ukraine for domestic use. It has
been replaced by the Ukraine Identity
Card as of 2016, but any existing
passports are still valid.
Germany Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that is borne
Number by the end consumer. VAT is paid for
each transaction in the manufacturing
and distribution process. For Germany,
the Value Added Tax is issued by VAT
office for the region in which the
business is established.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
France Value Added Tax (VAT) Data Identifiers The Value Added Tax (VAT) is a tax
Number levied on goods and services provided
in France and is collected from the
final customer. Companies must
register with the Register of
Commerce and Companies in France
to get VAT number allocated.
Austria Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that is borne
Number by the end consumer. VAT is paid for
each transaction in the manufacturing
and distribution process. For Austria,
the VAT number is issued by the tax
office for the region in which the
business is established.
Sweden Tax Identification Number Data Identifiers Sweden uses tax identification
numbers (TINs) to identify taxpayers
and facilitate the administration of their
national tax affairs. TINs are also
useful for identifying taxpayers who
invest in other EU countries and are
more reliable than other identifiers
such as name and address.
Sweden Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that is borne
Number by the end consumer. VAT is paid for
each transaction in the manufacturing
and distribution process.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Denmark Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that is borne
Number by the end consumer. VAT is paid for
each transaction in the manufacturing
and distribution process. For Denmark,
the VAT number is issued by the tax
office for the region in which the
business is established.
Finland Driver's Licence Number Data Identifiers Identification number for an individual's
driver's license issued in an EU or EEA
Member State for a Finnish license.
Finland Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that is borne
Number by the end consumer. VAT is paid for
each transaction in the manufacturing
and distribution process.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Ireland Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that is borne
Number by the end consumer. VAT is paid for
each transaction in the manufacturing
and distribution process. For Ireland,
the VAT number is issued by the Irish
tax authority.
Ireland Tax Identification Number Data Identifiers This number is issued by department
of social protection for natural persons
and by revenue commissioner for
non-natural persons. Non-natural
persons can be companies,
partnerships, trusts, and
unincorporated bodies.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Luxembourg Value Added Tax Data Identifiers VAT is a consumption tax that is borne
(VAT) Number by the end consumer. VAT is paid for
each transaction in the manufacturing
and distribution process.
Portugal Tax Identification Number Data Identifiers A fiscal number is a tax identification
number that is issued in Portugal to
anyone who wishes to undertake any
official matters in Portugal.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Portugal Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that is borne
Number by the end consumer. VAT is paid for
each transaction in the manufacturing
and distribution process.
Portugal Driver's Licence Number Data Identifiers The Institute for Mobility and Land
Transport (IMTT) issues driver's
licenses in Portugal.
Denmark Tax Identification Number Data Identifiers Denmark issues a tax identification
number for persons who have
obligations to declare taxes in
Denmark. The tax identification
number also serves as a personal
health insurance number.
Finland Tax Identification Number Data Identifiers Finland issues a tax identification
number for persons who have
obligations to declare taxes in Finland.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Germany Tax Identification Number Data Identifiers Germany issues a tax identification
number for persons who have
obligations to declare taxes in
Germany.
UK Value Added Tax (VAT) Number Data Identifiers VAT is a consumption tax that is borne
by the end consumer. VAT is paid for
each transaction in the manufacturing
and distribution process. For the
United Kingdom, the VAT number is
issued by the VAT office for the region
in which the business is established.
Spain Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that is borne
Number by the end consumer. VAT is paid for
each transaction in the manufacturing
and distribution process. VAT in Spain
is overseen by the State Tax
Administration Agency.
UK Bank Account Number Sort Data Identifiers Sort codes are bank codes used to
Code route money transfers between banks
within their respective countries via
their respective clearance
organizations.
Greece Social Security Number Data Identifiers The AMKA (social security number) is
(AMKA) the work and insurance identification
number of every worker, retired person
and protected family member in
Greece.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Slovenia Unique Master Citizen Data Identifiers The unique master citizen number is
Number a unique identification number
assigned to every citizen of Slovenia
at birth or on acquiring citizenship.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Greece Passport Number Data Identifiers Greek passports are issued to Greek
citizens for the purpose of international
travel. The passport along with the
national identity card allows for free
rights of movement and residence in
any of the states of the European
Union and European Economic Area.
Greece Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by the
end consumer. VAT is paid for each
transaction in the manufacturing and
distribution process. For Greece, VAT
is administered by the VAT office for
the region in which the business is
established.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Poland Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by the
end consumer. VAT is paid for each
transaction in the manufacturing and
distribution process. For Poland, VAT
is administered by the VAT office for
the region in which the business is
established.
Romania Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by the
end consumer. VAT is paid for each
transaction in the manufacturing and
distribution process. In Romania, it is
also called TVA or CIF.
Czech Republic Value Added Tax Data Identifiers Value Added Tax (VAT) is a
(VAT) Number consumption tax that is borne by the
end consumer. VAT is paid for each
transaction in the manufacturing and
distribution process. In the Czech
Republic, it is also called DPH.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Slovakia Passport Number Data Identifiers Slovak passports are issued to citizens
of Slovakia to facilitate international
travel.
Slovakia Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by the
end consumer. VAT is paid for each
transaction in the manufacturing and
distribution process. For Slovakia, VAT
is administered by the tax office for the
region in which the business is
established.
Slovenia Tax Identification Number Data Identifiers The Slovenia Tax Identification
Number is a unique identifier of
individuals and legal entities for tax
purposes. The Financial Administration
of the Republic of Slovenia issues and
administers tax identification numbers
in Slovenia.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Slovenia Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by the
end consumer. VAT is paid for each
transaction in the manufacturing and
distribution process. For Slovenia, VAT
is administered by the tax office for the
region in which the business is
established.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Estonia Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by the
end consumer. VAT is paid for each
transaction in the manufacturing and
distribution process. For Estonia, VAT
is administered by tax office for the
region in which the business is
established.
Lithuania Tax Identification Number Data Identifiers The Lithuanian Taxpayer Identification
Number is used to identify taxpayers
and facilitate the administration of their
national tax affairs.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Lithuania Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by the
end consumer. VAT is paid for each
transaction in the manufacturing and
distribution process. In Lithuania, VAT
is administered by the State Tax
Inspectorate.
Latvia Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by the
end consumer. VAT is paid for each
transaction in the manufacturing and
distribution process. In Latvia, VAT is
administered by the State Revenue
Service.
Bulgaria Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by the
end consumer. VAT is paid for each
transaction in the manufacturing and
distribution process. In Bulgaria, VAT
is administered by the National
Revenue Agency, which is overseen
by the Bulgarian Ministry of Finance.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Malta Tax Identification Number Data Identifiers The Malta Tax Identification Number
is assigned by the Inland Revenue
Department as a means of
identification for income tax purposes.
Malta Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by the
end consumer. VAT is paid for each
transaction in the manufacturing and
distribution process. In Malta, VAT is
administered by tax office for the
region in which the business is
established.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Serbia Unique Master Citizen Data Identifiers The Serbian Unique Master Citizen
Number Number is a unique identifier for
Serbian citizens. It is assigned to every
citizen of Serbia at birth or upon
acquiring citizenship.
Switzerland Passport Number Data Identifiers Swiss passports are issued to citizens
of Switzerland to facilitate international
travel.
Iceland Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by the
end consumer. VAT is paid for each
transaction in the manufacturing and
distribution process. For Iceland, VAT
is administered by the VAT office for
the region in which the business is
established.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Switzerland Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by the
end consumer. VAT is paid for each
transaction in the manufacturing and
distribution process. For Switzerland,
VAT is administered by the Federal
Statistical Office for the region in which
the business is established.
Serbia Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by the
end consumer. VAT is paid for each
transaction in the manufacturing and
distribution process. In Serbia, VAT is
administered by the Tax Administration
department of the Ministry of Finance.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Norway Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by the
end consumer. VAT is paid for each
transaction in the manufacturing and
distribution process. For Norway, VAT
Is administered by the VAT office for
the region in which the business is
established.
Czech Republic Driver's Licence Data Identifiers The Czech Republic Ministry of
Number Transport grants driver's licenses in
the Czech Republic, confirming the
rights of the holder to drive motor
vehicles.
Slovakia Driver's Licence Number Data Identifiers A Slovak drivers license is a document
confirming the rights of the holder to
drive motor vehicles. Slovak driver's
licenses are granted by the Ministry of
Interior.
Poland Driver's Licence Number Data Identifiers Poland issues driving licenses
confirming the rights of the holder to
drive motor vehicles.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Norway Driver's Licence Number Data Identifiers A driver's license is required in Norway
before a person is permitted to drive
a motor vehicle of any description on
a road in Norway.
Cyprus Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by the
end consumer. VAT is paid for each
transaction in the manufacturing and
distribution process. For Cyprus, VAT
is administered by the tax office for the
region in which the business is
established.
Cyprus Tax Identification Number Data Identifiers The Cyprus Tax Identification Number
is a unique identifier for Cypriot
taxpayers.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
Estonia Driver's Licence Number Data Identifiers The Estonian Road Administration
issues driving licenses in Estonia,
confirming the rights of the holder to
drive motor vehicles.
SEPA Creditor Identifier Number Data Identifiers The Single Euro Payment Area
North (SEPA) is a payments system created
by the European Union that
harmonizes the way cashless
payments transact between Euro
countries. SEPA North is for the United
Kingdom, Sweden, Denmark, Finland,
Ireland. European consumers,
businesses, and government agents
who make payments by direct debit,
credit card or through credit transfers
use the SEPA architecture. The Single
Euro Payment Area is approved and
regulated by European Commission.
SEPA Creditor Identifier Number Data Identifiers The Single Euro Payment Area
South (SEPA) is a payments system created
by the European Union that
harmonizes the way cashless
payments transact between Euro
countries. SEPA South is for Italy,
Spain, and Portugal. European
consumers, businesses, and
government agents who make
payments by direct debit, credit card
or through credit transfers use the
SEPA architecture. The Single Euro
Payment Area is approved and
regulated by European Commission.
Table 46-29 General Data Protection Regulations (Banking and Finance) detection rules
(continued)
SEPA Creditor Identifier Number Data Identifiers The Single Euro Payment Area
West (SEPA) is a payments system created
by the European Union that
harmonizes the way cashless
payments transact between Euro
countries. SEPA West is for Germany,
France, Netherlands, Belgium, Austria,
and Luxembourg. European
consumers, businesses, and
government agents who make
payments by direct debit, credit card,
or through credit transfers use the
SEPA architecture. The Single Euro
Payment Area is approved and
regulated by European Commission.
Table 46-30 General Data Protection Regulations (Digital Identity) detection rule
UK Electoral Roll Number Data Identifiers The Electoral Roll Number is the
identification number issued to an
individual for UK election
registration. The format of this
number is specified by the UK
Government Standards of the UK
Cabinet Office.
Czech Personal Identification Data Identifiers All citizens of the Czech Republic
Number are issued a unique personal
identification number by the
Ministry of Interior.
French Social Security Number Data Identifiers The French Social Security
Number (FSSN) is a unique
number assigned to each French
citizen or resident foreign national.
It serves as a national
identification number.
Irish Personal Public Service Data Identifiers The format of the number is a
Number unique 8-character alphanumeric
string ending with a letter, such
as 8765432A. The number is
assigned at the registration of
birth of the child and is issued on
a Public Services Card and is
unique to every person.
Polish Social Security Number Data Identifiers The Polish Social Security
(PESEL) Number (PESEL) is the national
identification number used in
Poland. The PESEL number is
mandatory for all permanent
residents of Poland and for
temporary residents living in
Poland. It uniquely identifies a
person and cannot be transferred
to another.
Bulgarian Uniform Civil Number Data Identifiers The uniform civil number (EGN)
is unique number assigned to
each Bulgarian citizen or resident
foreign national. It serves as a
national identification number. An
EGN is assigned to Bulgarians at
birth, or when a birth certificate is
issued.
See “Burgerservicenummer”
on page 1066.
Belgium Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that is
Number borne by the end consumer. VAT
is paid for each transaction in the
manufacturing and distribution
process. For Belgium, the Value
Added Tax is issued by VAT office
for the region in which the
business is established.
Netherlands Value Added Tax Data Identifiers VAT is a consumption tax that is
(VAT) Number borne by the end consumer. VAT
is paid for each transaction in the
manufacturing and distribution
process. For the Netherlands, the
Value Added Tax is issued by
VAT office for the region in which
the business is established.
Italy Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that is
Number borne by the end consumer. VAT
is paid for each transaction in the
manufacturing and distribution
process. For Italy, the Value
Added Tax is issued by VAT office
for the region in which the
business is established.
Ukraine Identity Card Data Identifiers The Ukraine Identity Card has a
15-digit record number issued to
citizens of Ukraine. It is used as
a form of identification in place of
Ukraine's domestic passport as of
January 2016.
Germany Value Added Tax Data Identifiers VAT is a consumption tax that is
(VAT) Number borne by the end consumer. VAT
is paid for each transaction in the
manufacturing and distribution
process. For Germany, the Value
Added Tax is issued by VAT office
for the region in which the
business is established.
France Value Added Tax (VAT) Data Identifiers The Value Added Tax (VAT), is a
Number tax levied on goods and services
provided in France and is
collected from the final customer.
Companies must register with the
Register of Commerce and
Companies in France to get VAT
number allocated.
Austria Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that is
Number borne by the end consumer. VAT
is paid for each transaction in the
manufacturing and distribution
process. For Austria, the VAT
number is issued by the tax office
for the region in which the
business is established.
Sweden Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that is
Number borne by the end consumer. VAT
is paid for each transaction in the
manufacturing and distribution
process.
Denmark Value Added Tax Data Identifiers VAT is a consumption tax that is
(VAT) Number borne by the end consumer. VAT
is paid for each transaction in the
manufacturing and distribution
process. For Denmark, the VAT
number is issued by the tax office
for the region in which the
business is established.
Finland Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that is
Number borne by the end consumer. VAT
is paid for each transaction in the
manufacturing and distribution
process.
Ireland Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that is
Number borne by the end consumer. VAT
is paid for each transaction in the
manufacturing and distribution
process. For Ireland, the VAT
number is issued by the Irish tax
authority.
Portugal Value Added Tax Data Identifiers VAT is a consumption tax that is
(VAT) Number borne by the end consumer. VAT
is paid for each transaction in the
manufacturing and distribution
process.
Luxembourg Value Added Tax Data Identifiers VAT is a consumption tax that is
(VAT) Number borne by the end consumer. VAT
is paid for each transaction in the
manufacturing and distribution
process.
Portugal Driver's Licence Data Identifiers The Institute for Mobility and Land
Number Transport (IMTT) issues driver's
licenses in Portugal.
UK Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that is
Number borne by the end consumer. VAT
is paid for each transaction in the
manufacturing and distribution
process. For the United Kingdom,
the VAT number is issued by the
VAT office for the region in which
the business is established.
Spain Value Added Tax (VAT) Data Identifiers VAT is a consumption tax that is
Number borne by the end consumer. VAT
is paid for each transaction in the
manufacturing and distribution
process. VAT in Spain is overseen
by the State Tax Administration
Agency.
UK Bank Account Number Sort Data Identifiers Sort codes are bank codes used
Code to route money transfers between
banks within their respective
countries via their respective
clearance organizations.
Greece Social Security Number Data Identifiers The AMKA (social security
(AMKA) number) is the work and
insurance identification number of
every worker, retired person and
protected family member in
Greece.
Slovenia Unique Master Citizen Data Identifiers The unique master citizen number
Number is a unique identification number
assigned to every citizen of
Slovenia at birth or on acquiring
citizenship.
Greece Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by
the end consumer. VAT is paid for
each transaction in the
manufacturing and distribution
process. For Greece, VAT is
administered by the VAT office for
the region in which the business
is established.
Poland Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by
the end consumer. VAT is paid for
each transaction in the
manufacturing and distribution
process. For Poland, VAT is
administered by the VAT office for
the region in which the business
is established.
Romania Value Added Tax Data Identifiers Value Added Tax (VAT) is a
(VAT) Number consumption tax that is borne by
the end consumer. VAT is paid for
each transaction in the
manufacturing and distribution
process. In Romania, it is also
called TVA or CIF.
Czech Republic Value Added Data Identifiers Value Added Tax (VAT) is a
Tax (VAT) Number consumption tax that is borne by
the end consumer. VAT is paid for
each transaction in the
manufacturing and distribution
process. In the Czech Republic,
it is also called DPH.
Slovakia Value Added Tax Data Identifiers Value Added Tax (VAT) is a
(VAT) Number consumption tax that is borne by
the end consumer. VAT is paid for
each transaction in the
manufacturing and distribution
process. For Slovakia, VAT is
administered by the tax office for
the region in which the business
is established.
Slovenia Value Added Tax Data Identifiers Value Added Tax (VAT) is a
(VAT) Number consumption tax that is borne by
the end consumer. VAT is paid for
each transaction in the
manufacturing and distribution
process. For Slovenia, VAT is
administered by the tax office for
the region in which the business
is established.
Estonia Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by
the end consumer. VAT is paid for
each transaction in the
manufacturing and distribution
process. For Estonia, VAT is
administered by tax office for the
region in which the business is
established.
Lithuania Value Added Tax Data Identifiers Value Added Tax (VAT) is a
(VAT) Number consumption tax that is borne by
the end consumer. VAT is paid for
each transaction in the
manufacturing and distribution
process. In Lithuania, VAT is
administered by the State Tax
Inspectorate.
Latvia Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by
the end consumer. VAT is paid for
each transaction in the
manufacturing and distribution
process. In Latvia, VAT is
administered by the State
Revenue Service.
Bulgaria Value Added Tax Data Identifiers Value Added Tax (VAT) is a
(VAT) Number consumption tax that is borne by
the end consumer. VAT is paid for
each transaction in the
manufacturing and distribution
process. In Bulgaria, VAT is
administered by the National
Revenue Agency, which is
overseen by the Bulgarian
Ministry of Finance.
Malta Tax Identification Number Data Identifiers The Malta Tax Identification
Number is assigned by the Inland
Revenue Department as a means
of identification for income tax
purposes.
Malta Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by
the end consumer. VAT is paid for
each transaction in the
manufacturing and distribution
process. In Malta, VAT is
administered by tax office for the
region in which the business is
established.
Serbia Unique Master Citizen Data Identifiers The Serbian Unique Master
Number Citizen Number is a unique
identifier for Serbian citizens. It is
assigned to every citizen of Serbia
at birth or upon acquiring
citizenship.
Iceland Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by
the end consumer. VAT is paid for
each transaction in the
manufacturing and distribution
process. For Iceland, VAT is
administered by the VAT office for
the region in which the business
is established.
Switzerland Value Added Tax Data Identifiers Value Added Tax (VAT) is a
(VAT) Number consumption tax that is borne by
the end consumer. VAT is paid for
each transaction in the
manufacturing and distribution
process. For Switzerland, VAT is
administered by the Federal
Statistical Office for the region in
which the business is established.
Serbia Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by
the end consumer. VAT is paid for
each transaction in the
manufacturing and distribution
process. In Serbia, VAT is
administered by the Tax
Administration department of the
Ministry of Finance.
Norway Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by
the end consumer. VAT is paid for
each transaction in the
manufacturing and distribution
process. For Norway, VAT Is
administered by the VAT office for
the region in which the business
is established.
Cyprus Value Added Tax (VAT) Data Identifiers Value Added Tax (VAT) is a
Number consumption tax that is borne by
the end consumer. VAT is paid for
each transaction in the
manufacturing and distribution
process. For Cyprus, VAT is
administered by the tax office for
the region in which the business
is established.
SEPA Creditor Identifier Data Identifiers The Single Euro Payment Area
Number North (SEPA) is a payments system
created by the European Union
that harmonizes the way cashless
payments transact between Euro
countries. SEPA North is for the
United Kingdom, Sweden,
Denmark, Finland, Ireland.
European consumers,
businesses, and government
agents who make payments by
direct debit, credit card or through
credit transfers use the SEPA
architecture. The Single Euro
Payment Area is approved and
regulated by European
Commission.
SEPA Creditor Identifier Data Identifiers The Single Euro Payment Area
Number South (SEPA) is a payments system
created by the European Union
that harmonizes the way cashless
payments transact between Euro
countries. SEPA South is for Italy,
Spain, and Portugal. European
consumers, businesses, and
government agents who make
payments by direct debit, credit
card or through credit transfers
use the SEPA architecture. The
Single Euro Payment Area is
approved and regulated by
European Commission.
SEPA Creditor Identifier Data Identifiers The Single Euro Payment Area
Number West (SEPA) is a payments system
created by the European Union
that harmonizes the way cashless
payments transact between Euro
countries. SEPA West is for
Germany, France, Netherlands,
Belgium, Austria, and
Luxembourg. European
consumers, businesses, and
government agents who make
payments by direct debit, credit
card, or through credit transfers
use the SEPA architecture. The
Single Euro Payment Area is
approved and regulated by
European Commission.
Table 46-32 General Data Protection Regulations (Healthcare and Insurance) detection rules
Table 46-32 General Data Protection Regulations (Healthcare and Insurance) detection rules
(continued)
Table 46-32 General Data Protection Regulations (Healthcare and Insurance) detection rules
(continued)
Czech Personal Identification Data Identifiers All citizens of the Czech Republic
Number are issued a unique personal
identification number by the
Ministry of Interior.
French Social Security Number Data Identifiers The French Social Security
Number (FSSN) is a unique
number assigned to each French
citizen or resident foreign national.
It serves as a national
identification number.
Table 46-32 General Data Protection Regulations (Healthcare and Insurance) detection rules
(continued)
Irish Personal Public Service Data Identifiers The format of the number is a
Number unique 8-character alphanumeric
string ending with a letter, such
as 8765432A. The number is
assigned at the registration of
birth of the child and is issued on
a Public Services Card and is
unique to every person.
Table 46-32 General Data Protection Regulations (Healthcare and Insurance) detection rules
(continued)
Polish Social Security Number Data Identifiers The Polish Social Security
(PESEL) Number (PESEL) is the national
identification number used in
Poland. The PESEL number is
mandatory for all permanent
residents of Poland and for
temporary residents living in
Poland. It uniquely identifies a
person and cannot be transferred
to another.
Table 46-32 General Data Protection Regulations (Healthcare and Insurance) detection rules
(continued)
Bulgarian Uniform Civil Number Data Identifiers The uniform civil number (EGN)
is unique number assigned to
each Bulgarian citizen or resident
foreign national. It serves as a
national identification number. An
EGN is assigned to Bulgarians at
birth, or when a birth certificate is
issued.
Table 46-32 General Data Protection Regulations (Healthcare and Insurance) detection rules
(continued)
See “Burgerservicenummer”
on page 1066.
Table 46-32 General Data Protection Regulations (Healthcare and Insurance) detection rules
(continued)
Table 46-32 General Data Protection Regulations (Healthcare and Insurance) detection rules
(continued)
Italy Health Insurance Number Data Identifiers The Italian Health Insurance Card
is issued to every Italian citizen
by the Italian Ministry of Economy
and Finance in cooperation with
the Italian Agency of Revenue.
The objective of the card is to
improve the social security
services through expenditure
control and performance, and to
optimize the use health services
to citizens.
Table 46-32 General Data Protection Regulations (Healthcare and Insurance) detection rules
(continued)
Portugal Driver's Licence Data Identifiers The Institute for Mobility and Land
Number Transport (IMTT) issues driver's
licenses in Portugal.
Greece Social Security Number Data Identifiers The AMKA (social security
(AMKA) number) is the work and
insurance identification number of
every worker, retired person and
protected family member in
Greece.
Table 46-32 General Data Protection Regulations (Healthcare and Insurance) detection rules
(continued)
Slovenia Unique Master Citizen Data Identifiers The unique master citizen number
Number is a unique identification number
assigned to every citizen of
Slovenia at birth or on acquiring
citizenship.
Table 46-32 General Data Protection Regulations (Healthcare and Insurance) detection rules
(continued)
Table 46-32 General Data Protection Regulations (Healthcare and Insurance) detection rules
(continued)
Table 46-32 General Data Protection Regulations (Healthcare and Insurance) detection rules
(continued)
Serbia Unique Master Citizen Data Identifiers The Serbian Unique Master
Number Citizen Number is a unique
identifier for Serbian citizens. It is
assigned to every citizen of Serbia
at birth or upon acquiring
citizenship.
Table 46-32 General Data Protection Regulations (Healthcare and Insurance) detection rules
(continued)
Table 46-32 General Data Protection Regulations (Healthcare and Insurance) detection rules
(continued)
Table 46-33 General Data Protection Regulations (Personal Profile) detection rule
Table 46-33 General Data Protection Regulations (Personal Profile) detection rule (continued)
Table 46-33 General Data Protection Regulations (Personal Profile) detection rule (continued)
Table 46-34 General Data Protection Regulations (Travel) detection rules (continued)
Table 46-34 General Data Protection Regulations (Travel) detection rules (continued)
Table 46-34 General Data Protection Regulations (Travel) detection rules (continued)
Table 46-34 General Data Protection Regulations (Travel) detection rules (continued)
Table 46-34 General Data Protection Regulations (Travel) detection rules (continued)
Table 46-34 General Data Protection Regulations (Travel) detection rules (continued)
Table 46-34 General Data Protection Regulations (Travel) detection rules (continued)
Table 46-34 General Data Protection Regulations (Travel) detection rules (continued)
Portugal Driver's Licence Data Identifiers The Institute for Mobility and Land
Number Transport (IMTT) issues driver's
licenses in Portugal.
Table 46-34 General Data Protection Regulations (Travel) detection rules (continued)
Table 46-34 General Data Protection Regulations (Travel) detection rules (continued)
Table 46-34 General Data Protection Regulations (Travel) detection rules (continued)
Table 46-34 General Data Protection Regulations (Travel) detection rules (continued)
Username/Password Simple rule: EDM This rule looks for user names and passwords in combination.
Combinations
See “Choosing an Exact Data Profile” on page 409.
Exact SSN or CCN Simple rule: EDM This rule looks for SSN or Credit Card Number.
Customer Directory Simple rule: EDM This rule looks for Phone or Email.
3 or more critical customer Simple rule: EDM This rule looks for a match among any three of the following fields:
fields
■ Account number
■ Bank card number
■ Email address
■ First name
■ Last name
■ PIN number
■ Phone number
■ Social security number
■ ABA Routing Number
■ Canadian Social Insurance Number
■ UK National Insurance Number
■ Date of Birth
However, the following combinations are not a match:
ABA Routing Numbers Simple rule: DCM This condition detects nine-digit numbers. It validates the number
(DI) using the final check digit. This condition eliminates common test
numbers, such as 123456789, number ranges that are reserved for
future use, and all the same digit. This condition also requires the
presence of an ABA-related keyword.
See “ABA Routing Number” on page 1013.
Library of policy templates 1690
HIPAA and HITECH (including PHI) policy template
US Social Security Numbers Simple rule: DCM This rule looks for social security numbers. For this rule to match,
(DI) there must be a number that fits the Randomized US SSN data
identifier. There must also be a keyword or phrase that indicates the
presence of a US SSN with a keyword from "US SSN Keywords"
dictionary. The keyword condition is included to reduce false positives
with any numbers that may match the SSN format.
Credit Card Numbers Simple rule: DCM This condition detects valid credit card numbers that are separated
(DI) by spaces, dashes, periods, or without separators. This condition
performs Luhn check validation and includes the following credit
card formats:
■ American Express
■ Diner's Club
■ Discover
■ Japan Credit Bureau (JCB)
■ MasterCard
■ Visa
Randomized US Social Security Number (SSN) data identifier, which detects both traditional
and randomized SSNs.
See “Keep the keyword lists for your HIPAA and Caldicott policies up to date” on page 850.
See “Updating policies to use the Randomized US SSN data identifier” on page 810.
Table 46-36 describes the TPO exception that is provided by the template. TPOs (Treatment,
Payment, or health care Operations) are service providers to health care organizations and
have an exception for HIPAA information restrictions. The template requires that you enter the
allowed email addresses. If implemented the exception is evaluated before detection rules
and the policy does not trigger an incident if the protected information is sent to one of the
allowed partners.
TPO Exception Content Matches Keyword Simple exception (single condition match).
(DCM)
Looks for a recipient email address matching one from
the "TPO Email Addresses" user-defined keyword
dictionary.
Table 46-37 is a rule that looks for an exact data match against any single column from a
profiled Patient Data database record.
Patient Data Content Matches Exact Data Match data from any single field:
(EDM)
■ Last name
■ Tax payer ID (SSN)
■ Email address
■ Account number
■ ID card number
■ Phone number
Table 46-38 is a compound detection rule that requires a Patient Data exact match and a
match from the "Drug Code" data identifier.
Library of policy templates 1692
HIPAA and HITECH (including PHI) policy template
Patient Data and Drug Codes Content Matches Exact Data Looks for a match against any single column from a
(EDM) profiled Patient Data database record and a match from
the National Drug Code data identifier.
And
See Table 46-37 on page 1691.
Content Matches Data
Identifier See “National Drug Code (NDC)” on page 1355.
Table 46-39 is a compound detection rule that requires a Patient Data exact match and a
keyword match from the "Prescription Drug Names" dictionary.
Table 46-39 Patient Data and Prescription Drug Names detection rule
Patient Data and Prescription Content Matches Exact Data Looks for a match against any single column from a
Drug Names (EDM) profiled Patient Data database record and a keyword
match from the Prescription Drug Names dictionary
AND
See Table 46-37 on page 1691.
Content Matches Keyword
(DCM) See “Updating policies after upgrading to the latest
version” on page 447.
Table 46-40 is a compound detection rule that requires a Patient Data exact match and keyword
match from the "Medical Treatment Keywords" dictionary.
Patient Data and Treatment Content Matches Exact Data Looks for a match against any single column from a
Keywords (EDM) profiled Patient Data database record and a keyword
match from the Medical Treatment Keywords dictionary.
And
See Table 46-37 on page 1691.
Content Matches Keyword
(DCM) See “Updating policies after upgrading to the latest
version” on page 447.
Table 46-41 is a compound detection rule that requires a Patient Data exact match and a
keyword match from the "Disease Names" dictionary.
Library of policy templates 1693
HIPAA and HITECH (including PHI) policy template
Patient Data and Disease Content Matches Exact Data Looks for a match against any single column from a
Keywords (EDM) profiled Patient Data database record and a keyword
match from the Disease Names dictionary.
And
See Table 46-37 on page 1691.
Content Matches Keyword
(DCM) See “Updating policies after upgrading to the latest
version” on page 447.
Table 46-42 is a compound detection rule that looks for SSNs using the Randomized US Social
Security Number (SSN) data identifier and for a keyword from the "Prescription Drug Names"
dictionary.
SSN and Drug Keywords Content Matches Data Randomized US Social Security Number (SSN) data
Identifier identifier (narrow breadth)
Table 46-43 is a compound detection rule that looks for SSNs using the Randomized US Social
Security Number (SSN) data identifier and for a keyword match from the "Medical Treatment
Keywords" dictionary.
SSN and Treatment Content Matches Data Randomized US Social Security Number (SSN) data
Keywords Identifier identifier (narrow breadth)
Table 46-44 is a compound detection rule that looks for SSNs using the Randomized US Social
Security Number (SSN) data identifier and for a keyword match from the "Disease Names"
dictionary.
SSN and Disease Keywords Content Matches Data Randomized US Social Security Number (SSN) data
Identifier identifier (narrow breadth)
Table 46-45 is a compound detection rule that looks for SSNs using the Randomized US Social
Security Number (SSN) data identifier and for a drug code using the Drug Code data identifier.
SSN and Drug Code Content Matches Data Randomized US Social Security Number (SSN) data
Identifier identifier (narrow breadth)
This compound rule looks for two data types, last name and electoral roll number,
in combination with a keyword from the "UK Personal Data Keywords" dictionary.
This rule looks for five instances of keywords from the "Street Drug Names"
dictionary.
This rule looks for five instances of keywords from the "Manufactured Controlled
Substances" dictionary.
ITIN This rule looks for a match to the US ITIN data identifier and a keyword from the
"US ITIN Keywords" dictionary.
Table 46-47 Indexed ITAR Munition Items and Recipients detection rule
Compound rule Recipient Matches Match recipient email or URL domain from ITAR Country
Pattern (DCM) Codes list:
■ Severity: High.
■ Check for existence.
■ At least 1 recipient(s) must match.
Content Matches Exact See “Choosing an Exact Data Profile” on page 409.
Data (EDM)
The ITAR Munitions List and Recipients detection rule looks for both a country code in the
recipient from the "ITAR Country Codes" dictionary and a keyword from the "ITAR Munition
Names" dictionary.
Library of policy templates 1697
Media Files policy template
Compound rule Recipient Matches Match recipient email or URL domain from ITAR Country
Pattern (DCM) Codes list:
■ Severity: High.
■ Check for existence.
■ At least 1 recipient pattern must match.
Content Matches Match any keyword from the ITAR Munitions List:
Keyword (DCM)
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
■ Severity: High.
■ qt
■ riff
■ macromedia_dir
■ midi
■ mp3
■ mpeg_movie
■ quickdraw
■ realaudio
■ wav
■ video_win
■ vrml
Library of policy templates 1698
Medicare and Medicaid (including PHI)
This rule looks for file name extensions from the "Media Files Extensions" dictionary.
Healthcare Common Procedure Data Identifiers These three rules match the medium
Coding System (HCPCS CPT breadth of the Healthcare Common
and
Codes) Procedure Coding System (HCPCS
Keywords CPT Codes) data identifier.
Medicare Beneficiary Identifier Data Identifiers This rule matches the narrow breadth
of the Medicare Beneficiary Identifier
data identifier.
Table 46-49 Medicare and Medicaid (including PHI) detection rules (continued)
Health Insurance Claim Number Data Identifiers This rule matches the narrow breadth
of the Health Insurance Claim
Number data identifier.
Condition Configuration
Contract Specific Keywords ■ Match any keyword: merger, agreement, contract, letter of intent, term sheet,
(Keyword Match) plan of reorganization
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
Acquisition Corporate Structure ■ Match any keyword: subsidiary, subsidiaries, affiliate, acquiror, merger sub,
Keywords (Keyword Match) covenantor, acquired company, acquiring company, surviving corporation,
surviving company
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
Library of policy templates 1700
NASD Rule 2711 and NYSE Rules 351 and 472 policy template
Table 46-50 Merger and Acquisition Agreements compound detection rule (continued)
Condition Configuration
Merger Consideration ■ Match any keyword: merger stock, merger consideration, exchange shares,
Keywords (Keyword Match) capital stock, dissenting shares, capital structure, escrow fund, escrow
account, escrow agent, escrow shares, escrow cash, escrow amount, stock
consideration, break-up fee, goodwill
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
Legal Contract Keywords ■ Match any keyword: recitals, in witness whereof, governing law, Indemnify,
(Keyword Match) Indemnified, indemnity, signature page, best efforts, gross negligence, willful
misconduct, authorized representative, severability, material breach
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
NASD Rule 2711 and NYSE Rules 351 and 472 policy
template
This policy protects the name(s) of any companies involved in an upcoming stock offering,
internal project names for the offering, and the stock ticker symbols for the offering companies.
The NASD Rule 2711 Documents, Indexed detection rule looks for content from specific
documents registered as sensitive and known to be subject to NASD Rule 2711 or NYSE
Rules 351 and 472. This rule returns a match if 80% or more of the source document is found.
Library of policy templates 1701
NASD Rule 2711 and NYSE Rules 351 and 472 policy template
Simple rule Content Matches NASD Rule 2711 Documents, Indexed (IDM):
Document
■ Detect documents in selected Indexed Document Profile
Signature (IDM)
■ Require at least 80% content match.
■ Severity: High.
■ Check for existence.
■ Look in body, attachments.
The NASD Rule 2711 and NYSE Rules 351 and 472 detection rule is a compound rule that
contains a sender condition and a keyword condition. The sender condition is based on a
user-defined list of email addresses of research analysts at the user's company ("Analysts'
Email Addresses" dictionary). The keyword condition looks for any upcoming stock offering,
internal project names for the offering, and the stock ticker symbols for the offering companies
("NASD 2711 Keywords" dictionary). Like the sender condition, it requires editing by the user.
Table 46-52 NASD Rule 2711 and NYSE Rules 351 and 472 detection rule
Compound rule Sender/User NASD Rule 2711 and NYSE Rules 351 and 472 (Sender):
Matches Pattern
■ Match sender pattern(s) [[email protected]] (user defined)
(DCM)
■ Severity: High.
■ Matches on entire message.
Content Matches NASD Rule 2711 and NYSE Rules 351 and 472 (Keyword Match):
Keyword (DCM)
■ Match "[company stock symbol]", "[name of offering company]", "[offering
name (internal name)]".
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
Content Matches Keyword Match keyword: "stock, stocks, security, securities, share, shares"
(DCM)
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
The NASD Rule 3010 and NYSE Rule 342 Keywords detection rule looks for keywords in the
"NASD 3010 General Keywords" dictionary, which look for any general stock broker activity,
and stock keywords.
Library of policy templates 1703
NERC Security Guidelines for Electric Utilities policy template
Table 46-54 NASD Rule 3010 and NYSE Rule 342 Keywords detection rule
Compound rule Content Matches Keyword Match keyword: "authorize", "discretion", "guarantee", "options"
(DCM)
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
Content Matches Keyword Match keyword: "stock, stocks, security, securities, share, shares"
(DCM)
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
Simple rule Content Matches Exact Data Match any three of the following data items:
(EDM)
■ First name
■ Last name
■ Phone
■ Email
Simple rule Content Matches Indexed This rule requires a 90% binary match.
Documents (IDM)
See “Choosing an Indexed Document Profile” on page 411.
The Sensitive Keywords and Vulnerability Keywords detection rule looks for any keyword
matches from the "Sensitive Keywords" dictionary and the "Vulnerability Keywords" dictionary.
This rule looks for content from specific network diagrams that are registered as
confidential. This rule returns a match if 80% or more of the source document is
detected.
This rule looks for a Visio file type in combination with an IP address data identifier.
Library of policy templates 1705
Network Security policy template
This rule looks for a Visio file type in combination with phrase variations of "IP
address" with a data identifier.
This rule looks for a GoToMyPC command format with a data identifier.
This rule looks for a keyword from the "Hacker Keywords" dictionary.
This rule looks for a keyword from the "Keylogger Keywords" dictionary.
This rule looks for any single keyword in the "Offensive Language, Explicit" dictionary.
This rule looks for any three instances of keywords in the "Offensive Language,
General" dictionary.
Table 46-58 OFAC Special Designated Nationals List and Recipients detection rule
Compound rule Recipient Matches OFAC Special Designated Nationals List and Recipients (Recipient):
Pattern (DCM)
■ Match email or URL domain by OFAC SDN Country Code.
■ Severity: High.
■ Check for existence.
■ At least 1 recipient(s) must match.
■ Matches on the entire message.
The Communications to OFAC countries detection rule looks for a recipient with a country
code matching entries from the "OFAC Country Codes" list.
and guidelines for data security under the Federal Information Security Management Act
(FISMA).
This template contains three simple detection rules. If any rule reports a match, the policy
triggers an incident.
The High Confidentiality Indicators detection rule looks for any keywords in the "High
Confidentiality" dictionary.
The Moderate Confidentiality Indicators detection rule looks for any keywords in the "Moderate
Confidentiality" dictionary.
The Low Confidentiality Indicators detection rule looks for any keywords in the "Low
Confidentiality" dictionary.
Library of policy templates 1709
Password Files policy template
This rule looks for a regular expression pattern with the /etc/passwd format.
This rule looks for a regular expression pattern with the /etc/shadow format.
This rule looks for a regular expression pattern with the SAM format.
program both work toward enforcing these standards. The Payment Card Industry (PCI) Data
Security Standards policy detects Visa and MasterCard credit card number data.
The Card Numbers, Exact detection rule detects exact credit card numbers profiled from a
database or other data source.
Simple rule Content Matches This rule detects credit card numbers.
Exact Data (EDM)
See “Choosing an Exact Data Profile” on page 409.
The Credit Card Numbers, All detection rule detects credit card numbers using the Credit Card
Number system Data Identifier.
Simple rule Content Matches Credit Card Numbers, All (Data Identifiers):
Data Identifier
■ Data Identifier: Credit Card Number (narrow)
(DCM)
See “Credit Card Number” on page 1095.
■ Severity: High.
■ Count all matches.
■ Look in envelope, subject, body, attachments.
The Magnetic Stripe Data for Credit Cards detection rule detects raw data from the credit card
magnetic stripe using the Credit Card Magnetic Stripe system Data Identifier.
Table 46-65 Magnetic Stripe Data for Credit Cards detection rule
Simple rule Content Matches Magnetic Stripe Data for Credit Cards (Data Identifiers):
Data Identifier
■ Data Identifier: Credit Card Magnetic Stripe (medium)
(DCM)
See “Credit Card Number” on page 1095.
■ Data Severity: High.
■ Count all matches.
■ Look in envelope, subject, body, attachments.
EDM Rule The PIPEDA detection rule matches any two However, the following combinations do not create a
of the following data items: match:
The PIPEDA Contact Info detection rule looks for a match of two data items, with certain data
combinations excepted from matching.
Library of policy templates 1712
PIPEDA policy template
Detection Description
method
EDM Rule This rule looks for any two of the following data columns:
■ Last name
■ Phone
■ Account number
■ User name
■ Email
Detection Description
method
DCM Rule This rule implements the narrow breadth edition of the Canadian Social Insurance Number data
identifier.
Detection Description
method
DCM Rule This rule implements the narrow breadth edition of the ABA Routing Number data identifier.
Detection Description
method
DCM Rule This rule implements the narrow breadth edition of the Credit Card Number data identifier.
This rule looks for the combination of user-specified Stock Keeping Unit (SKU)
numbers and the price for that SKU number.
Note: This template contains one EDM detection rule. If you do not have an EDM profile
configured, or you are using Symantec Data Loss Prevention Standard, this policy template
is empty and contains no rule to configure.
This rule looks for content from specific project data files registered as proprietary.
It returns a match if the engine detects 80% or more of the source document.
This rule looks for any keywords in the "Sensitive Project Code Names" dictionary,
which is user-defined.
This rule looks for content from specific media files registered as proprietary.
Library of policy templates 1714
Publishing Documents policy template
■ qt
■ riff
■ macromedia_dir
■ midi
■ mp3
■ mpeg_movie
■ quickdraw
■ realaudio
■ wav
■ video_win
■ vrml
This rule looks for file name extensions from the "Media Files Extensions" dictionary.
This rule looks for content from specific publishing documents registered as
proprietary. It returns a match if the engine detects 80% or more of the source
document.
■ qxpress
■ frame
■ aldus_pagemaker
■ publ
This rule looks for specified file name extensions found in the "Publishing Document
Extensions" dictionary.
Library of policy templates 1715
Racist Language policy template
Note: Both file types and file name extensions are required for this policy because the detection
engine does not detect the true file type for all the required documents. As such, the file name
extension must be used with the file type.
This rule looks for any single keyword in the "Racist Language" dictionary.
This rule looks for messages to recipients with email addresses in the "Restricted
Recipients" dictionary.
This rule is a compound rule with two conditions; both must match to trigger an
incident. This rule contains an EDM condition for first and last names of employees
provided by the user. This rule also looks for a specific file type attachment (.doc)
that is less than 50 KB and contains at least one keyword from each of the following
dictionaries:
This rule looks for files of a specified type (.doc) that are less than 50 KB and match
at least one keyword from each of the following dictionaries:
This rule looks for URLs of Web sites that are used in job searches.
Simple rule Content Matches See “Choosing an Indexed Document Profile” on page 411.
Indexed Document
Profile
The SEC Fair Disclosure Regulation compound detection rule looks for the following conditions;
all must be satisfied for the rule to trigger an incident:
■ The SEC Fair Disclosure keywords indicate possible disclosure of advance financial
information ("SEC Fair Disclosure Keywords" dictionary).
■ An attachment or file type that is a commonly used document or spreadsheet format. The
detected file types are Microsoft Word, Excel Macro, Excel, Works Spreadsheet, SYLK
Spreadsheet, Corel Quattro Pro, WordPerfect, Lotus 123, Applix Spreadsheets, CSV,
Multiplan Spreadsheet, and Adobe PDF.
■ The company name keyword list requires editing by the user, which can include any name,
alternate name, or abbreviation that might indicate a reference to the company.
Library of policy templates 1718
Sarbanes-Oxley policy template
Compound rule Content Matches SEC Fair Disclosure Regulation (Keyword Match):
Keyword
■ Match keyword: earnings per share, forward guidance
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
■ Match on same component.
The keyword must be in the attachment or file type detected by that
condition.
The Financial Information detection rule looks for a specific file type containing a word from
the "Financial Keywords" dictionary and a word from the "Confidential/Proprietary Words"
dictionary. The spreadsheet file types detected are Microsoft Excel Macro, Microsoft Excel,
Microsoft Works Spreadsheet, SYLK Spreadsheet, Corel Quattro Pro, and more.
Library of policy templates 1719
SEC Fair Disclosure Regulation policy template
The SEC Fair Disclosure Regulation Documents, Indexed (IDM) detection rule looks for content
from specific documents subject to SEC Fair Disclosure regulation. This rule returns a match
if 80% or more of the source document content is found.
Table 46-74 SEC Fair Disclosure Regulation Documents, Indexed (IDM) detection rule
Simple rule Content Matches SEC Fair Disclosure Regulation Documents, Indexed (IDM):
Document
■ Detect documents from the selected Indexed Document Profile.
Signature (IDM)
See “Choosing an Indexed Document Profile” on page 411.
■ Match documents with at least 80% content match.
■ Severity: High.
■ Check for existence.
■ Look in body, attachments.
The SEC Fair Disclosure Regulation detection rule looks for the a keyword match from the
"SEC Fair Disclosure Keywords" dictionary, an attachment or file type that is a commonly used
document or spreadsheet, and a keyword match from the "Company Name Keywords"
dictionary.
All three conditions must be satisfied for the rule to trigger an incident:
■ The SEC Fair Disclosure keywords indicate possible disclosure of advance financial
information.
■ The file types detected are Microsoft Word, Excel Macro, Excel, Works Spreadsheet, SYLK
Spreadsheet, Corel Quattro Pro, WordPerfect, Lotus 123, Applix Spreadsheets, CSV,
Multiplan Spreadsheet, and Adobe PDF.
■ The company name keyword list requires editing by the user, which can include any name,
alternate name, or abbreviation that might indicate a reference to the company.
Library of policy templates 1721
Sexually Explicit Language policy template
Compound rule Content Matches SEC Fair Disclosure Regulation (Keyword Match):
Keyword (DCM)
■ Match "earnings per share", "forward guidance".
■ Severity: High.
■ Check for existence.
■ Look in envelope, subject, body, attachments.
■ Case insensitive.
■ Match on whole words only.
This rule looks for any single keyword in the "Sex. Explicit Keywords, Confirmed"
dictionary.
Library of policy templates 1722
Source Code policy template
This rule looks for any three instances of keywords in the "Sex. Explicit Words,
Suspect" dictionary.
This rule looks for any three instances of keywords in the "Sex. Explicit Words,
Possible" dictionary.
Source Code Documents IDM This rule looks for specific user-provided source code from a
Document Profile.
Source Code Extensions File Name Match This rule looks for a match among file name extensions from
the "Source Code Extensions" dictionary.
Java Source Code Regular Expressions This compound rule looks for matches on two different regular
expression patterns: Java Import Statements and Java Class
Files.
C Source Code Regular Expression This rule looks for matches on the C Source Code regular
expression pattern.
VB Source Code Regular Expression This rule looks for matches on the VB Source Code regular
expression pattern.
Perl Source Code Regular Expressions This compound rule looks for matches on three different
Perl-related regular expressions patterns.
Email to Described Email to Affiliates is a policy exception that allows ■ Simple exception (single
Affiliates identity (DCM) email messages to be sent to affiliates who are condition)
(Recipient) legitimately allowed to receive information ■ Match email recipient:
Recipient
covered under the State Data Privacy regulations. [affiliate1], [affiliate2].
Matches Pattern
Policy exceptions are evaluated before detection ■ Edit the "Affiliate Domains"
match conditions. If there is an exception, in this list and enter the email
case an affiliate email address that you have address for each recipient
entered, the entire message is discarded and not who may make acceptable
available for evaluation by detection. use of the confidential data.
■ At least 1 recipient(s) must
match for the exception to
trigger.
■ Matches on the entire
message.
The State Data Privacy policy template implements Exact Data Matching (Table 46-78). If you
do not select an Exact Data profile when you first create a policy based on this template, the
EDM condition is not available for use.
See “Choosing an Exact Data Profile” on page 409.
Library of policy templates 1724
State Data Privacy policy template
State Data Content matches This rule looks for an exact data match on three When you are creating the EDM
Privacy, Exact Data of the following: profile, you should validate it
Consumer (EDM) against the State Data Privacy
■ ABA Routing Number
Data template to ensure that the
■ Account Number
resulting index includes
■ Bank Card Number (credit card number) expected fields.
■ Birth Date
■ Simple rule (single match
■ Driver License Number
condition)
■ First Name
■ Severity: High
■ Last Name
■ Report incident if 1 match
■ Password
■ Look in envelope, body,
■ PIN Number
attachments
■ Social Security Number
■ State ID Card Number
Exception conditions: the following combinations
do not match:
Table 46-79 lists and describes the DCM detection rules implemented by the State Data Privacy
policy. If any one of these rules is violated the policy produces an incident, unless you have
configured the exception condition and the message recipient is an acceptable use affiliate.
US Social Content Matches The US Social Security Number Patterns rule is ■ Simple rule (single match
Security Data Identifier designed to detect US social security numbers condition)
Number (DCM) (SSNs). The Randomized US SSN data identifier ■ Severity: High.
Patterns detects SSN patterns, both traditional and those ■ Count all matches.
issued under the new randomization scheme. ■ Look in envelope, subject,
See “Randomized US Social Security Number body, attachments.
(SSN)” on page 1414.
ABA Routing Content Matches The ABA Routing Numbers rule is designed to ■ Simple rule (single match
Numbers Data Identifier detect ABA Routing Numbers. condition)
(DCM) Severity: High.
The ABA Routing Numbers data identifier detects ■
ABA routing numbers. ■ Count all matches.
■ Look in envelope, subject,
See “ABA Routing Number” on page 1013.
body, attachments.
Library of policy templates 1725
State Data Privacy policy template
Credit Card Content Matches The Credit Card Numbers rule is designed to ■ Simple rule (single condition)
Numbers, All Data Identifier match on credit card numbers. ■ Severity: High.
(DCM) ■ Count all matches.
To detect credit card numbers, this rule
implements the Credit Card Number narrow ■ Look in envelope, subject,
breadth system data identifier. body, attachments
CA Drivers Content Matches The CA Drivers License Numbers rule looks for ■ Simple rule (single condition)
License Data Identifier a match for the CA drivers license number ■ Severity: High.
Numbers (DCM) pattern, a match for a data identifier for terms ■ Count all matches.
relating to "drivers license," and a keyword from
■ Look in envelope, subject,
the "California Keywords" dictionary.
body, attachments
See “Driver's License Number – CA State ”
on page 1133.
NY Drivers Content Matches The NY Drivers License Numbers rule looks for ■ Simple rule (single condition)
License Data Identifier a match for the NY drivers license number ■ Severity: High.
Numbers (DCM) pattern, a match for a regular expression for terms ■ Count all matches.
relating to "drivers license," and a keyword from
■ Look in envelope, subject,
the "New York Keywords" dictionary.
body, attachments
See “Driver's License Number - NY State”
on page 1139.
FL, MI, and Content Matches The FL, MI, and MN Drivers License Numbers ■ Simple rule (single condition)
MN Drivers Data Identifier rule looks for a match for the stated drivers ■ Severity: High.
License (DCM) license number pattern, a match for a regular ■ Count all matches.
Numbers expression for terms relating to "drivers license,"
■ Look in envelope, subject,
and a keyword from the "Letter/12 Num. DLN
body, attachments
State Words" dictionary (namely, Florida,
Minnesota, and Michigan).
IL Drivers Content Matches The IL Drivers License Numbers detection rule ■ Simple rule (single condition)
License Data Identifier looks for a match for the IL drivers license number ■ Severity: High.
Numbers (DCM) pattern, a match for a regular expression for terms ■ Count all matches.
relating to "drivers license," and a keyword from
■ Look in envelope, subject,
the "Illinois Keywords" dictionary.
body, attachments
See “Driver's License Number - IL State”
on page 1136.
Library of policy templates 1726
SWIFT Codes policy template
NJ Drivers Content Matches The NJ Drivers License Numbers detection rule ■ Simple rule (single condition)
License Data Identifier looks for a match for the NJ drivers license ■ Severity: High.
Numbers (DCM) number pattern, a match for a regular expression ■ Count all matches.
for terms relating to "drivers license," and a
■ Look in envelope, subject,
keyword from the "New Jersey Keywords"
body, attachments
dictionary.
This rule looks for a match to the SWIFT code regular expression and a keyword
from the "SWIFT Code Keywords" dictionary.
Checks for a keyword match from the "Symantec DLP Awareness" dictionary.
This rule is a compound rule with two conditions; both must be matched to trigger
an incident. This rule looks for a keyword match from the "Symantec DLP Awareness"
dictionary and a keyword from the "Symantec DLP Avoidance" dictionary.
This rule looks for a single compound condition with two parts: either new or old
style National Health Service numbers and a single keyword from the "UK NHS
Keywords" dictionary.
This rule looks for a match to the UK National Insurance number data identifier and
a keyword from the dictionary "UK NIN Keywords."
This rule looks for a keyword from the "UK Passport Keywords" dictionary and a
pattern matching the regular expression for UK Passport Numbers (Old Type).
This rule looks for a keyword from the "UK Passport Keywords" dictionary and a
pattern matching the regular expression for UK Passport Numbers (New Type).
Library of policy templates 1729
UK Tax ID Numbers policy template
This rule looks for a match to the UK Tax ID number data identifier and a keyword
from the dictionary "UK Tax ID Number Keywords."
This rule looks for a keyword match on the phrases "CLASSIFIED" or "RESTRICTED."
US Social Security DCM Rule This rule looks for a match to the social See “Randomized US Social
Number Patterns security number regular expression and Security Number (SSN)”
a keyword from the dictionary "US SSN on page 1414.
Keywords."
Violence and DCM Rule This rule is a compound rule with two conditions; both must match to trigger an
Weapons incident. This rule looks for a keyword from the "Violence Keywords" dictionary
and a keyword from the "Weapons Keywords" dictionary.
Yahoo Compound Recipient Matches This condition checks for the URL domain
detection rule Pattern (DCM) mail.yahoo.com.
Hotmail Compound Recipient Matches This condition checks for the URL domain
detection rule Pattern (DCM) hotmail.msn.com.
Go Compound Recipient Matches This condition checks for the URL gomailus.go.com.
detection rule Pattern (DCM)
AOL Compound Recipient Matches This condition checks for the URL domain aol.com.
detection rule Pattern (DCM)
Gmail Compound Recipient Matches This condition checks for the URL domain
detection rule Pattern (DCM) gmail.google.com.
AND
The Finance Message Board URL detection rule detects messages posted to the Yahoo
Finance message board.
Table 46-87 describes its configuration.
Simple rule Content Matches Keyword Finance Message Board URL (Keyword Match):
(DCM)
■ Case insensitive.
■ Match Keyword: messages.finance.yahoo.com.
■ Match on whole words only.
■ Check for existence (do not count multiple matches).
■ Look in envelope, subject, body, attachments.
The Board URLs detection rule detects messages posted to the Yahoo or Yahoo Finance
message boards by the URL of either.
Table 46-88 describes its configuration details.
■ Case insensitive.
■ Match keyword: shttp.msg.yahoo.com.
Content Matches Keyword ■ Match on whole words only.
(DCM) ■ Count all matches and report an incident for each match.
■ Look for matches in the envelope, subject, body, and attachments.
■ Match must occur in the same component for both conditions in the
rule.
The MSN IM detection rule looks for matches on three keywords in the same message
component.
Library of policy templates 1735
Yahoo and MSN Messengers on Port 80 policy template
AND
■ Case insensitive.
■ Match keyword: x-msn.
Compound Content Matches Keyword
■ Match on whole words only.
rule (DCM)
■ Count all matches and report an incident for each match.
■ Look for matches in the envelope, subject, body, and attachments.
■ Match must occur in the same component for all conditions in the rule.
AND
■ Case insensitive.
■ Match keyword: charset=utf-8.
Content Matches Keyword
■ Match on whole words only.
(DCM)
■ Count all matches and report an incident for each match.
■ Look for matches in the envelope, subject, body, and attachments.
■ Match must occur in the same component for all conditions in the rule.
■ Response rule actions for Cloud Applications and API appliance detectors
All detection servers See “Response rule actions for all detection servers” on page 1739.
Endpoint detection servers See “Response rule actions for endpoint detection” on page 1740.
Network Prevent detection servers See “Response rule actions for Network Prevent detection” on page 1741.
Network Protect detection servers See “Response rule actions for Network Protect detection” on page 1742.
Cloud storage detections servers and See “Response rule actions for Cloud Storage detection” on page 1743.
detectors
Cloud Detection Service REST See “Response rule actions for Cloud Applications and API appliance
detectors and API Detection for detectors” on page 1744.
Developer Apps Appliances
Table 47-2 Available response rule actions for all detection servers
Add Note Add a field to the incident record that the remediator can annotate at the
Incident Snapshot screen.
Limit Incident Data Retention Discard or retain matched data with the incident record.
See “Configuring the Limit Incident Data Retention action” on page 1783.
Send Email Notification Send an email you compose to recipients you specify.
Table 47-2 Available response rule actions for all detection servers (continued)
Endpoint: ICT Classification And Tagging Apply the appropriate ICT classification to content in policy violation or as
a baseline Classification Scan.
Endpoint Discover: Information Centric The Endpoint Discover: Information Centric Defense response rule action
Defense flags sensitive files for Symantec Endpoint Protection (SEP) monitoring.
See “Configuring the Endpoint Discover: Quarantine File action” on page 1815.
Responding to policy violations 1741
Response rule actions for Network Prevent detection
Endpoint Prevent: Block Block the transfer of data that violates the policy.
For example, block the copy of confidential data from an endpoint to a USB
flash drive.
Endpoint Prevent: Notify Display an on-screen notification to the endpoint user when confidential
data is transferred.
Endpoint Prevent: User Cancel Allow the user to cancel the transfer of a confidential file. The override is
time sensitive.
See “Configuring the Endpoint Prevent: User Cancel action” on page 1828.
See “Configuring the Network Prevent for Web: Block FTP Request action”
on page 1831.
Note: Only available with Network Prevent for Web.
See “Configuring the Network Prevent for Web: Block HTTP/S action”
on page 1831.
Note: Only available with Network Prevent for Web.
Responding to policy violations 1742
Response rule actions for Network Protect detection
Network Prevent: Block SMTP Message Block email that causes an incident.
See “Configuring the Network Prevent: Block SMTP Message action”
on page 1832.
For example, change the email subject to include information about the
violation.
Network Prevent: Remove HTTP/S Remove confidential content from Web posts.
Content
See “Configuring the Network Prevent for Web: Remove HTTP/S Content
action” on page 1835.
Note: Only available with Network Prevent for Web.
Network Protect: Copy File Copy sensitive files to a location you specify.
See “Configuring the Network Protect: Copy File action” on page 1836.
Note: Only available with Network Protect.
Responding to policy violations 1743
Response rule actions for Cloud Storage detection
Network Protect: Encrypt File Encrypt sensitive files using Symantec ICE.
See “Configuring the Network Protect: Encrypt File action” on page 1838.
Note: This action is available only if you have installed the Network Protect
ICE license and configured the Enforce Server to connect to the Symantec
ICE Cloud. For information about how Symantec Data Loss Prevention
interacts with Symantec ICE, refer to the Symantec Information Centric
Encryption Deployment Guide at http://www.symantec.com/docs/DOC9707.
Cloud Storage: Add Visual Tag Add a text tag to Box cloud storage content that
violates a policy.
Cloud Storage: Quarantine Quarantine sensitive files from a cloud storage user
account to a quarantine user account. For
on-premises Box scanning, you can also use an
on-premises quarantine location.
Table 47-7 Available Cloud Applications and API appliance Smart Response rule actions
Remove Shared Links The Remove Shared Links Smart Response action
removes shared links from files in cloud applications
through the Cloud Detection Service.
Table 47-8 Available Cloud Applications and API appliance (Data-at-Rest) automated
response rule actions
■ Dropbox
■ Gmail
■ Office 365 Email
Table 47-8 Available Cloud Applications and API appliance (Data-at-Rest) automated
response rule actions (continued)
■ Box
■ Office 365 OneDrive
■ Office 365 SharePoint
■ Salesforce
■ Slack
Remove Shared Links in Data-at-Rest The Remove Shared Links in Data-at-Rest action
removes shared links to sensitive data in the
following cloud applications through the Cloud
Detection Service:
■ Box
■ Dropbox
■ Google Drive
■ Office 365 OneDrive
■ Salesforce
Table 47-9 Available Cloud Applications and API appliance (Additional Data-at-Rest Actions)
automated response rule actions
Prevent download, copy, print The Prevent download, copy, print action
prevents download, copy, and print options for the
sensitive data.
Table 47-9 Available Cloud Applications and API appliance (Additional Data-at-Rest Actions)
automated response rule actions (continued)
■ Box
■ Dropbox
■ Google Drive
■ Office 365 SharePoint
■ Salesforce
Set Collaborator Access to 'Edit' The Set Collaborator Access to 'Edit' action
grants collaborators edit access to sensitive data
files in the following cloud applications through the
Cloud Detection Service:
■ Box
■ Dropbox
■ Google Drive
■ Office 365 SharePoint
■ Salesforce
Set Collaborator Access to 'Preview' The Set Collaborator Access to 'Preview' action
grants collaborators preview access to sensitive
data files in the Box cloud application through the
Cloud Detection Service.
Table 47-9 Available Cloud Applications and API appliance (Additional Data-at-Rest Actions)
automated response rule actions (continued)
Set Collaborator Access to 'Read' The Set File Access to 'Internal Edit' action grants
edit access to all members of your organization to
sensitive files in the following cloud applications
through the Cloud Detection Service:
■ Box
■ Dropbox
■ Google Drive
■ Office 365 SharePoint
■ Salesforce
Set File Access to 'All Read' The Set File Access to 'All Read' action grants
public read access to sensitive data files in the
following cloud applications through the Cloud
Detection Service.
■ Google Drive
■ Office 365 OneDrive
■ Office 365 SharePoint
Set File Access to 'Internal Edit' The Set File Access to 'Internal Edit' action grants
edit access to all members of your organization to
sensitive files in the following cloud applications
through the Cloud Detection Service:
■ Box
■ Google Drive
■ Office 365 OneDrive
■ Office 365 SharePoint
■ Salesforce
Table 47-9 Available Cloud Applications and API appliance (Additional Data-at-Rest Actions)
automated response rule actions (continued)
Set File Access to 'Internal Read' The Set File Access to 'Internal Read' action
grants read access to all members of your
organization to sensitive data files in the following
cloud applications through the Cloud Detection
Service:
■ Box
■ Google Drive
■ Office 365 SharePoint
■ Salesforce
Table 47-10 Available Cloud Applications and API appliance (Data-in-Motion) automated
response rule actions
Table 47-10 Available Cloud Applications and API appliance (Data-in-Motion) automated
response rule actions (continued)
Automated Response rules When a policy violation occurs, the detection server automatically executes
response rule actions.
Smart Response rules When a policy violation occurs, an authorized user manually triggers the
response rule.
Add Note Add a field to the incident record that the remediator can annotate at the
Incident Snapshot screen.
Log to a Syslog Server Log the incident to a syslog server for workflow remediation.
Table 47-12 Available Smart Response rules for manual execution (continued)
Send Email Notification Send an email you compose to recipients you specify.
Network Protect SharePoint Quarantine Quarantine sensitive data stored on a Microsoft SharePoint server.
Network Protect SharePoint Release Release sensitive files that were quarantined from a Microsoft SharePoint
from Quarantine server.
for the action to trigger. If more than one condition is declared, all must be met for the system
to take action.
See “Configuring response rules” on page 1763.
Endpoint Location Triggers a response action when the endpoint is on or off the corporate network.
Endpoint Device Triggers a response action when an event occurs on a configured endpoint
device.
Incident Type Triggers a response action when the specified type of detection server reports
a match.
Incident Match Count Triggers a response action when the volume of policy violations exceeds a
threshold or range.
See “Configuring the Incident Match Count response condition” on page 1774.
Protocol or Endpoint Monitoring Triggers a response action when an incident is detected on a specified network
communications protocol (such as HTTP) or endpoint destination (such as
CD/DVD).
Severity Triggers a response action when the policy violation is a certain severity level.
Endpoint Prevent: Block See “Configuring the Endpoint Prevent: Block action”
on page 1817.
Endpoint Prevent: Encrypt See “Configuring the Endpoint Prevent: Encrypt action”
on page 1821.
Endpoint Prevent: User Cancel See “Configuring the Endpoint Prevent: User Cancel action”
on page 1828.
Endpoint Prevent: Notify See “Configuring the Endpoint Prevent: Notify action”
on page 1825.
Endpoint Discover: Quarantine File See “Configuring the Endpoint Discover: Quarantine File action”
on page 1815.
All: Limit Incident Data Retention See “Configuring the Limit Incident Data Retention action”
on page 1783.
Network Prevent: Block SMTP Message See “Configuring the Network Prevent: Block SMTP Message
action” on page 1832.
Network Prevent: Modify SMTP See “Configuring the Network Prevent: Modify SMTP Message
Message action” on page 1833.
Network Prevent for Web: Remove See “Configuring the Network Prevent for Web: Remove
HTTP/HTTPS Content HTTP/S Content action” on page 1835.
Responding to policy violations 1755
About response rule action execution priority
Network Prevent for Web: Block See “Configuring the Network Prevent for Web: Block HTTP/S
HTTP/HTTPS action” on page 1831.
Network Prevent for Web: Block FTP See “Configuring the Network Prevent for Web: Block FTP
Request Request action” on page 1831.
Network Protect: Quarantine File See “Configuring the Network Protect: Quarantine File action”
on page 1837.
Network Protect: Encrypt File See “Configuring the Network Protect: Encrypt File action”
on page 1838.
Network Protect: Copy File See “Configuring the Network Protect: Copy File action”
on page 1836.
All: Set Status See “Configuring the Set Status action” on page 1790.
All: Set Attribute See “Configuring the Set Attribute action” on page 1789.
All: Add Note See “Configuring the Add Note action” on page 1782.
All: Log to a Syslog Server See “Configuring the Log to a Syslog Server action” on page 1785.
All: Send Email Notification See “Configuring the Send Email Notification action”
on page 1786.
Cloud Storage: Add Visual Tag See “Configuring the Cloud Storage: Add Visual Tag action”
on page 1791.
Cloud Storage: Quarantine See “Configuring the Cloud Storage: Quarantine action”
on page 1791.
Server FlexResponse See “Configuring the Server FlexResponse action” on page 1788.
Note: Server FlexResponse actions that are part of Automated
Response rules execute on the Enforce Server, rather than the
detection server.
Cloud Applications and API appliance See “Configuring the Block Data-in-Motion action” on page 1808.
(Data-in-Motion): Block Data-in-Motion
Cloud Applications and API appliance See “Configuring the Redact Data-in-Motion action” on page 1812.
(Data-in-Motion): Redact Data-in-Motion
Cloud Applications and API appliance See “Configuring the Encrypt Data-in-Motion action”
(Data-in-Motion): Encrypt Data-in-Motion on page 1810.
Responding to policy violations 1756
About response rule action execution priority
Cloud Applications and API appliance See “Configuring the Quarantine Data-in-Motion action”
(Data-in-Motion): Quarantine on page 1811.
Data-in-Motion
Cloud Applications and API appliance See “Configuring the Perform DRM on Data-in-Motion action”
(Data-in-Motion): Perform DRM on on page 1810.
Data-in-Motion
Cloud Applications and API appliance See “Configuring the Custom Action on Data-in-Motion action”
(Data-in-Motion): Custom Action on on page 1809.
Data-in-Motion
Cloud Applications and API appliance See “Configuring the Encrypt Data-at-Rest action” on page 1799.
(Data-at-Rest): Encrypt Data-at-Rest
Cloud Applications and API appliance See “Configuring the Delete Data-at-Rest action” on page 1799.
(Data-at-Rest): Delete Data-at-Rest
Cloud Applications and API appliance See “Configuring the Quarantine Data-at-Rest action”
(Data-at-Rest): Quarantine Data-at-Rest on page 1801.
Cloud Applications and API appliance See “Configuring the Tag Data-at-Rest action” on page 1802.
(Data-at-Rest): Tag Data-at-Rest
Cloud Applications and API appliance See “Configuring the Perform DRM on Data-at-Rest action”
(Data-at-Rest): Perform DRM on on page 1800.
Data-at-Rest
Cloud Applications and API appliance See “Configuring the Remove Shared Links in Data-at-Rest
(Data-at-Rest): Break Links in action” on page 1802.
Data-at-Rest
Cloud Applications and API appliance See “Configuring the Custom Action on Data-at-Rest action”
(Data-at-Rest): Custom Action on on page 1798.
Data-at-Rest
Cloud Applications and API appliance See “Configuring the Set File Access to 'All Read' action”
(Additional Data-at-Rest Actions): Set on page 1806.
File Access to 'All Read'
Cloud Applications and API appliance See “Configuring the Prevent download, copy, print action”
(Additional Data-at-Rest Actions): on page 1803.
Prevent download, copy, print
Responding to policy violations 1757
About response rule authoring privileges
Cloud Applications and API appliance See “Configuring the Set File Access to 'Internal Read' action”
(Additional Data-at-Rest Actions): Set on page 1807.
File Access to 'Internal Read'
Cloud Applications and API appliance See “Configuring the Set File Access to 'Internal Edit'”
(Additional Data-at-Rest Actions): Set on page 1806.
File Access to 'Internal Edit'
Cloud Applications and API appliance See “Configuring the Set Collaborator Access to 'Read' action”
(Additional Data-at-Rest Actions): Set on page 1805.
Collaborator Access to 'Read'
Cloud Applications and API appliance See “Configuring the Set Collaborator Access to 'Edit' action”
(Additional Data-at-Rest Actions): Set on page 1804.
Collaborator Access to 'Edit'
Cloud Applications and API appliance See “Configuring the Remove Collaborator Access action”
(Additional Data-at-Rest Actions): on page 1804.
Remove Collaborator Access
Cloud Applications and API appliance See “Configuring the Set Collaborator Access to 'Preview'
(Additional Data-at-Rest Actions): Set action” on page 1805.
Collaborator Access to 'Preview'
Cloud Applications and API appliance See “Configuring the Add two-factor authentication action”
(Data-in-Motion): Add two-factor on page 1808.
authentication
If you log on to the system as a user without response rule authoring privileges, the Manage
> Policies > Response Rules screen is not available.
See “About role-based access control” on page 109.
1 Review the available response rules. The Manage > Policies > Response Rules screen displays
all configured response rules.
2 Decide the type of response rule to Decide the type of response rules based on your business
implement: Smart, Automated, both. requirements.
3 Determine the type of actions you want to See “About response rule conditions” on page 1752.
implement and any triggering conditions.
See “About response rule actions” on page 1738.
4 Understand the order of precedence among See “About response rule action execution priority”
response rule actions of different and the on page 1753.
same types.
See “Modifying response rule ordering” on page 1769.
Responding to policy violations 1759
Response rule best practices
5 Integrate the Enforce Server with an external Some response rules may require integration with external
system (if required for the response rule). systems.
These may include:
6 Add a new response rule. See “Adding a new response rule” on page 1762.
8 Configure one or more response rule See “Configuring response rule conditions” on page 1764.
conditions (optional).
9 Configure one or more response rule actions You must define at least one action for a valid response rule.
(required).
See “Configuring response rule actions” on page 1765.
10 Add response rules to policies. You must have policy authoring privileges to add response
rules to policies.
Action Description
Add Response Rule Click Add Response Rule to define a new response rule.
See “Adding a new response rule” on page 1762.
Modify Response Rule Click Modify Response Rule Order to modify the response rule order of precedence.
Order
See “Modifying response rule ordering” on page 1769.
Delete an existing Click the red X icon next to the far right of the response rule to delete it.
response rule
You must confirm the operation before deletion occurs.
Refresh the list Click the refresh arrow icon at the upper right of the Response Rules screen to fetch
the latest status of the rule.
Order The Order of precedence when more than one response rule is configured.
Actions The type of Action the response rule can take to respond to an incident (required).
Conditions The Condition that triggers the response rule (if any).
4 Select and configure one or more Actions. You must define at least one action.
See “Configuring response rule actions” on page 1765.
5 Click Save to save the response rule definition.
See “Manage response rules” on page 1761.
See “Implementing response rules” on page 1758.
All Add Note See “Configuring the Add Note action” on page 1782.
All Limit Incident Data See “Configuring the Limit Incident Data Retention action” on page 1783.
Retention
All Log to a Syslog Server See “Configuring the Log to a Syslog Server action” on page 1785.
All Send Email Notification See “Configuring the Send Email Notification action” on page 1786.
All Server FlexResponse See “Configuring the Server FlexResponse action” on page 1788.
All Set Attribute See “Configuring the Set Attribute action” on page 1789.
All Set Status See “Configuring the Set Status action” on page 1790.
Cloud Storage Add Visual Tag See “Configuring the Cloud Storage: Add Visual Tag action”
on page 1791.
Cloud Storage Quarantine See “Configuring the Cloud Storage: Quarantine action” on page 1791.
Applications: Break Links in See “Configuring the Remove Shared Links in Data-at-Rest action”
Data-at-Rest Data-at-Rest on page 1802.
(DAR)
Applications: Custom Action on See “Configuring the Custom Action on Data-at-Rest action”
Data-at-Rest Data-at-Rest on page 1798.
(DAR)
Applications: Delete Data-at-Rest See “Configuring the Delete Data-at-Rest action” on page 1799.
Data-at-Rest
(DAR)
Applications: Encrypt Data-at-Rest See “Configuring the Encrypt Data-at-Rest action” on page 1799.
Data-at-Rest
(DAR)
Applications: Perform DRM on See “Configuring the Perform DRM on Data-at-Rest action”
Data-at-Rest Data-at-Rest on page 1800.
(DAR)
Applications: Quarantine Data-at-Rest See “Configuring the Quarantine Data-at-Rest action” on page 1801.
Data-at-Rest
(DAR)
Applications: Tag Data-at-Rest See “Configuring the Tag Data-at-Rest action” on page 1802.
Data-at-Rest
(DAR)
Configuring and managing response rules 1767
Configuring response rule actions
Applications: Add two-factor See “Configuring the Add two-factor authentication action” on page 1808.
Data-in-Motion authentication
(DIM)
Applications: Block Data-in-Motion See “Configuring the Block Data-in-Motion action” on page 1808.
Data-in-Motion
(DIM)
Applications: Custom Action on See “Configuring the Custom Action on Data-in-Motion action”
Data-in-Motion Data-in-Motion on page 1809.
(DIM)
Applications: Encrypt Data-in-Motion See “Configuring the Encrypt Data-in-Motion action” on page 1810.
Data-in-Motion
(DIM)
Applications: Perform DRM on See “Configuring the Perform DRM on Data-in-Motion action”
Data-in-Motion Data-in-Motion on page 1810.
(DIM)
Applications: Quarantine See “Configuring the Quarantine Data-in-Motion action” on page 1811.
Data-in-Motion Data-in-Motion
(DIM)
Applications: Redact Data-in-Motion See “Configuring the Redact Data-in-Motion action” on page 1812.
Data-in-Motion
(DIM)
Applications: Prevent download, copy, See “Configuring the Prevent download, copy, print action”
Data-at-Rest print on page 1803.
(DAR)
Applications: Remove Collaborator See “Configuring the Remove Collaborator Access action” on page 1804.
Data-at-Rest Access
(DAR)
Applications: Set Collaborator Access See “Configuring the Set Collaborator Access to 'Edit' action”
Data-at-Rest to 'Edit' on page 1804.
(DAR)
Applications: Set Collaborator Access See “Configuring the Set Collaborator Access to 'Preview' action”
Data-at-Rest to 'Preview' on page 1805.
(DAR)
Configuring and managing response rules 1768
Configuring response rule actions
Applications: Set Collaborator Access See “Configuring the Set Collaborator Access to 'Read' action”
Data-at-Rest to 'Read' on page 1805.
(DAR)
Applications: Set File Access to 'All See “Configuring the Set File Access to 'All Read' action” on page 1806.
Data-at-Rest Read'
(DAR)
Applications: Set File Access to See “Configuring the Set File Access to 'Internal Edit'” on page 1806.
Data-at-Rest 'Internal Edit'
(DAR)
Applications: Set File Access to See “Configuring the Set File Access to 'Internal Read' action”
Data-at-Rest 'Internal Read' on page 1807.
(DAR)
Endpoint FlexResponse See “Configuring the Endpoint: FlexResponse action” on page 1813.
Endpoint ICT Classification And See “Configuring the Endpoint: ICT Classification And Tagging action”
Tagging on page 1814.
Endpoint Quarantine File See “Configuring the Endpoint Discover: Quarantine File action”
Discover on page 1815.
Endpoint Block See “Configuring the Endpoint Prevent: Block action” on page 1817.
Prevent
Endpoint Encrypt See “Configuring the Endpoint Prevent: Encrypt action” on page 1821.
Prevent
Endpoint Notify See “Configuring the Endpoint Prevent: Notify action” on page 1825.
Prevent
Endpoint User Cancel See “Configuring the Endpoint Prevent: User Cancel action”
Prevent on page 1828.
Network Prevent Block FTP Request See “Configuring the Network Prevent for Web: Block FTP Request
for Web action” on page 1831.
Network Prevent Block HTTP/S See “Configuring the Network Prevent for Web: Block HTTP/S action”
for Web on page 1831.
Network Prevent Block SMTP Message See “Configuring the Network Prevent: Block SMTP Message action”
for Email on page 1832.
Configuring and managing response rules 1769
Modifying response rule ordering
Network Prevent Modify SMTP Message See “Configuring the Network Prevent: Modify SMTP Message action”
for Email on page 1833.
Network Prevent Remove HTTP/S Content See “Configuring the Network Prevent for Web: Remove HTTP/S
for Web Content action” on page 1835.
Network Protect Copy File See “Configuring the Network Protect: Copy File action” on page 1836.
Network Protect Quarantine File See “Configuring the Network Protect: Quarantine File action”
on page 1837.
Network Protect Encrypt File See “Configuring the Network Protect: Encrypt File action” on page 1838.
4 To modify the ordering, for each response rule you want to reorder, select the desired
order priority from the drop-down menu.
For example, for a response rule with order priority of 2, you can modify it to be 1 (highest
priority).
Modifying an order number moves that response rule to its modified position in the list
and updates all other response rules.
5 Click Save to save the modifications to the response rule ordering.
6 Repeat these steps as necessary to achieve the desired results.
See “Implementing response rules” on page 1758.
Note: This condition is specific to endpoint incidents. You should not implement this condition
for Network or Discover incidents. If you do the response rule action does not to execute.
Response rule conditions 1772
Configuring the Endpoint Device response condition
Is Any Of Off the corporate This combination triggers a response rule action if an incident occurs when the
network endpoint is off the corporate network.
Is None Of Off the corporate This combination does not trigger a response rule action if an incident occurs
network when the endpoint is off the corporate network.
Is Any Of On the corporate This combination triggers a response rule action if an incident occurs when the
network endpoint is on the corporate network.
Is None Of On the corporate This combination does not trigger a response rule action if an incident occurs
network when the endpoint is on the corporate network.
Note: This condition is specific to endpoint incidents. You should not implement this condition
for Network or Discover incidents. If you do the response rule action does not to execute.
Response rule conditions 1773
Configuring the Incident Type response condition
Is Any Of Configured Triggers a response rule action when an incident is detected on a configured
device endpoint device.
Is None Of Configured Does not trigger (excludes from executing) a response rule action when an incident
device is detected on a configured endpoint device.
Is Any Of Cloud Detection Triggers a response rule action for any incident detected by the Cloud Detection
Service or API Service or API Detection for Developer Apps Appliance.
Detection for
Is None Of Developer Apps Does not trigger a response rule action for any incident detected by the Cloud
Appliance Detection Service or API Detection for Developer Apps Appliance.
Is Any Of Discover Triggers a response rule action for any incident that Network Discover detects.
Is None Of Does not trigger a response rule action for any incident that Network Discover
detects.
Is Any Of Endpoint Triggers a response rule action for any incident that Endpoint Prevent detects.
Is None Of Does not trigger a response rule action for any incident that Endpoint Prevent
detects.
Is Any Of Network Triggers a response rule action for any incident that Network Prevent detects.
Is None Of Does not trigger a response rule action for any incident that Network Prevent
detects.
Is Greater Than User-specified Triggers a response rule action if the threshold number of incidents is
number eclipsed.
Is Greater Than or User-specified Triggers a response rule action if the threshold number of incidents is met
Equals number or eclipsed.
Is Between User-specified pair of Triggers a response rule action when the number of incidents is between
numbers the range of numbers specified.
Is Less Than User-specified Triggers a response rule action if the number of incidents is less than the
number specified number.
Is Less Than or User-specified Triggers a response rule action when the number of incidents is equal to
Equals number or less than the specified number.
Is Any Of Triggers an action if the endpoint clipboard has been copied or pasted
to.
Endpoint Clipboard
Is None Of Does not trigger action if the endpoint clipboard has been copied or
pasted to.
Is Any Of Triggers an action if sensitive files are discovered on the local drive.
Endpoint Local Drive
Is None Of Does not trigger action if sensitive files are discovered on the local
drive.
Is Any Of Triggers an action if an endpoint printer or fax has been sent to.
Endpoint Printer/Fax
Is None Of Does not trigger action if an endpoint printer or fax has been sent to.
Response rule conditions 1777
Configuring the SEP Intensity Level response condition
Is Any Of Malicious Triggers a response rule action if the application requesting file access is flagged Malicious.
Is None Of Malicious Does not trigger a response rule action if the application requesting file access is flagged
Malicious.
Is Any Of Suspicious Triggers a response rule action if the application requesting file access is flagged Suspicous.
Is None Of Suspicious Does not trigger a response rule action if the application requesting file access is flagged
Suspicious.
Is Any Of Unproven Triggers a response rule action if the application requesting file access is flagged Unproven.
Is None Of Unproven Does not trigger a response rule action if the application requesting file access is flagged
Unproven.
Is Any Of High Triggers a response rule action when a detection rule with
severity set to high is matched.
Is None Of High Does not trigger a response rule action when a detection rule
with severity set to high is matched.
Is Any Of Medium Triggers a response rule action when a detection rule with
severity set to medium is matched.
Is None Of Medium Does not trigger a response rule action when a detection rule
with severity set to medium is matched.
Is Any Of Low Triggers a response rule action when a detection rule with
severity set to low is matched.
Is None Of Low Does not trigger a response rule action when a detection rule
with severity set to low is matched.
Is Any Of Info Triggers a response rule action when a detection rule with
severity set to info is matched.
Is None Of Info Does not trigger a response rule action when a detection rule
with severity set to info is matched.
■ Configuring the Network Protect: SharePoint Release from Quarantine smart response
action
■ Configuring the Network Prevent for Web: Block FTP Request action
■ Configuring the Network Prevent for Web: Remove HTTP/S Content action
Note: Limit Incident Data Retention does not apply to Endpoint Print or Clipboard incidents
and is not supported for Endpoint Discover.
See “Configuring the Limit Incident Data Retention action” on page 1783.
Select All Endpoint Incidents to retain the original file attachment for Endpoint Prevent
incidents.
If you combine a server-side detection rule (EDM/IDM/DGM) with a Limit Incident Data Retention
response rule action on the endpoint, consider the network bandwidth implications. When an
Endpoint Agent sends content to an Endpoint Server for analysis, it sends text or binary data
according to detection requirements. If possible, Symantec DLP Agents send text to reduce
bandwidth use. When you retain the original messages for endpoint incidents, in every case
the system requires agents to send binary data to the Endpoint Server. As such, make sure
that your network can handle the increased traffic between Endpoint Agents and Endpoint
Servers without degrading performance.
See “Two-tier detection for DLP Agents” on page 395.
Consider the system behavior for any policies that combine an agent-side detection rule (any
DCM rule, such as a keyword rule). If you implement the Limit Incident Data Retention response
rule action, the increased use bandwidth depends on the number of incidents the detection
engine matches. For such policies, the DLP Agent does not send all original files to the Endpoint
Server, but only those associated with confirmed incidents. If there are not many incidents,
the effect is small.
Response rule actions 1785
Configuring the Log to a Syslog Server action
Note: The default data retention behavior for network incidents applies to Network Prevent for
Web and Network Prevent for Email incidents. The default behavior does not apply to Network
Discover incidents. For Network Discover incidents, the system provides a link in the Incident
Snapshot that points to the offending file at its original location. Incident data retention for
Network Discover is not configurable.
Parameter Description
Select Attachments with no Violations to save only relevant message attachments, that is,
those that trigger a policy violation.
Note: You must select something other than None for this action option. If you leave None
selected and do not check the box next to Discard Original Message, the action has no effect.
Such a configuration duplicates the default incident data retention behavior for network servers.
Note: You use this response rule in conjunction with a syslog server. See “Enabling a syslog
server” on page 174.
Response rule actions 1786
Configuring the Send Email Notification action
6 Select the Level to apply to the log message from the drop-down list.
The following options are available:
■ 0 - Kernel panic
■ 1 - Needs immediate attention
■ 2 - Critical condition
■ 3 - Error
■ 4 - Warning
■ 5 - May need attention
■ 6 - Informational
■ 7- Debugging
See “Response rule actions for all detection servers” on page 1739.
You must integrate the Enforce Server with an SMTP email server to implement this response
rule action.
See “Configuring the Enforce Server to send email alerts” on page 176.
To configure the Send Email Notification response rule action
1 Configure a response rule at the Configure Response Rule screen.
See “Configuring response rules” on page 1763.
2 Add the All: Send Email Notification action type from the Actions list.
See “Configuring response rule actions” on page 1765.
3 Configure the recipient(s), sender, format, incident inclusion, and messages per day.
See Table 50-2 on page 1787.
4 Configure the Notification Content of the email notification: language, subject, body.
See Table 50-3 on page 1788.
5 Click Save to save the configuration.
See “Manage response rules” on page 1761.
Parameter Description
To: Sender Select this option to send the email notification to the email sender. This recipient only applies
to email message violations.
To: Data Owner Select this option to send email notification to the data owner that the system identifies by email
address in the incident.
To: Other Email This option can include any custom attributes designated as email addresses (such as
Address "manager@email"). For example, if you define a custom attribute that is an email address, or
retrieve one via a lookup plug-in, that address will appear in the "To" field for selection, to the
right of "To: Sender" and "To: Data Owner."
CC Enter one or more specific email addresses separated by commas for people you want to copy
on the notification.
If this field is blank, the message appears to come from the system email address.
Response rule actions 1788
Configuring the Server FlexResponse action
Parameter Description
Include Original Select this option to include the message that generated the incident with the notification email.
Message
Max Per Day Enter a number to restrict the maximum number of notifications that the system sends in a day.
Parameter Description
Language Select the language for the message from the drop-down menu.
Add Language Click the icon to add multiple language(s) for the message.
See “About Endpoint Prevent response rules in different locales” on page 2314.
Subject Enter a subject for the message that indicates what the message is about.
Insert Variables You can add one or more variables to the subject or body of the email message by selecting
the desired value(s) from the Insert Variables list.
Variables can be used to include the file name, policy name, recipients, and sender in both the
subject and the body of the email message. For example, to include the policy and rules violated,
you would insert the following variables.
Note: If you have installed the Network Protect ICE license and configured the Enforce
Server to connect to the Symantec ICE Cloud, you can use the SharePoint Encrypt
response rule action which is made available through a Server FlexResponse plug-in for
encryption that is installed automatically with Symantec Data Loss Prevention. No additional
configuration or customization is required for the encryption plug-in.
10 Click Save.
11 Repeat this procedure, adding a Response Rule for any additional Server FlexResponse
plug-ins that you have deployed.
The Set Attribute action is based on custom attributes you define at the System > Incident
Data > Attributes screen.
See “About custom attributes” on page 1968.
To configure the Set Attribute action
1 Configure a response rule at the Configure Response Rule screen.
See “Configuring response rules” on page 1763.
2 Add the All: Set Attribute action type from the Actions list.
See “Configuring response rule actions” on page 1765.
3 Select the Attribute from the drop-down list (if more than one custom attribute is defined).
4 Enter an incident status Value for the selected custom attribute.
5 Click Save to save the configuration.
See “Manage response rules” on page 1761.
See “Implementing response rules” on page 1758.
■ Investigation
■ Resolved
■ Dismissed
Parameter Description
Marker File Select Leave marker file in place of remediated file to create a marker text file to replace the original
file. This action notifies the user what happened to the file instead of quarantining or deleting the file
without any explanation.
Note: The marker file is the same type and has the same name as the original file, as long as it is a
text file. An example of such a file type is Microsoft Word. If the original file is a PDF or image file, the
system creates a plain text marker file. The system then gives the file the same name as the original
file with .txt appended to the end. For example, if the original file name is accounts.pdf, the marker file
name is accounts.pdf.txt.
Marker Specify the text to appear in the marker file. If you selected the option to leave the marker file in place
Text of the remediated file, you can use variables in the marker text.
To specify marker text, select the variable from the Insert Variable list.
Add visual Select this option to add a visual tag to the marker file. The visual tag helps your Box cloud storage
tag to users search for marker files for quarantined sensitive data
marker file
Parameter Description
File Path Enter the file path for the quarantine location. This file path is relative to the user's root folder.
Use Marker Select Use Marker File to create a marker text file to replace the original file. This action notifies the
File user what happened to the file instead of quarantining or deleting the file without any explanation.
Note: Upon quarantine, file metadata is not saved for attachment-type SharePoint items such
as lists, announcements, tasks, and so on.
Response rule actions 1794
Configuring the Network Protect: SharePoint Quarantine smart response action
Parameter Description
Source
Use Saved Select Use Saved Credentials to choose a named credential from the credential
Credentials store in the Use Saved Credentials drop-down menu if you don't want to enter it
manually.
To move the files for quarantine during remediation, the specified SharePoint user
account must have write access for the original file location.
Use These Select Use These Credentials to manually enter the write-access credential for
Credentials the original location of the scanned file. Then, enter the following: parameters
■ Name - The user name of the account with write access for the location of the
scanned file.
■ Password - The password of the account with write access for the location of
the scanned file.
■ Confirm Password - Confirm the password of the account with write access for
the location of the scanned file.
To move the files for quarantine during remediation, the specified SharePoint user
account must have write access for the original file location.
Destination
Target Repository Specify whether the files are to be quarantined in a SharePoint repository or in a
file share (File System).
Quarantine Path Enter the SharePoint path where the confidential files are to be quarantined.
Response rule actions 1795
Configuring the Network Protect: SharePoint Release from Quarantine smart response action
Parameter Description
Use Saved Select Use Saved Credentials to choose a named credential for the quarantine
Credentials location from the credential store in the Use Saved Credentials drop-down menu
if you don't want to enter it manually.
To move the files for quarantine during remediation, the specified SharePoint user
account must have write access for the quarantine location.
Use These Select Use These Credentials to manually enter the write-access credential for
Credentials the quarantine location. Then, enter the following: parameters
■ Name - The user name of the account with write access for the quarantine
location.
■ Password - The password of the account with write access for the quarantine
location.
■ Confirm Password - Confirm the password of the account with write access for
the quarantine location.
To move the files for quarantine during remediation, the specified SharePoint user
account must have write access for the quarantine location.
Marker File
(Optional) Leave Select Leave marker file in place of remediated file to create a marker text file
marker file in place to replace the original file. This action notifies the user about what happened to the
of remediated file file instead of moving the file without any explanation.
(Optional) Marker Specify the text that appears in the marker file to notify users about what happened
Text to the file that was quarantined. The marker text can contain substitution variables.
Click inside the Marker Text box to see a list of insertion variables.
restored when you release the file from quarantine. If the file was quarantined using a version
earlier than 15.1, the file is released without restoring its metadata.
When you attempt to release a quarantined file, if a file with the same name exists at the
destination location, the released file is named using the following format:
FileName.<N>Released.FileExtension, wherein <N> is a number in the range of 1 to 10.
Therefore, you can release a file that shares a name with another file in the destination directory
up to ten times before the release fails
Note: Network Protect does not access file metadata for inline attachments during the quarantine
process. As a result, file metadata for inline attachments cannot be restored upon release from
quarantine.
Parameter Description
Add Row Click Add Row to start mapping a new file path. The file path could be either the
location to which files are quarantined, or the original SharePoint location to which
files should be released.
Path Specify the location to which files are quarantined, or the original SharePoint location
to which files should be released.
Credentials Specify the write-access credentials for the file path that you want to map.
Parameter Description
Custom Enter details about the Custom Action on Data-at-Rest action in the custom payload field. These
payload details are returned in the customResponsePayload parameter of the detection result.
Parameter Description
Custom Enter details about the Encrypt Data-at-Rest action in the Custom payload field. These details are
payload returned in the customResponsePayload parameter of the detection result.
Parameter Description
Custom Enter details about the Perform DRM on Data-at-Rest action in the Custom payload field. These details
payload are returned in the customResponsePayload parameter of the detection result.
Response rule actions 1801
Configuring the Quarantine Data-at-Rest action
Parameter Description
File Path Enter the file path for the quarantine location. This file path is relative to the user's root folder.
Use Marker Select Use Marker File to create a marker text file to replace the original file. This action notifies the
File user what happened to the file instead of quarantining or deleting the file without any explanation.
Marker Text Enter the text you want to display in the marker file. You can select and insert variables from the Insert
Variable list.
Parameter Description
Custom Enter details about the Remove Shared Links in Data-at-Rest action in the custom payload field.
payload These details are returned in the customResponsePayload parameter of the detection result.
You can configure a custom payload with additional details about this recommendation. The
custom payload appears in the customResponsePayload parameter of the detection response.
To configure the Tag Data-at-Rest action
1 Configure a response rule at the Configure Response Rule screen.
See “Configuring response rules” on page 1763.
2 Add the Tag Data-at-Rest action type from the Actions list.
The system displays the Tag Data-at-Rest field.
See “Configuring response rule actions” on page 1765.
3 Configure the Tag Data-at-Rest parameter.
See Table 50-13 on page 1803.
4 Click Save to save the configuration.
See “Manage response rules” on page 1761.
Parameter Description
Custom Enter details about the Tag Data-at-Rest action in the Custom payload field. These details are returned
payload in the customResponsePayload parameter of the detection result.
■ SharePoint
To configure the Set Collaborator Access to 'Read' action
1 Configure a response rule at the Configure Response Rule screen.
See “Configuring response rules” on page 1763.
2 Add the Set Collaborator Access to 'Read' action type from the Actions list.
See “Configuring response rule actions” on page 1765.
3 Click Save to save the configuration.
See “Manage response rules” on page 1761.
See “Implementing response rules” on page 1758.
■ OneDrive
■ Salesforce
■ SharePoint
To configure the Set File Access to 'Internal Edit' action
1 Configure a response rule at the Configure Response Rule screen.
See “Configuring response rules” on page 1763.
2 Add the Set File Access to 'Internal Edit' action type from the Actions list.
See “Configuring response rule actions” on page 1765.
3 Click Save to save the configuration.
See “Manage response rules” on page 1761.
See “Implementing response rules” on page 1758.
Parameter Description
Message Enter a user-facing message for the Block Data-in-Motion action in the message field. These details
are returned in the message parameter of the detection result.
Parameter Description
Custom Enter details about the Custom Action on Data-in-Motion action in the custom payload field. These
payload details are returned in the customResponsePayload parameter of the detection result.
Parameter Description
Custom Enter details about the Encrypt Data-in-Motion action in the custom payload field. These details are
payload returned in the customResponsePayload parameter of the detection result.
Parameter Description
Custom Enter details about the Perform DRM on Data-in-Motion action in the custom payload field. These
payload details are returned in the customResponsePayload parameter of the detection result.
Parameter Description
Custom Enter details about the Quarantine Data-in-Motion action in the custom payload field. These details
payload are returned in the customResponsePayload parameter of the detection result.
Parameter Description
Message Enter a user-facing message for the Redact Data-in-Motion action in the message field. These details
are returned in the message parameter of the detection result.
Response rule actions 1813
Configuring the Endpoint: FlexResponse action
Note: This feature is not available for agents running on Mac endpoints.
Parameter Description
FlexResponse Enter the script module name with packages separated by a period (.).
Python Plugin
Plugin parameters Click Add Parameter to add one or more parameters to the script.
You can add and store credentials at the System > Settings > Credentials screen.
Note: Scans can apply tags on both Windows and Mac systems on which the DLP Agent is
installed. End users can apply tags only on Windows systems, on which the ICT agent is
installed.
Parameter Description
Parameter Description
Language (For end-user application of tags) Select the language in which to display alerts. The
default is English (United States). Alerts are
displayed by the ICT plugin, which provides the
tagging user interface for Microsoft Office or
Microsoft Outlook.
Display an alert when the classification is To provide an explanation to a user about why a
applied. (For end-user application of tags) particular tag was applied, select this check box.
The user sees the alert when they open the file or
email.
Allow the user to change the classification. (For To allow a user to change the classification that you
end-user application of tags) have applied, select this check box. An alert notifies
the user that they can change the classification,
when they open the file or email.
Note: A file may violate multiple policies and you may have associated each policy with a
different classification response rule. While there is a system-defined execution priority for
different types of response rule actions, you can affect the order of execution for response
rule actions of the same type that contain conflicting instructions. To affect the order of
execution, use the Order column on the Manage > Policies > Response Rules screen.
Defining the order is especially important to ensure that the response rule with the highest
level of classification be defined as the highest order.
If you use multiple endpoint response rules in a single policy, make sure that you understand
the order of precedence for such rules.
See “About response rule action execution priority” on page 1753.
Note: This feature is not available for agents running on Mac endpoints.
Table 50-22 Endpoint Discover: Quarantine File response rule action parameters
Parameter Description
Quarantine Enter the path to the secured location where you want files to be placed. The secure location can
Path either be on the local drive of the endpoint, or can be on a remote file share. EFS folders can also
be used as the quarantine location.
Response rule actions 1817
Configuring the Endpoint Prevent: Block action
Table 50-22 Endpoint Discover: Quarantine File response rule action parameters (continued)
Parameter Description
Access Mode If your secure location is on a remote file share, you must select how the Symantec DLP Agent
accesses that file share.
Select one of the following credential access types:
■ Anonymous Access
■ Use Saved Credentials
In anonymous mode, the Symantec DLP Agent runs as LocalSystem user to move the confidential
file. You can use anonymous mode to move files to a secure location on a local drive or to remote
share if it allows anonymous access.
Note: EFS folders cannot accept anonymous users.
A specified credential lets the Symantec DLP Agent impersonate the specified user to access the
secure location. The credentials must be in the following format:
domain\user
You must enter the specified credentials you want to use through the System Credentials page.
Marker File Select the Leave marker in place of the remediated file check box to create a placeholder file
that replaces the confidential file.
Marker Text Specify the text to appear in the marker file. If you selected the option to leave the marker file in
place of the remediated file, you can use variables in the marker text.
To specify the marker text, select the variable from the Insert Variable list.
This response rule action is specific to Endpoint Prevent incidents. This response rule is not
applicable to two-tiered detection methods requiring a Data Profile.
See “Setting up and configuring Endpoint Discover” on page 2325.
If you combine multiple endpoint response rules in a single policy, make sure that you
understand the order of precedence for such rules.
See “About response rule action execution priority” on page 1753.
Note: The block action is not triggered for a copy of sensitive data to a local drive.
Parameter Configuration
Language Select the language you want the response rule to execute on. Click Add Language to add more
than one language.
See “About Endpoint Prevent response rules in different locales” on page 2314.
See “Setting Endpoint Prevent response rules for different locales” on page 2315.
Response rule actions 1819
Configuring the Endpoint Prevent: Block action
Table 50-23 Endpoint Prevent: Block response rule action parameters (continued)
Parameter Configuration
Display Alert This field is optional for Endpoint Block actions. Select an Endpoint Block action to display an
Box with this on-screen notification to the endpoint user when the system blocks an attempt to copy confidential
message data.
Enter the notification message in the text box. You can add variables to the message by selecting
the appropriate value(s) from the Insert Variable box.
Optionally, you can configure the on-screen notification to include user justifications as well as an
option for users to enter their own justification.
You can also add hyperlinks to refer users to URLs that contain company security information. To
add hyperlinks you use standard HTML syntax, tags, and URLs. Tags are case-sensitive. You can
include hyperlinked text between regular text. For example, you would enter:
Insert Variable Select the variables to include in the on-screen notification to the endpoint when the system blocks
an attempt to copy confidential data.
You can select variables based on the following types:
■ Application
■ Content Name
■ Content Type
■ Matching Attachments
■ Matching Recipient Domains
■ Device Type
■ Matching Recipients
■ Policy Names
■ Protocol
Response rule actions 1820
Configuring the Endpoint Prevent: Block action
Table 50-23 Endpoint Prevent: Block response rule action parameters (continued)
Parameter Configuration
Allow user to Select this option to display up to four user justifications in the on-screen notification. When the
choose notification appears on the endpoint, the user is required to choose one of the justifications. (If you
explanation select Allow user to enter text explanation, the user can enter a justification.) Symantec Data Loss
Prevention provides four default justifications, which you can modify or remove as needed.
Justification:
■ User Education
■ Broken Business Process
■ Manager Approved
■ False positive
Each justification entry consists of the following options:
■ Check box
This option indicates whether to include the associated justification in the notification. To remove
a justification, clear the check box next to it. To include a justification, select the check box next
to it.
■ Justification
The system label for the justification. This value appears in reports (for ordering and filtering
purposes), but the user does not see it. You can select the desired option from the drop-down
list.
■ Option Presented to End User
The justification text the system displays in the notification. This value appears in reports with the
justification label. You can modify the default text as desired.
To add a new justification, select New Justification from the drop-down list. In the Enter new
justification text box that appears, enter the justification name. When you save the rule, Symantec
Data Loss Prevention includes it as an option (in alphabetical order) in all Justification drop-down
lists.
Note: You should be selective when adding new justifications. Deleting new justifications is not
currently supported.
Allow user to Select this option to include a text box into which users can enter their own justification.
enter text
explanation
Note: If the ICE Utility is not installed, then the DLP Agent does not block the file.
■ Apply the Endpoint Prevent ICE license and configure the Enforce Server to connect to
the Symantec Information Centric Encryption Cloud.
Response rule actions 1822
Configuring the Endpoint Prevent: Encrypt action
For information about how Symantec Data Loss Prevention interacts with Symantec ICE,
refer to the Symantec Information Centric Encryption Deployment Guide.
See “Configuring the Enforce Server to connect to the Symantec ICE Cloud” on page 224.
■ Enable Information Centric Encryption settings for DLP Agents on the System > Agents
> Agent Configuration > Settings page.
See “Agent settings” on page 2364.
See “Information Centric Encryption settings for DLP Agents” on page 2371.
When a violation is detected, the DLP Agent encrypts the file, the data transfer completes,
and an incident is created. You can provide a reason for the notification as well as options for
the endpoint user to enter a justification for the action. This response rule action is available
for Endpoint Prevent on Windows and Mac endpoints.
See “How to implement Endpoint Prevent” on page 2312.
To configure the Endpoint Prevent: Encrypt action
1 Navigate to Policies > Response Rules, click Add Response Rule, and select the type
of response rule to add: Automated Response or Smart Response.
2 Configure a response rule at the Configure Response Rule screen.
See “Configuring response rules” on page 1763.
Add the Endpoint Prevent: Encrypt action type from the Actions list.
See “Configuring response rule actions” on page 1765.
3 Configure the Endpoint Prevent: Encrypt parameters.
See Table 50-24 on page 1822.
4 Click Save to save the configuration.
See “Manage response rules” on page 1761.
Parameter Description
Language Select the language you want the response rule to apply to. Click Add
Language to add more than one language.
See “About Endpoint Prevent response rules in different locales” on page 2314.
See “Setting Endpoint Prevent response rules for different locales” on page 2315.
Display Block Alert Box This field is required to notify users that the data transfer was blocked.
with this message
Enter the notification message in the text box. You can add variables to the
message by selecting the appropriate value(s) from the Insert Variable box.
A user must click OK to acknowledge the alert and dismiss the pop-up dialog.
Response rule actions 1823
Configuring the Endpoint Prevent: Encrypt action
Parameter Description
Display Encrypt Alert This field is required to notify users that the file that they tried to transfer was
Box with this message encrypted.
Enter the notification message in the text box. You can add variables to the
message by selecting the appropriate value(s) from the Insert Variable box.
User must click OK to acknowledge the alert and dismiss the pop-up dialog.
Display Retry Alert with This field is required to notify users that the file they tried to upload using the
this message browser was encrypted at the source location, and the original file was deleted.
The users should upload this encrypted file using the browser.
Enter the notification message in the text box. You can add variables to the
message by selecting the appropriate value(s) from the Insert Variable box.
User must click OK to acknowledge the alert and dismiss the pop-up dialog.
Insert Variable Select the variables that you want to include in the on-screen notification to
the endpoint user.
■ Application
■ Content Name
■ Content Type
■ Device Type
■ Policy Name
■ Protocol
Response rule actions 1824
Configuring the Endpoint Prevent: Encrypt action
Parameter Description
Allow user to choose Select this option to display up to four user justifications in the on-screen
explanation notification. When the notification appears on the endpoint, the user is required
to choose one of the justifications. (If you select Allow user to enter text
explanation, the user can enter a justification.) Symantec Data Loss Prevention
provides four default justifications, which you can modify or remove as needed.
Available justifications:
■ Check box
This option indicates whether to include the associated justification in the
notification. To remove a justification, clear the check box next to it. To
include a justification, select the check box next to it.
■ Justification
The system label for the justification. This value appears in reports (for
ordering and filtering purposes), but the user does not see it. You can select
the desired option from the drop-down list.
■ Option Presented to End User
The justification text Symantec Data Loss Prevention displays in the
notification. This value appears in reports with the justification label. You
can modify the default text as desired.
Allow user to enter text Select this option to include a text box into which users can enter their own
explanation justification.
Note: The notify action is not triggered for a copy of sensitive data to a local drive.
Parameter Description
Language Select the language you want the response rule to execute on.
See “About Endpoint Prevent response rules in different locales” on page 2314.
See “Setting Endpoint Prevent response rules for different locales” on page 2315.
Response rule actions 1826
Configuring the Endpoint Prevent: Notify action
Table 50-25 Endpoint Prevent: Notify response rule action parameters (continued)
Parameter Description
Display Alert Box This field is required for Endpoint Notify actions. Select this option to display an on-screen
with this message notification to the endpoint user.
Enter the notification message in the text box. You can add variables to the message by selecting
the appropriate value(s) from the Insert Variable box.
Optionally, you can configure the on-screen notification to include user justifications as well as
the option for users to enter their own justifications.
You can also add hyperlinks to refer users to URLs that contain company security information.
To add hyperlinks you use standard HTML syntax, tags, and URLs. Tags are case-sensitive.
You can include insert hyperlinked text between regular text. For example, you would enter:
Insert Variable Select the variables that you want to include in the on-screen notification to the endpoint user.
You can select variables based on the following types:
■ Application
■ Content Name
■ Content Type
■ Device Type
■ Policy Names
■ Protocol
Response rule actions 1827
Configuring the Endpoint Prevent: Notify action
Table 50-25 Endpoint Prevent: Notify response rule action parameters (continued)
Parameter Description
Allow user to choose Select this option to display up to four user justifications in the on-screen notification. When
explanation the notification appears on the endpoint, the user is required to choose one of the justifications.
(If you select Allow user to enter text explanation, the user can enter a justification.) Symantec
Data Loss Prevention provides four default justifications, which you can modify or remove as
needed.
Available Justifications:
■ Check box
This option indicates whether to include the associated justification in the notification. To
remove a justification, clear the check box next to it. To include a justification, select the
check box next to it.
■ Justification
The system label for the justification. This value appears in reports (for ordering and filtering
purposes), but the user does not see it. You can select the desired option from the drop-down
list.
■ Option Presented to End User
The justification text Symantec Data Loss Prevention displays in the notification. This value
appears in reports with the justification label. You can modify the default text as desired.
To add a new justification, select New Justification from the appropriate drop-down list. In the
Enter new justification text box that appears, type the justification name. When you save the
rule, the system includes the new justification as an option (in alphabetical order) in all
Justification drop-down lists.
Note: You should be selective in adding new justifications. Deleting new justifications is not
currently supported.
Allow user to enter Select this option to include a text box into which users can enter their own justification.
text explanation
Parameter Description
Language Select the language you want the response rule to execute on.
See “About Endpoint Prevent response rules in different locales” on page 2314.
See “Setting Endpoint Prevent response rules for different locales” on page 2315.
Pre-timeout warning This field is required to notify users that they have a limited amount of time to respond to the
incident.
Enter the notification message in the text box. You can add variables to the message by selecting
the appropriate value(s) from the Insert Variable box.
Response rule actions 1829
Configuring the Endpoint Prevent: User Cancel action
Parameter Description
Post-timeout This field notifies users that the amount of time to override the policy has expired. The data
message transfer was blocked.
Enter the notification message in the text box. You can add variables to the message by selecting
the appropriate value(s) from the Insert Variable box.
Display Alert Box This field is required for Endpoint User Cancel actions. Select this option to display an on-screen
with this message notification to the endpoint user.
Enter the notification message in the text box. You can add variables to the message by selecting
the appropriate value(s) from the Insert Variable box.
Optionally, you can configure the on-screen notification to include user justifications as well as
the option for users to enter their own justifications.
You can also add hyperlinks to refer users to URLs that contain company security information.
To add hyperlinks you use standard HTML syntax, tags, and URLs. Tags are case-sensitive.
You can include insert hyperlinked text between regular text. For example, you would enter:
Insert Variable Select the variables that you want to include in the on-screen notification to the endpoint user.
You can select variables based on the following types:
■ Application
■ Content Name
■ Content Type
■ Device Type
■ Policy Name
■ Protocol
■ Timeout Counter
Note: You must use the Timeout Counter variable to display how much time remains before
blocking the data transfer.
Response rule actions 1830
Configuring the Endpoint Prevent: User Cancel action
Parameter Description
Allow user to choose Select this option to display up to four user justifications in the on-screen notification. When
explanation. the notification appears on the endpoint, the user is required to choose one of the justifications.
(If you select Allow user to enter text explanation, the user can enter a justification.) Symantec
Data Loss Prevention provides four default justifications, which you can modify or remove as
needed.
Available Justifications:
■ Check box
This option indicates whether to include the associated justification in the notification. To
remove a justification, clear the check box next to it. To include a justification, select the
check box next to it.
■ Justification
The system label for the justification. This value appears in reports (for ordering and filtering
purposes), but the user does not see it. You can select the desired option from the drop-down
list.
■ Option Presented to End User
The justification text Symantec Data Loss Prevention displays in the notification. This value
appears in reports with the justification label. You can modify the default text as desired.
To add a new justification, select New Justification from the appropriate drop-down list. In the
Enter new justification text box that appears, type the justification name. When you save the
rule, the system includes the new justification as an option (in alphabetical order) in all
Justification drop-down lists.
Note: You should be selective in adding new justifications. Deleting new justifications is not
currently supported.
Allow user to enter Select this option to include a text box into which users can enter their own justification.
text explanation.
Note: If the requesting client does not expect an HTML response, the Rejection Message
may not be displayed in the client browser. For example, a client expecting an XML
response to a Web post may only indicate a Javascript error.
See “Response rule actions for Network Prevent detection” on page 1741.
You must integrate the Network Prevent for Email detection server with a Mail Transfer Agent
(MTA) to implement this response rule action. Refer to the Symantec Data Loss Prevention
MTA Integration Guide for Network Prevent for Email for details.
To configure the Block SMTP Message response rule action
1 Configure a response rule at the Configure Response Rule screen.
See “Configuring response rules” on page 1763.
2 Add the Network Prevent: Block SMTP Message action type from the Actions list.
See “Configuring response rule actions” on page 1765.
3 Configure the Block SMTP Message action parameters.
See Table 50-27 on page 1833.
4 Click Save to save the response rule.
See “Manage response rules” on page 1761.
Parameter Description
Bounce Message to Sender Enter the text that you want to appear in the SMTP error that Network Prevent
for Email returns to the MTA. Some MTAs display this text in the message that
is bounced to the sender.
If you leave this field blank, the message does not bounce to the sender but
the MTA sends its own message.
Redirect Message to this Address If you want to redirect blocked messages to a particular address (such as the
Symantec Data Loss Prevention administrator), enter that address in this field.
If you leave this field blank, the bounced message goes to the sender only.
See “Response rule actions for Network Prevent detection” on page 1741.
To configure the Network Prevent: Modify SMTP Message action
1 Configure a response rule at the Configure Response Rule screen.
See “Configuring response rules” on page 1763.
2 Add the Network Prevent: Modify SMTP Message action type from the Actions list.
See “Configuring response rule actions” on page 1765.
3 Configure the action parameters.
See Table 50-28 on page 1834.
4 Click Save to save the configuration.
See “Manage response rules” on page 1761.
Parameter Description
Subject Select the type of modification to make to the subject of the message from the following options:
For example, if you want to prepend "VIOLATION" to the subject of the message, select Prepend
and enter VIOLATION in the text field.
Headers Enter a unique name and a value for each header you want to add to the message (up to three).
Enable Email Select this option to enable integration with Symantec Messaging Gateway. When this option is
Quarantine enabled, Symantec Data Loss Prevention adds preconfigured x-headers to the message that
Connect (requires inform Symantec Messaging Gateway that the message should be quarantined.
Symantec
For more information, see the Symantec Data Loss Prevention Email Quarantine Connect
Messaging
FlexResponse Implementation Guide.
Gateway)
Note: Symantec Data Loss Prevention removes content for file uploads and, for Network
Prevent, Web mail attachments even for those sites that it does not recognize for HTTP content
removal.
To configure the Network Prevent for Web: Remove HTTP/S Content action
1 Configure a response rule at the Configure Response Rule screen.
See “Configuring response rules” on page 1763.
2 Add the Network Prevent for Web: Remove HTTP/S Content action type from the
Actions list.
See “Configuring response rule actions” on page 1765.
3 Configure the action parameters.
See Table 50-29 on page 1835.
4 Click Save to save the configuration.
See “Manage response rules” on page 1761.
Table 50-29 Network Prevent for Web: Remove HTTP/S Content parameters
Field Description
Removal The message that appears in content (Web postings, Web mail, or files) from which the system has
Message removed confidential information. Only the recipient sees this message.
Response rule actions 1836
Configuring the Network Protect: Copy File action
Table 50-29 Network Prevent for Web: Remove HTTP/S Content parameters (continued)
Field Description
Fallback option The action to take if Network Prevent for Web cannot remove confidential information that was
detected in an HTTP or HTTPS post.
Rejection The message that Network Prevent for Web returns to a client when it blocks an HTTP or HTTPS
Message post. The client Web application may or may not display the rejection message, depending on how
the application handles error messages.
Parameter Description
Marker File Select this option to create a marker text file to replace the original file. This action notifies the user
what happened to the file instead of quarantining or deleting the file without any explanation.
Note: The marker file is the same type and has the same name as the original file, as long as it is a
text file. An example of such a file type is Microsoft Word. If the original file is a PDF or image file, the
system creates a plain text marker file. The system then gives the file the same name as the original
file with .txt appended to the end. For example, if the original file name is accounts.pdf, the marker file
name is accounts.pdf.txt.
Response rule actions 1838
Configuring the Network Protect: Encrypt File action
Parameter Description
Marker Text Specify the text to appear in the marker file. If you selected the option to leave the marker file in place
of the remediated file, you can use variables in the marker text.
To specify marker text, select the variable from the Insert Variable list.
Note: When a file is encrypted, the file extension changes to .html You must manually update
any links that point to the original unencrypted file.
■ Remediating incidents
Role-based access control Access to incident information in the Symantec Data Loss Prevention system
can be tightly controlled with role-based access control. Roles control which
incidents a particular remediator can take action on, as well as what
information within that incident is available to the remediator. For example,
access control can be used to ensure that a given remediator can act only
on incidents originating within a particular business unit. In addition, it might
prevent that business unit's staff from ever seeing high-severity incidents,
instead routing those incidents to the security department.
Severity level assignment Incident severity is a measure of the risk that is associated with a particular
incident. For example, an email message containing 50 customer records
can be considered more severe than a message containing 50 violations of
an acceptable use policy. Symantec Data Loss Prevention lets you specify
what constitutes a severe incident by configuring it at the policy rule level.
Symantec Data Loss Prevention then uses the severity of the incident to
drive subsequent responses to the incident. This process lets you prioritize
incidents and devote your manual remediation resources to the areas where
they are needed most.
Custom attribute lookup Custom attribute lookup is the process of collecting additional information
about the incident from data sources outside of Enforce and the incident
itself. For example, a corporate LDAP server can be queried for additional
information about the message sender, such as the sender's manager name
or business unit.
For example, you can use custom attributes as input to subsequent automated
responses to automatically notify the sender's manager about the policy
violation.
Automated incident A powerful feature of the Enforce Server is the ability to automatically respond
responses to incidents as they arise. For example, you can configure the system to
respond to a serious incident by blocking the offending communication. You
can send an email message to the sender's manager. You can send an alert
to a security event management system. You can escalate the incident to
the security department. On the other hand, an acceptable use incident might
be dispensed with by sending an email message to the sender. Then you
can mark the incident as closed, requiring no further work. Between these
extremes, you can establish a policy that automatically encrypts transmissions
of confidential data to a business partner. All of these scenarios can be
handled automatically without user intervention.
Smart Response Although the automated response is an important part of the remediation
process, SmartResponse is necessary at times, particularly in the case of
more serious incidents. Symantec Data Loss Prevention provides a detailed
Incident Snapshot with all of the information necessary to determine the next
steps in remediation. You can use SmartResponse to manually update
incident severity, status, and custom attributes, add comments to the incident.
You can move the incident through the remediation workflow to resolve it.
■ Add Note
■ Log to a Syslog Server
■ Send Email Notification
■ Set Status
Distribution of aggregated You can create and automatically distribute aggregated incident reports to
incident reports data owners for remediation.
The Enforce Server handles all of these steps, except for Smart Response. You can handle
incidents in an entirely automated way. You can reserve manual intervention (Smart Response)
for only the most serious incidents.
See “Network incident snapshot” on page 1857.
See “Discover incident snapshot” on page 1882.
See “Endpoint incident snapshot” on page 1866.
Remediating incidents 1844
Remediating incidents
Remediating incidents
When you remediate an incident, you can perform the following actions:
■ Set the incident’s status or severity.
■ Apply a Smart Response rule to the incident.
■ Set the incident’s custom attributes.
■ Add comments to the incident record.
■ Remediate incidents by going to an incident list or incident snapshot and selecting actions
to perform on one or more incidents.
■ Perform some combination of these actions.
You can import a solution pack during installation. Solution packs prepopulate incident lists
and incident snapshots with several remediation options and custom attributes. For complete
descriptions of all solution packs (including information about all remediation options and
custom attributes they contain), refer to the documentation for each of the solution packs in
the solutions packs directory in the documentation.
To remediate incidents
1 Access an incident list or incident snapshot.
In incident lists, Symantec Data Loss Prevention displays available remediation options
in the Incident Actions drop-down menu. The menu becomes active when you select
one or more incidents in the list (with the check box). In incident snapshots, Symantec
Data Loss Prevention also displays the available remediation options. You can set a
Status or Severity from the drop-down menus.
See “Viewing incidents” on page 1911.
You can also edit the Attributes and provide related information.
2 Take either of the following actions:
■ When you view an incident list, select the incident(s) to be remediated (check the box).
You can select incidents individually or select all incidents on the current screen. Then
select the wanted action from the Incidents Actions drop-down menu. For example,
select Incident Actions > Set Status > Escalated.
You can perform as many actions as needed.
■ When you view an incident snapshot, you can set the Status and Severity from the
drop-down menus.
If a Smart Response has been previously set up, you can select a Smart Response
rule in the remediation bar.
See “About response rules” on page 1738.
Remediating incidents 1845
Executing Smart response rules
For example, if one of the Solution Packs was installed, you can select Dismiss False
Positive in the remediation bar. When the Execute Response Rule screen appears,
click OK. This Smart Response rule changes the incident status from New to
Dismissed and sets the Dismissal Reason attribute to False Positive.
You can perform as many remediation actions as needed.
Note: Sending an email notification to the sender applies to SMTP incidents only. Also, the
notification addressees that are based on custom attributes (such as "manager email") work
correctly only if populated by the attribute lookup plug-in.
Add Note Add a brief note to the selected incident(s). The comment appears
on the Incident History tab of the Incident Snapshot page for each
selected incident.
Delete Incidents Delete the selected incident(s) from the Symantec Data Loss
Prevention system.
Export Selected: CSV Export the selected incident(s) to a comma-separated (.csv) file.
Hide/Unhide Select one of the following incident hiding actions to set the hidden
state for the selected incidents:
Lookup Attributes Use the configured lookup plug-ins to look up the configured
attributes.
Set Attributes Display the Set Attributes page so you can enter or edit the attribute
values for the selected incident(s).
■ Name
■ Email Address
Set Severity Change the severity that is set for the selected incident(s) to one of
the options under Set Severity.
Set Status Change the status of the selected incident(s) to one of the options
under Set Status. A system administrator can customize the options
that appear on this list on the Incident Attributes page.
Run Smart Response Perform one of the listed responses on the selected incident(s).
When you click a response rule, the Execute Response Rule page
appears.
$APPLICATION_NAME$ Specifies the name of the application that is associated with the
incident.
$INCIDENT_SNAPSHOT$ The fully qualified URL to the incident snapshot page for the incident.
$OCCURED_ON$ Specifies the date on which the incident occurred. This date may be
different than the date the incident was reported.
$POLICY_RULES$ A comma-separated list of one or more policy rules that were violated.
$PROTOCOL$ The protocol, device type, and target type of the incident, where
applicable.
$MONITOR_NAME$ Specifies the detection server or cloud detector that created the
incident.
$DATAOWNER_NAME$ The person responsible for remediating the incident. This field must
be set manually, or with one of the lookup plug-ins.
$DATAOWNER_EMAIL$ The email address of the person responsible for remediating the
incident. This field must be set manually, or with one of the lookup
plug-ins.
$DATAOWNER_NAME$ The person responsible for remediating the incident. This field must
be set manually, or with one of the lookup plug-ins.
$DATAOWNER_EMAIL$ The email address of the person responsible for remediating the
incident. This field must be set manually, or with one of the lookup
plug-ins.
Remediating incidents 1849
Response action variables
$ENDPOINT_MACHINE$ The name of the endpoint computer that generated the violation.
$PATH$ The full path to the file in which the incident was found.
$FILE_NAME$ The name of the file in which the incident was found.
$PARENT_PATH$ The path to the parent directory of the file in which the incident was
found.
$QUARANTINE_PARENT_PATH$ The path to the parent directory in which the file was quarantined.
$TARGET$ The name of the target in which the incident was found.
$DATAOWNER_NAME$ The person responsible for remediating the incident. This field must
be set manually, or with one of the lookup plug-ins.
$DATAOWNER_EMAIL$ The email address of the person responsible for remediating the
incident. This field can be set manually, or with one of the lookup
plug-ins.
$ENDPOINT_MACHINE$ The name of the endpoint computer that generated the violation.
$DATAOWNER_NAME$ The person responsible for remediating the incident. This field must
be set manually.
$DATAOWNER_EMAIL$ The email address of the person responsible for remediating the
incident. This field must be set manually.
Chapter 52
Remediating Network
incidents
This chapter includes the following topics:
Note: Use caution when you click Select All. This action selects all incidents in the report (not
only those on the current page). Any incident command you subsequently apply affects all
incidents. To select only the incidents on the current page, select the checkbox at top left of
the incident list.
Incident information is divided into several columns. Click any column header to sort
alpha-numerically by that column's data. To sort in reverse order, click the column header a
second time. By default, Symantec Data Loss Prevention sorts incidents by date.
The Type column shows the icons that indicate the type of network incident. Table 52-1
describes the icons.
Remediating Network incidents 1853
Network incident list
Icon Description
SMTP
The addition of the second icon indicates a message
attachment.
HTTP
HTTPS
FTP
NNTP
IM:MSN
IM:AIM
IM:Yahoo
TCP:custom_protocol
This column also indicates whether the communication was blocked or altered. Table 52-2
shows the possible values.
Icon Description
Icon Description
Use the following links to learn more about the Network incident list page:
Columns of the incident list table See “Network incident list—Columns” on page 1856.
Actions to perform on selected incidents See “Network incident list—Actions” on page 1854.
Viewing a summary of all network incidents See “Network summary report” on page 1861.
Common features of all Symantec Data Loss See “About incident reports” on page 1902.
Prevention reports
See “Common incident report features” on page 1933.
Action Description
Action Description
Run Smart Response Select to run a Smart Response rule that you or
your administrator configured. (To configure a Smart
Response rule, navigate to Policy > Response
Rules, click Add Response Rule, and select Smart
Response.
Set Data Owner Set the data owner name or email address. The
data owner is the person responsible for remediating
the incident.
Icon Description
High
Medium
Low
■ Status
Remediating Network incidents 1857
Network incident snapshot
Navigation and Smart Response options See “Network incident snapshot—Heading and
navigation” on page 1857.
If you configured any Smart Response rules, Symantec Data Loss Prevention displays the
response options for executing the rules at the top of the page. Depending on the number of
Smart Response rules, a drop-down menu may also appear.
See “Network incident snapshot” on page 1857.
Key Info The Key Info tab shows the policy that was violated in the incident. It also
shows the total number of matches for the policy, as well as matches per
policy rule. Click the policy name to view a list of all incidents that violated
the policy. Click view policy to view a read-only version of the policy.
This section also lists other policies that the same file violated. To view
the snapshot of an incident that is associated with a particular policy, click
go to incident next to the policy name. To view a list of all incidents that
the file created, click show all.
History View the actions that were performed on the incident. For each action,
Symantec Data Loss Prevention displays the action date and time, the
actor (a user or server), and the action or the comment.
Notes View any notes that you or others have added to the incident. Click Add
Note to add a note.
Correlations You can view a list of those incidents that share attributes of the current
incident. For example, you can view a list of all incidents that a single
account generated. The Correlations tab shows a list of correlations that
match single attributes. Click on attribute values to view lists of those
incidents that are related to those values.
To search for other incidents with the same attributes, click Find Similar.
In the Find Similar Incidents dialog box that appears, select the desired
search attributes. Then click Find Incidents.
Note: The list of correlated incidents does not display related incidents
that have been hidden.
Matches are highlighted in yellow and organized according to the message component (such
as header, body, or attachment) in which they were detected. Symantec Data Loss Prevention
displays the total relevant matches for each message component. It shows matches by the
Remediating Network incidents 1861
Network incident snapshot—Attributes
order in which they appear in the original text. To view the rule that triggered a match, click
on the highlighted match.
See “About the Similarity Threshold and Similarity Score” on page 667.
See “Network incident snapshot” on page 1857.
You can view a list of custom attributes and their values, if any have been specified. Click on
attribute values to view an incident list that is filtered on that value. To add new values or edit
existing ones, click Edit. In the Edit Attributes dialog box that appears, type the new values
and click Save.
See “Setting the values of custom attributes manually” on page 1972.
See “Network incident snapshot” on page 1857.
If any of the severity columns contain totals, you can click on them to view a list of incidents
of the chosen severity.
See “Common incident report features” on page 1933.
See “About dashboard reports and executive summaries” on page 1903.
See “About incident reports” on page 1902.
See “Saving custom incident reports” on page 1914.
Chapter 53
Remediating Endpoint
incidents
This chapter includes the following topics:
Note: Endpoint reports show only the incidents that were captured by Endpoint Prevent.
Incidents that were captured by Endpoint Discover appear in Network Discover reports.
Incident information is divided into several columns. Click any column header to sort
alpha-numerically by the data in that column. To sort in reverse order, click the column header
a second time. By default, Symantec Data Loss Prevention lists incidents by date.
The report includes the following columns:
■ Check boxes that let you select incidents to remediate
Remediating Endpoint incidents 1864
About endpoint incident lists
You can select one or more incidents to which to apply commands from the Incident drop-down
menu at the top of the list. Click the checkbox at the top of the column to select all incidents
on the current page. (You can click Select All at far right to select all incidents in the report.)
Email/SMTP
HTTP
HTTPS
FTP
IM: MSN
IM: Yahoo
Print/Fax
Clipboard
A response column that indicates whether Symantec Data Loss Prevention blocked an
attempted violation or notified the end user about the violation of confidential data.
The possible values are as follows:
Remediating Endpoint incidents 1865
About endpoint incident lists
■ Blank if Symantec Data Loss Prevention did not block the violation or notify the end user
■ A red icon indicates the violation was blocked by Symantec Data Loss Prevention, by the
user, or if the user cancel option time limit expired.
■ A notification icon indicates Symantec Data Loss Prevention notified the end user about
the violated confidential data policies. The notification icon also appears if the user allowed
the violating data transfer. The icon also appears if the user cancel time limit option has
expired and the default action is set to allow data transfers.
The other columns of this section appear as follows:
Column Definition
■ High
■ Medium
■ Low
■ For information only
Remediating Endpoint incidents 1866
Endpoint incident snapshot
Column Definition
■ New
■ In Process
■ Escalated
■ False positive
■ Configuration Errors
■ Resolved
You or your administrator can add new status designations on the Attribute Setup page.
See “Endpoint incident snapshot” on page 1866.
See “About incident remediation” on page 1841.
See “About incident reports” on page 1902.
See “Saving custom incident reports” on page 1914.
Local drive
Network Share
Email/SMTP
HTTP
HTTPS/SSL
FTP
IM: MSN
IM: Yahoo
Print/Fax
Clipboard
Section Description
Incident Reported On Date and time the Endpoint Server detected the
incident.
Section Description
File name Name of the file that violated the policy. The file
name field appears only for fixed-drive incidents.
■ File Quarantined
■ Quarantine Failed
■ Quarantine Result Timeout
Quarantine Location Displays the file path of the secure location where
the file was moved.
Quarantine Details Displays the reason that the quarantine task failed
to move the confidential file. For example, the action
may fail because the source file is missing, or the
credentials to access the secure location are
incorrect.
Section Description
Source The original file or data for the violation. The source
primarily appears in file-transfer incidents.
FTP User Name The originating user name for violating FTP
transfers.
Data Owner Email Address The email address for the owner of the confidential
data.
Other sections of the incident snapshot are common across all Symantec Data Loss Prevention
products. These common sections include:
■ Incident snapshot matches
See “Incident snapshot matches section” on page 1938.
■ Incident snapshot policy section
See “Incident snapshot policy section” on page 1938.
Remediating Endpoint incidents 1871
Reporting on Endpoint Prevent response rules
Note: For Endpoint Discover, Quarantine incidents always take precedence over Endpoint
FlexResponse incidents.
The icon also indicates if the content was blocked because the user elected to block the
content. Alternately, the icon indicates that the user cancel time limit was exceeded and
the content was blocked.
■ The snapshot of a superseded Endpoint Notify incident does not include the Notify icon.
The Notify icon is not included because Symantec Data Loss Prevention did not display
the particular on-screen notification that was configured in the policy.
■ The snapshot of a superseded Endpoint Quarantine incident displays the Blocked icon
because the data did not move out of the secured area. The icon also indicates if the content
was blocked because the user elected to block the content. Alternately, the icon indicates
that the user cancel time limit was exceeded and the content was blocked. The History tab
of the incident snapshot always displays information on whether the Endpoint FlexResponse
rule was successful.
■ The snapshot of a superseded Endpoint FlexResponse incident displays the Blocked icon
because the data did not move out of the secured area. The icon also indicates if an
Endpoint Quarantine response rule was activated.
If you have configured Endpoint Prevent response rules to display on-screen notifications
prompting users to justify their actions, the following statements are true:
■ Symantec Data Loss Prevention displays the user justification in the snapshots of all the
incidents that are generated by the policies that include the executed response rule.
■ Symantec Data Loss Prevention displays the justification Superseded – Yes in the
snapshots of all superseded incidents that do not include the executed response rule.
■ If there is no user to enter a justification, for example if a user accesses a remote computer,
the justification reads N/A.
See “Network incident snapshot” on page 1857.
See “Configuring response rule conditions” on page 1764.
See “About incident reports” on page 1902.
See “Manage response rules” on page 1761.
FTP user name at the FTP Destination For FTP incidents, the user name at the FTP
destination is displayed.
File Name/Location For print/fax incidents, the name of the file and the
location of the file on the endpoint is displayed.
Print Job Name For print/fax incidents, the print job name is the file
name of the printing job that generated the incident.
Printer Name/Type For print/fax incidents, the printer name and type
are only displayed if the file cannot be named
through from the Print Job name. Or, if the file was
generated from an Internet browser.
Source Application Window Title For Clipboard incidents, the application window
name from which the contents of the Clipboard were
taken.
Remediating Endpoint incidents 1874
Endpoint incident summary reports
Title Bar For Clipboard incidents, the title bar is the window
from which the data was copied.
Note: Endpoint reports show only the incidents that are captured by Endpoint Prevent. Incidents
from Endpoint Discover appear in Network Discover reports.
To view the primary and the secondary summary criteria available for the report, go to the
Summarize By link. Click Edit. In the Primary and Secondary drop-down menus, Symantec
Data Loss Prevention displays all of the criteria in alphabetical order, followed by custom
criteria your system administrator defined. You can select criteria from the Primary and
Secondary drop-down menus and then click Run Now to create a new summary report.
Summary reports take their name from the primary summary criterion. If you rerun a report
with new criteria, the report name changes accordingly.
See “About filters and summary options for reports” on page 1940.
Summary entries are divided into several columns. Click any column header to sort
alpha-numerically by that column's data. To sort in reverse order, click the column header a
second time.
Field Description
Field Description
go to Manage > Discover Scanning > Scan History, then select one of the Discover scans
from the list.
See “Managing Network Discover/Cloud Storage Discover target scans” on page 2111.
Table 54-1 lists the Network Discover/Cloud Storage Discover reports.
Report Navigation
Network Discover/Cloud This report is on the Enforce Server administration console, Manage menu,
Storage Discover Targets Discover Scanning > Discover Targets.
See “About the Network Discover/Cloud Storage Discover scan target list”
on page 2111.
Scan Status This report is on the Enforce Server administration console, Manage menu,
Discover Scanning > Discover Servers.
Scan History (single This report is from the Enforce Server administration console, Manage
target) menu, Discover Scanning > Discover Targets. Click the link in the Scan
Status column to see the history of a particular scan target.
See “About Discover and Endpoint Discover scan histories” on page 2114.
Scan History (all targets) This report is from the Enforce Server administration console, Manage
menu, Discover Scanning > Scan History.
See “About Discover and Endpoint Discover scan histories” on page 2114.
Scan Details This report is from the Enforce Server administration console, Manage
menu, Discover Scanning > Scan History. Click the link in the Scan Status
column to see the scan details.
for all incidents, new incidents, target summary, policy by target, status by target, or top shares
at risk.
Summaries and filter options can select which incidents to display.
See “About custom reports and dashboards” on page 1912.
See “About filters and summary options for reports” on page 1940.
You can create custom reports with combinations of filters and summaries to identify the
incidents to remediate.
For example you can create the following reports:
■ A summary report of the number of incidents in each remediation category.
Select the summary Protect Status.
■ A report of all the incidents that were remediated with copy or quarantine.
Select the filter Protect Status with values of File Copied and File Quarantined.
■ A report of the Network Discover incidents that have not been seen before (to identify these
incidents and notify the data owners to remediate them).
Select the filter Seen Before?. Set a value of No.
■ A report of the Network Discover incidents that are still present (to know which incidents
to escalate for remediation).
Select the filter Seen Before?. Set a value of Yes.
■ A report using the summary filters, such as months since first detected.
Select the summary Months Since First Detected.
■ Hide/Unhide
Select one of the following actions to set the display state for the selected incidents:
■ Hide Incidents—Flags the selected incidents as hidden.
■ Unhide Incidents—Restores the selected incidents to the unhidden state.
■ Do Not Hide—Prevents the selected incidents from being hidden.
■ Allow Hiding—Allows the selected incidents to be hidden.
See “About incident hiding” on page 1958.
■ Set Attributes
Select to set attributes for the selected incidents.
■ Set Data Owner
Set the data owner name or email address. The data owner is the person responsible for
remediating the incident.
Reports can automatically be sent to the data owner for remediation.
■ Set Status
Select to set status.
■ Set Severity
Select to set severity.
■ Lookup Attributes
Use the lookup plug-ins to look up incident custom attributes.
■ Run Smart Response
Select to run a Smart Response rule you or your administrator configured.
See “Discover incident lists” on page 1879.
Note: Use caution when you use Select All. This option selects all incidents in the report,
not only those on the current page. Any incident command you subsequently apply affects
all incidents. You may want to configure the maximum-incident-batch-size property to
limit the number of incidents that a Server FlexResponse plug-in processes at one time.
See “Adding a Server FlexResponse plug-in to the plug-ins properties file” on page 2143.
■ Type
Type of target in which the match was detected.
An icon represents each target type.
This column also displays a remediation icon, if any response rule applied.
The possible values are as follows:
Copied
Quarantined
Remediation Error
When you use a Server FlexResponse action for an Automated or Smart response rule,
one of the following icons may appear:
These same icons may appear for other incident types as well, and you can execute Server
FlexResponse actions on those incidents.
See “Configuring the Server FlexResponse action” on page 1788.
■ Location/Target/Scan
Repository or file location, target name, and date and time of most recent scan.
■ File Owner
Username of file owner (for example, MYDOMAIN\Administrator).
■ ID/Policy
The Symantec Data Loss Prevention incident number and the policy the incident violated.
■ Matches
The number of matches in the incident.
Remediating Discover incidents 1882
Discover incident snapshot
■ Severity
Incident severity as determined by the severity setting of the rule the incident matched.
The possible values are:
High
Medium
Low
■ Status
The current incident status.
The possible values are:
■ New
■ In Process
■ Escalated
■ False Positive
■ Configuration Errors
■ Resolved
The following icon may be displayed near the status if this incident was seen before:
You or your administrator can add new status designations on the attribute setup page.
See “Configuring custom attributes” on page 1970.
See “Discover incident lists” on page 1879.
Use the icons at the top right to print the report, or send it as email. To send reports, you or
your administrator must first enable report distribution in system settings.
See “Configuring the Enforce Server to send email alerts” on page 176.
If any Smart Response rules are set up, Symantec Data Loss Prevention displays a remediation
bar that includes buttons for executing the rules. Depending on the number of Smart Response
rules, a drop-down menu may also appear.
See “About incident remediation” on page 1841.
Incident data is divided into the following sections:
■ Key Info tab
■ Policy Matches
See “Incident snapshot policy section” on page 1938.
■ Incident Details
The following details are included:
Remediation The latest remediation status of the file that generated the incident.
Detection Status
Scan The date and time of the scan that registered the incident.
Detection Date The date and time that the incident was detected.
Protect Status For Box incidents, displays the remediation status of the content that
generated the incident.
Seen Before No, if this incident was not previously detected. Yes, if this incident was
previously detected.
Is Hidden Displays the hidden state of the incident, whether or not the incident is
hideable, and lets you toggle the Do Not Hide flag for the incident. See
“About incident hiding” on page 1958.
Remediating Discover incidents 1884
Discover incident snapshot
URL For SharePoint, this URL is the item on the SharePoint server. Click
this URL to go to the item on the SharePoint server.
Extraction Date Date custom target adapter was run ( In the Firefox browser, these links
do not work without additional setup.
Notes Database Name of the IBM (Lotus) Notes database (Applies to IBM (Lotus) Notes
only.)
File Created The date and time that the file or item was created.
Last Modified Date and time of last change to the file or item.
Last Accessed Date and time of last user access to the file or item.
Data Owner Name The person responsible for remediating the incident. This field must be
set manually, or with a lookup plug-in.
Data Owner Email The email address of the person responsible for remediating the incident.
Address This field must be set manually, or with a lookup plug-in.
■ Access Information
See “Incident snapshot access information section” on page 1938.
For SharePoint incident snapshots, the permission levels show the permissions from
SharePoint, for example Contribute or Design. The list in the incident snapshot shows
Remediating Discover incidents 1885
Discover summary reports
only the first 50 entries. All the ACL entries can be exported to a CSV file. The
permissions are comma-separated. Users or groups having Limited Access permission
levels are not recorded or shown.
Note: If you are scanning a SharePoint repository without using the SharePoint solution,
the incident snapshot will not show any SharePoint permissions information.
■ Attributes
See “Incident snapshot attributes section” on page 1937.
■ History tab
See “Incident snapshot history tab” on page 1936.
■ Notes tab
See “Incident snapshot notes tab” on page 1937.
■ Correlations tab
See “Incident snapshot correlations tab” on page 1937.
■ Matches and file content
See “Incident snapshot matches section” on page 1938.
See “Discover incident reports” on page 1878.
■ Incidents - All
Displays a list of all incidents.
See “Applications incident list” on page 1889.
■ DIM - Incidents - All
Displays a list of all Data-in-Motion (DIM) incidents
See “Applications incident list” on page 1889.
■ DIM - Incidents - New
Displays a list of all DIM incidents with a status of New.
See “Applications incident list” on page 1889.
■ DIM - Policy Summary
Displays a summary of DIM incidents by policy.
See “Applications summary reports” on page 1896.
■ DIM - Status by Policy
Displays a summary of DIM incidents by policy and incident status.
See “Applications summary reports” on page 1896.
■ DIM - High Risk Users - Last 30 Days
Displays a summary of DIM incidents associated with high-risk users in the last 30 days.
See “Applications summary reports” on page 1896.
■ DAR - Incidents - All
Displays a list of all Data-at-Rest (DAR) incidents.
See “Applications incident list” on page 1889.
■ DAR - Incidents - New
Displays a list of all DAR incidents with a status of New.
See “Applications incident list” on page 1889.
■ DAR - Application Summary
Displays a summary of DAR incidents by cloud application.
See “Applications summary reports” on page 1896.
■ DAR - Policy Summary
Displays a summary of DAR incidents by policy.
See “Applications summary reports” on page 1896.
■ DAR - Status by Application
Displays a summary of DAR incidents by status and cloud application.
See “Applications summary reports” on page 1896.
■ DAR - High Risk Users
Displays a summary of DAR incidents associated with high-risk users.
See “Applications summary reports” on page 1896.
Working with Application incidents 1889
Applications incident list
Note: If you have an existing Symantec Web Security Service (WSS) implementation using
the REST Cloud Detection Service, your WSS incidents appear in the Applications >
Data-in-Motion incident list. If you have a Symantec WSS implementation using the Cloud
Detection Service for WSS, your WSS incidents appear in the Network incident list.
Note: Use caution when you use Select All. This option selects all incidents in the report,
not only those on the current page. Any incident command you subsequently apply affects
all incidents.
■ Data Type
Specifies whether the incident is from Data-at-Rest (DAR) or Data-in-Motion (DIM).
■ Location/Application/Detection Date
The location of the sensitive data, the application with which the incident is associated,
and the date on which the policy violation was detected.
■ User
Displays the information of the user associated with the incident, if applicable.
■ ID/Policy
The Symantec Data Loss Prevention incident number and the policy the incident violated.
■ Matches
The number of matches in the incident.
■ Severity
Incident severity as determined by the severity setting of the rule the incident matched.
The possible values are:
High
Medium
Low
■ Status
The current incident status. The possible values are:
■ New
Working with Application incidents 1891
Applications incident actions
■ In Process
■ Escalated
■ False Positive
■ Configuration Errors
■ Resolved
Is Hidden Displays the hidden state of the incident, whether or not the incident is hideable,
and lets you toggle the Do Not Hide flag for the incident. See “About incident
hiding” on page 1958.
Working with Application incidents 1893
Applications incident snapshot
Recipient For data uploads, the recipient is the site to which the data is uploaded.
For data downloads, the recipient is the user who downloads the data.
Subject The subject field of the sensitive data. Click the subject link to view all incidents
with the same subject.
Data Owner The person responsible for remediating the incident. This field must be set
Name manually.
Click Data Owner Name to view a filtered list of incidents for that data owner.
Data Owner The email address of the person responsible for remediating the incident. This
Email field must be set manually.
Address
Click Data Owner Email Address to view a filtered list of incidents for that data
owner email address.
Request ID The unique detection request identifier from the Cloud Detection Service. You can
use this identifier to track this incident in external cloud consoles, such as Symantec
CloudSOC.
User Name The name of the user who is associated with the incident.
User Specifies the type of user activity on the file. The possible activities are:
Activity ■ Create
Type ■ Edit
■ Rename
■ Delete
■ Upload/Download
External The unique transaction identifier that is provided by the cloud application. You
Transaction can use this identifier to track this incident in external cloud consoles, such as
ID Symantec CloudSOC.
■ Site/Application Details
Specifies the following details about the website or cloud application that is associated
with the DAR or DIM incident:
Application The name of the cloud application associated with the incident.
Name
Working with Application incidents 1894
Applications incident snapshot
Site Risk The site risk score provided by Blue Coat WSS, based on information from the
Score Global Intelligence Network.
■ User Details
This section provides the following details about the user who is associated with the
DAR or DIM incident:
User Threat Specifies the user threat score as provided by Symantec CloudSOC or Blue
score Coat WSS.
Documents Specifies the number of exposed documents for that user. Click More Info to
Exposed view document exposure information in your external cloud console.
Count
User Activity Provides a link to user activity details in your external cloud console.
Document is Specifies if the document is shared with or accessible to all members of your
Internally organization.
Shared
Document Specifies the number of times the document has been accessed.
Activity Count
File Folder Specifies the folder that contains the file. Click More Info to go to exposures
panel for that file.
Last Modified Specifies the date and time the file was last modified.
File Activity Click More Info to view the file activity in your external cloud console.
Alert in CASB Click More Info to view incident information in your external cloud console.
Connector Specifies the network protocol of the data transfer, such as https.
Source
Protocol
HTTP Method Specifies the HTTP method that was called when the incident was created.
HTTP Cookies Lists any cookies that are associated with the incident.
■ Message Body
Provides a link to the original JSON-formatted message.
■ History
See “Incident snapshot history tab” on page 1936.
■ Notes
The notes tab displays any notes for this incident.
■ Correlations
See “Incident snapshot correlations tab” on page 1937.
■ Matches
See “Incident snapshot matches section” on page 1938.
See “About Applications incident reports” on page 1887.
■ Viewing dashboards
■ Viewing incidents
■ Filtering reports
Managing and reporting incidents 1898
■ Deleting incidents
on report portlets (the individual tiles that contain report data) to drill down to the detailed
versions of the reports.
Executive summaries are similar to dashboards. They include similar information layed out
in an intuitive and easy-to-read manner. You cannot customize an executive summary.
Executive summaries do not include report portlets.
Symantec Data Loss Prevention ships with executive summaries for Network, Endpoint,
and Discover incidents.
You can create and save customized versions of all reports (except executive summaries) for
continued use.
See “About custom reports and dashboards” on page 1912.
Symantec Data Loss Prevention displays reports in separate sections on the Incident > All
Reports screen as follows:
■ The Saved Reports section contains any shared reports that are associated with your
current role. This section appears only if you or other users in your current role have created
saved reports.
See “About custom reports and dashboards” on page 1912.
■ The Network section contains Symantec-provided incident lists, summaries, and dashboards
for network incidents.
■ The Endpoint section contains Symantec-provided incident lists, summaries, and
dashboards for endpoint incidents. Endpoint reports include the incidents that Endpoint
captures, such as Endpoint Block and Endpoint Notify incidents.
Incidents that Endpoint Discover captures appear in Discover reports.
■ The Discover section contains Symantec-provided incident lists, summaries, and
dashboards for Network Discover/Cloud Storage Discover and Endpoint Discover incidents.
■ The Applications section contains Symantec-provided incident lists and summaries for
cloud application incidents.
■ The Users section contains the user list and user risk summary, which displays users and
their associated Email and Endpoint incidents.
reduce risk, and communicates this information to policy authors and incident responders.
The executive often monitors reports through email or some other exported report format.
Symantec Data Loss Prevention dashboards and summary reports let you monitor risk
trends in your organization. These reports provide a high-level overview of incidents.
Executives and managers can quickly evaluate risk trends and advise policy authors and
incident responders how to address these trends. You can view existing summary reports
and dashboards and create customized versions of these reports.
See “About dashboard reports and executive summaries” on page 1903.
See “About summary reports” on page 1909.
■ An incident responder, such as an InfoSec Analyst or InfoSec Manager, who monitors and
responds to particular incidents.
The responder monitors incident reports and snapshots to respond to the incidents that
are associated with a particular policy group, organizational department, or geographic
location. The responder may also author policies to reduce risk. These policies can originate
either at the direction of a risk reduction manager or based on their own experience tracking
incidents.
See “About incident remediation” on page 1841.
Note: You can configure which reports appear in navigation panel. To do so, go to All Reports
and then click on Edit Preferences
Symantec Data Loss Prevention provides the following types of incident reports:
Incident lists These show individual incident records containing information such as severity,
associated policy, number of matches, and status. You can click on any incident
to view a snapshot containing more details. You can select specific incidents or
groups of incidents to modify or remediate.
Summaries These show incident totals organized by a specific incident attribute such as status
or associated policy. For example, a Policy Summary includes rows for all policies
that have associated incidents. Each row includes a policy name, the total number
of associated incidents, and incident totals by severity. You can click on any severity
total to view the list of relevant incidents.
Double summaries These show incident totals organized by two incident attributes. For example, a
policy trend summary shows the total incidents by policy and by week. Similar to
the policy summary, each entry includes a policy name, the total number of
associated incidents, and incident totals by severity. In addition, each entry includes
a separate line for each week, showing the week's incident totals and incidents by
severity.
Dashboards and These are quick-reference dashboards that combine information from several
executive reports. They include graphs and incident totals representing the contents of various
summaries incident lists, summaries, and double summaries. Graphs are sometimes beside
lists of high-severity incidents or lists of summary groups. You can click on
constituent report names to drill down to the reports that are represented on the
dashboard.
Symantec Data Loss Prevention ships with executive summaries for Network,
Endpoint, and Discover reports, and these are not customizable.
Custom Lists the shared reports that are associated with your current role. (Such reports
appear only if you or other users in your current role have created them.)
Endpoint Lists the Endpoint incident reports. Endpoint reports include incidents such as
Endpoint Block and Endpoint Notify incidents.
Discover Lists Network Discover/Cloud Storage Discover and Endpoint Discover incident
reports.
The folder risk report displays file share folders ranked by prioritized risk. The risk
score is based on the relevant information from the Symantec Data Loss Prevention
incidents plus the information from the VML Management Server.
See the Symantec Data Loss Prevention Data Insight Implementation Guide.
Users The User List lists the data users in your organization. The User Risk Summary
lists all users with their associated Email and Endpoint incidents.
Dashboards have two columns of report portlets (tiles that contain report data). Portlets in the
left column display a pie chart or graph and the totals bar. Portlets in the right column display
the same types of information as those in the left. However, they also display either a list of
the most significant incidents or a list of summary criteria and associated incidents. The incidents
are ranked using severity and match count. The summary criteria highlights any high-severity
incident totals. You can choose up to three reports to include in the left column and up to three
reports to include in the right column.
To create custom dashboards, click Incident Reports at the top of the navigation panel and,
in the Incident Reports screen that appears, click Create Dashboard. The Administrator can
create only private dashboards, but other users can decide whether to share a new dashboard
or keep it private.
See “About custom reports and dashboards” on page 1912.
To edit the contents of any custom dashboard, go to the desired dashboard and click Customize
near the top of the screen.
See “Configuring dashboard reports” on page 1907.
To display a custom dashboard at logon, specify it as the default logon report.
See “Setting report preferences” on page 1901.
Symantec Data Loss Prevention includes three executive summaries: Executive Summary
- Discover, Executive Summary - Endpoint, and Executive Summary - Network. Unlike
dashboards, executive summaries cannot be created or customized.
Executive summaries include the following reports:
Executive Summary - Discover
■ Policy Distribution across Targets: A pie chart that specifies the distribution of policies
across various Discover scan targets, including the percentage and number of incidents
generated per policy.
■ Top 5 Content Roots: A bar graph displaying the top five content roots that have generated
incidents, including the severity of the incidents generated for each content root.
■ Top 5 Target Summary: A bar graph displaying the top five incident-generating targets
from the last completed Discover scan, including the severity of the incidents generated
on each target.
■ Status by Target: A pie chart that specifies the status of various Discover scan targets,
including the percentage and number of incidents generated per policy.
Executive Summary - Endpoint
■ Policy Summary: A pie chart that specifies the number and percentage of incidents for
each Endpoint policy.
■ Top 5 Highest Offenders: A bar graph that displays the top five incident generating
endpoints, including the severity of the incidents associated with each endpoint.
Managing and reporting incidents 1905
Viewing dashboards
■ Top 5 Incident Type Summary: A bar graph that displays the top five incident types, such
as Clipboard or Local Drive.
■ User Justification Summary: A pie chart displaying the types of user justifications for
endpoint incidents, including the percentage for each justification.
■ Endpoint Location Summary: A pie chart displaying the connection status for
incident-generating endpoints.
■ Incident Status Summary: A pie chart displaying the status of all endpoint incidents, with
a percentage for each status category.
Executive Summary - Network
■ Policy Summary: A pie chart that specifies the number and percentage of incidents for
each Network policy.
■ Top 5 High Risk Senders: A bar graph that displays the top five high-risk senders, including
the severity of the incidents associated with each sender.
■ Top 5 Protocol Summary: A bar graph that displays the top five incident-generating
network protocols, including the severity of the incidents associated with each protocol.
■ Top 5 Recipient Domains: A bar graph that displays the top five incident-generating
recipient domains, including the severity of the incidents associated with each domain.
■ Status by Week: A bar graph displaying the incidents of the last 30 days, broken down by
week, and including the severity of the incidents generated.
■ Sender IP Summary: A pie chart displaying the incident-generating sender IP addresses,
including the number and percentage of incidents per sender IP.
Viewing dashboards
This procedure shows you how to view a dashboard.
To view a dashboard
1 In the Enforce Server administration console, on the Incidents menu, click Incident
Reports. Under Reports, click the name of a dashboard.
Dashboards consist of up to six portlets that each provide a summary of a particular report.
2 To see the entire report for a portlet, click the portlet.
Symantec Data Loss Prevention displays the appropriate incident list or summary report.
3 Browse through the incident list or summary report.
See “Viewing incidents” on page 1911.
See “About summary reports” on page 1909.
Managing and reporting incidents 1906
Creating dashboard reports
Note: Symantec Data Loss Prevention automatically designates all dashboards that the
administrator creates as private.
Click Next.
4 In the General section, for Name, type a name for the dashboard.
5 For Description, type an optional description for the dashboard.
Managing and reporting incidents 1907
Configuring dashboard reports
6 In the Delivery Schedule section, you can regenerate and send the dashboard report to
specified email accounts.
If SMTP is not set up on your Enforce Server, you do not see the Delivery Schedule
section.
If you have configured your system to send alerts and reports, you can set a time to
regenerate and send the dashboard report to specified email accounts.
See “Configuring the Enforce Server to send email alerts” on page 176.
If you have not configured Symantec Data Loss Prevention to send reports, skip to the
next step.
To set a schedule, locate the Delivery Schedule section and select an option from the
Schedule drop-down list. (You can alternatively select No Schedule.)
For example, select Send Weekly On.
Enter the data that is required for your Schedule choice. Required information includes
one or more email addresses (separated by commas). It may also include calendar date,
time of day, day of the week, day of the month, or last date to send.
See “Delivery schedule options for dashboard reports” on page 1919.
7 For the Left Column, you can choose what to display in a pie chart or graph. For the
Right Column, you can also display a table of the information.
See “Choosing reports to include in a dashboard” on page 1909.
Select a report from as many as three of the Left Column (Chart Only) drop-down lists.
Then select a report from as many as three of the Right Column (Chart and Table)
drop-down lists.
8 Click Save.
9 You can edit the dashboard later from the Edit Report Preferences screen.
To display a custom dashboard at logon, specify it as the default logon report on the Edit
Report Preferences screen.
See “Editing custom dashboards and reports” on page 1921.
Viewing incidents
Symantec Data Loss Prevention incident lists display the individual incident records with
information about the incidents. You can click on any incident to see a snapshot containing
more details. You can select specific incidents or groups of incidents to modify or remediate.
Symantec Data Loss Prevention provides incident lists for Network, Endpoint, and Discover
incidents.
To view incidents
1 In the Enforce Server administration console, on the Incidents menu, select one of the
types of reports.
For example, select Discover. In the left navigation panel, click Incidents-All Scans.
The incident list displays the individual incident records that contain information such as
severity, associated policy, number of matches, and status.
2 Optionally, use report filters to narrow down the incident list.
See “Filtering reports” on page 1914.
3 To view more details of a particular incident, click the incident.
The incident snapshot appears, displaying general incident information, matches detected
in the intercepted text, and details about policy, attributes, and incident history.
You can also search for similar incidents from the Correlations tab.
4 Optionally, click through the incident snapshot to view more information about the incident.
The following list describes the ways you can access more information through the
snapshot:
■ You can find information about the policy that detected the incident. On the Key Info
tab, the Policy Matches section displays the policy name. Click on the policy name
to see a list of incidents that are associated with that policy. Click view policy to see
a read-only version of the policy.
This section also lists other violated policies with the same file or message. When
multiple policies are listed, you can see the snapshot of an incident that is associated
with a particular policy. Click go to incident next to the policy name. To see a list of
all incidents that the file or message created, click show all.
Managing and reporting incidents 1912
About custom reports and dashboards
■ You can view lists of the incidents that share various attributes with the current incident.
The Correlations tab shows a list of correlations that match single attributes. Click
on attribute values to see the lists of incidents that are related to those values.
For example, the current network incident is triggered from a message from a particular
email account. You can bring up a list of all incidents that this account created.
■ For most network incidents, you can access any attachments that are associated with
the network message. To do so, locate the Attachments field in the Incident Details
section of the snapshot and click the attachment file name.
For a detailed description of incident snapshots and the actions you can perform through
them, see the online Help.
5 When you finish viewing incidents, you can exit the incident snapshot or incident list, or
you can choose one or more incidents to remediate.
See “Remediating incidents” on page 1844.
Create Dashboard Lets you create a custom dashboard that displays summary data from several
reports you specify. For users other than the Administrator, this option leads to the
Configure Dashboard screen, where you specify whether the dashboard is private
or shared. All Administrator dashboards are private.
Saved (custom) reports associated with your role appear near the top of the screen.
The following options are available for your current role's custom reports:
Click this icon next to a report to display the save report or configure dashboard
screen. You can change the name, description, or schedule, or (for dashboards
only) change the reports to include.
Click this icon next to a report to display the screen to change the scheduling of this
report. If this icon does not display, then this report is not currently scheduled.
Click this icon next to a report to delete that report. A dialog prompts you to confirm
the deletion. When you delete a report, you cannot retrieve it. Make sure that no
other role members need the report before you delete it.
Filtering reports
You can filter an incident list or summary report.
To filter an incident list
1 In the Enforce Server administration console, on the Incidents menu, select one of the
types of reports.
For example, select Network, and then click Policy Summary.
2 In the Filter area, current filters are displayed, as well as options for adding and running
other filters.
3 Modify the default filters as wanted. For example, from the Status filter drop-down lists,
select Equals and New.
For Network, and Endpoint reports, the default filters are Date and Status. For Discover
reports, default filters are Status, Scan, and Target ID.
4 To add a new filter, select filter options from the drop-down lists. Click Advanced Filters
& Summarization for additional options. Click Add Filter on the right, for additional filter
options.
Select the filter type and parameters from left to right as if writing a sentence. For example,
from the advanced filters, Add Filter options, select Policy and Is Any Of, and then select
one or more policies to view in the report. Hold down Ctrl or Shift to select more than one
item in the listbox.
5 Click Apply to update the report.
6 Save the report.
See “Saving custom incident reports” on page 1914.
The Sharing section lets you specify whether to keep the report private or share it with
other role members. Role members are other users who are assigned to the same role.
To share the report, select Share Report. All role members now have access to this
report, and all can edit or delete the report. If your account is deleted from the system,
shared reports remain in the system. Shared reports are associated with the role, not with
any specific user account. If you do not share a report, you are the only user who can
access it. If your account is deleted from the system, your private reports are deleted as
well. If you log on with a different role, the report is visible on the All Reports screen, but
not accessible to you.
4 Click Save.
Manual - Sent to specified e-mail addresses Enter the specific email addresses manually in
the text box.
Auto - Send to incident data owners To send the report to the data owners, the Send
report data with emails setting must be enabled
for this option to appear.
4 In the Change Incident Status / Attributes section, you can implement workflow.
The Auto - Send to incident data owners option must be set for this section to appear.
See “Configuring the Enforce Server to send email alerts” on page 176.
5 After sending the report, you can change an incident's status to any of the valid values.
Select a status value from the drop-down list.
6 You can also enter new values for any custom attributes.
These attributes must be already set up.
See “About incident status attributes” on page 1962.
7 Select one of the custom attributes from the drop-down list.
8 Click Add.
9 In the text box, enter the new value for this custom attribute.
After sending the report, the selected custom attributes set the new values for those
incidents that were sent in the report.
10 Click Next.
11 Enter the name and description of the saved report.
12 Click Save.
Note: If your Enforce Server is not configured to send email, or you are not allowed to send
reports, the Schedule Delivery section does not appear.
When you make a selection from the list, additional fields appear.
To remove scheduling of a report that was previously scheduled, click the Remove option.
The following table describes the additional fields available for each option on the list.
Managing and reporting incidents 1918
Delivery schedule options for incident and system reports
■ Send To
Specify Manual to specify the email addresses.
Specify Auto for automatic sending to data owners.
■ To
Enter one or more email addresses. Separate them with commas.
■ CC
Enter one or more email addresses. Separate them with commas.
■ Subject
Provide a subject for the email.
■ Body
Enter the body of the email. Use variables for items such as the policy name.
See “Response action variables” on page 1847.
One time Select One time to schedule the report to be run once at a future time, and then
specify the following details for that report:
■ Time
Select the time you want to generate the report.
■ Send Date
Enter the date you want to generate the report, or click the date widget and
select a date.
Daily Select Daily to schedule the report to be run every day, and then specify the following
details for that report:
■ Time
Select the time you want to generate the report.
■ Until
Enter the date you want to stop generating daily reports, click the date widget and
select a date, or select Indefinitely.
Weekly Select Weekly on to schedule the report to be run every week, and then specify
the following details for that report:
■ Time
Select the time you want to generate the report.
■ Days of Week
Click to check one or more check boxes to indicate the day(s) of the week you
want to generate the report.
■ Until
Enter the date you want to stop generating weekly reports, click the date widget
and select a date, or select Indefinitely.
Managing and reporting incidents 1919
Delivery schedule options for dashboard reports
Monthly Select Monthly on to schedule the report to be run every month, and then specify
the following details for that report:
■ Time
Select the time you want to generate the report.
■ Day of Month
Enter the date on which you want to generate the report each month.
■ Until
Enter the date you want to stop generating monthly reports, click the date widget
and select a date, or select Indefinitely.
Note: If your Enforce Server is not configured to send email, or you are not allowed to send
reports, the Delivery Schedule section does not appear.
When you make a selection from the Schedule drop-down list, additional fields appear.
The following table describes the additional fields available for each option on the list.
Once Select Once to schedule the report to be run once at a future time, and then specify
the following details for that report:
■ On
Enter the date you want to generate the report, or click the date widget and select
a date.
■ At
■ Send To
Send Every Day Select Send Every Day to schedule the report to be run every day, and then specify
the following details for that report:
■ At
Enter the date you want to stop generating daily reports, click the date widget and
select a date, or select Indefinitely.
■ Send To
Send Weekly On Select Send Weekly on to schedule the report to be run every week, and then
specify the following details for that report:
■ Day
Click to check one or more check boxes to indicate the day(s) of the week you want
to generate the report.
■ At
■ Until
Enter the date you want to stop generating weekly reports, click the date widget
and select a date, or select Indefinitely.
■ Send To
Send Monthly On Select Send Monthly on to schedule the report to be run every month, and then
specify the following details for that report:
Enter the date on which you want to generate the report each month.
■ At
■ Until
Enter the date you want to stop generating monthly reports, click the date widget
and select a date, or select Indefinitely.
■ Send To
To export a report
1 Click Incidents, and select a type of report.
2 Navigate to the report that you want to export. Filter or summarize the incidents in the
report, as desired.
See “Common incident report features” on page 1933.
3 Check the boxes on the left side of the incidents to select the incidents to export.
4 In the Export drop-down, select Export All: CSV or Export All: XML
Note: See the current version of the Incident Reporting and Update API Developers Guide
for the location of the XML schema files for exported reports and for a description of
individual XML elements.
5 Click Open or Save. If you selected Save, a Save As dialog box opens, and you can
specify the location and the file name.
See “Exported fields for Network Monitor” on page 1922.
See “Exported fields for Endpoint Discover” on page 1924.
See “Exported fields for Network Discover/Cloud Storage Discover” on page 1923.
See “Printing incident reports” on page 1936.
See “Sending incident reports by email” on page 1935.
Matches The number of times that this item matches the detection parameters of a policy rule.
Data Owner The person responsible for remediating the incident. This field must be set manually,
Name or with one of the lookup plug-ins.
Data Owner The email address of the person responsible for remediating the incident. This field
Email must be set manually, or with one of the lookup plug-ins.
Type Target type (for example file system, Lotus Notes, or SQL Database).
Seen Before Was this incident previously seen? The value is Yes or No.
Matches The number of times that this item matches the detection parameters of a policy rule.
Last Modified Date and time when the item was last modified.
Date
File Create Date and time when the item was created.
Date
Last Access Date and time when the item was last accessed (not shown for NFS targets).
Date
Data Owner The person responsible for remediating the incident. This field must be set manually,
Name or with one of the lookup plug-ins.
Data Owner The email address of the person responsible for remediating the incident. This field
Email must be set manually, or with one of the lookup plug-ins.
Matches The number of times that this item matches the detection parameters of a policy rule.
Data Owner The person responsible for remediating the incident. This field must be set manually,
Name or with one of the lookup plug-ins.
Data Owner The email address of the person responsible for remediating the incident. This field
Email must be set manually, or with one of the lookup plug-ins.
Deleting incidents
Incident reporting performance often deteriorates when the number of incidents in your system
exceeds one million (1,000,000). Symantec recommends keeping your incident count below
this threshold by deleting incidents to maintain good system performance.
Incident deletion is permanent: you can delete incidents, but you cannot recover the incidents
that you have deleted. Symantec Data Loss Prevention offers options for deleting only certain
parts of the data that triggered the incident.
After you have marked incidents for deletion, you can view, configure, run, and troubleshoot
the incident deletion process from the Enforce Server administration console.You can mark
incidents for deletion manually or automatically.
See “About automatically flagging incidents for deletion” on page 1929.
You can also delete hidden incidents.
See “Deleting hidden incidents” on page 1961.
To delete an incident
1 On the Incident Report screen, select the incident or incidents you want to delete, then
click Incident Actions > Delete Incidents.
2 On the Delete Incidents screen, select from the following deletion options:
Managing and reporting incidents 1926
Deleting incidents
Delete incident Permanently deletes the incident(s) and all associated data (for example,
completely any emails and attachments). Note that you cannot recover the incidents
that have been deleted.
Retain incident, but Retains the actual incident(s) but discards the Symantec Data Loss
delete message data Prevention copy of the data that triggered the incident(s). You have the
option of deleting only certain parts of the associated data. The rest of the
data is preserved.
Delete Original Deletes the message content (for example, the email message or HTML
Message post). This option applies only to Network incidents.
Delete This option refers to files (for Endpoint and Discover incidents) or email or
Attachments/Files posting attachments (for Network incidents). The options are:
■ All, which deletes all attachments. Choose this option to delete all files
(for Endpoint and Discover incidents) or email attachments (for Network
incidents). Attachments and files are added to the incident deletion
queue after their associated incidents have been deleted.
the error message and problem statement. This information may be useful to your Oracle
database administrator in troubleshooting the job failure. If this information is insufficient to
resolve your deletion job issues, you can export information from any job to a CSV file and
send it to Symantec Data Loss Prevention Support for additional help.
By default, the incident deletion job runs nightly at 11:59 P.M. in the Enforce Server's local
time zone. When the job runs, it also creates an event on the System > Servers and Detectors
> Events screen. This event is created whether or not any incidents are actually deleted.
3 Click Submit.
Note: The incident deletion job schedule is reset to the default value during the upgrade process.
If you are using a custom incident deletion job schedule, reconfigure the schedule after the
upgrade process is complete.
■ On Linux systems:
/opt/Symantec/DataLossPrevention/EnforceServer/15.5/Protect/config/manager.properties
com.vontu.incident.deletion.progress.refreshRate=120000
3 Save and close the manager.properties file, then restart the Symantec DLP Manager
service.
See “About Symantec Data Loss Prevention services” on page 101.
If a deletion job failed, a link will appear in the status column. Click the link to see the error
message and problem statement. This information may be useful to your Oracle database
administrator for troubleshooting a failed deletion job.
If you are having trouble troubleshooting incident deletion job issues, you can export detailed
deletion job information to send to Symantec Data Loss Prevention Support.
To view and export failed deletion job information
1 In the Deletion jobs history list, click the Failed link for the failed job you want to view.
The error message and problem statement that appear may be useful to your Oracle
database administrator for troubleshooting your incident deletion job issues. If you need
additional help, continue to step 2.
2 To export information for a failed deletion job, select the job in the Deletion jobs history
list, then click Export.
3 Save the ZIP file to send to Symantec Data Loss Prevention Support for analysis. The
data contained in the ZIP file is intended for use by Symantec Data Loss Prevention
Support only, and will not be helpful for your in-house troubleshooting efforts.
You must have Symantec Data Loss Prevention administrator privileges to configure automatic
incident deletion flagging.
5 Click Save.
■ Job ID: The identifier for the incident deletion flagging job.
■ Job started: The start time for the incident deletion flagging job.
■ Report Name: the name of the custom report used to flag incidents for deletion.
■ #Incidents Flagged: The number of incidents flagged for deletion by that job.
■ Status: The status of the incident deletion flagging job.
You can delete incident deletion flagging jobs by selecting one or more jobs using the
checkboxes, then clicking Delete. Note that there is no confirmation for incident deletion
flagging job deletion, though deleted jobs are displayed in the Tomcat logs.
Tomcat logs include the following information (line breaks added for legibility):
Be aware that incident deletion flagging jobs can fail due to insufficient space for undo/redo
actions in the Symantec Data Loss Prevention database. For detailed information about
managing the database, see the Symantec Data Loss Prevention System Maintenance Guide.
Use the Show All link on an Incident List with caution when the system contains
more than 500 incidents. Browser performance degrades drastically if more than
500 incidents are displayed on the Incident List page.
Select All Selects all incidents on all pages, so you can update them all at once. (Available
only on Incident Lists.) Click Unselect All to cancel.
Note: Use caution when you choose Select All. This option selects all the incidents
in the report (not only those on the current page). Any incident command that you
subsequently apply affects all the incidents.
To select only the incidents on the current page, select the checkbox at top left of
the incident list.
Status Select Equals, Is Any Of, or Is None Of. Then select status values.
Hold down Ctrl and click to select more than one separate status
value. Hold down Shift and click to select a range.
Date Use the drop-down menu to select a date range, such as Last Week
or Last Month. The default is All Dates.
Network and Endpoint reports
Scan For Discover reports, select the scan to report. You can select the
most recent scan, the initial scan, or a scan in progress. All Scans
Discover reports
is the default.
Target ID For Discover reports, select the name of the target to report. All
Targets is the default.
Click the Advanced Filters & Summarization bar to expand the section with filter and summary
options.
Click Add Filter to add an advanced filter.
Select a primary and optional secondary option for summarization. A single-summary report
is organized with a single summary criterion, such as the policy that is associated with each
incident. A double-summary report is organized with two criteria, such as policy and incident
status.
Note: If you select a condition in which you enter the content to be matched in the text field,
your entire entry must match exactly. For example, if you enter "apples and oranges", that
exact text must appear in the specified component for it to be considered a match. The sentence
"Bring me the apples and the oranges" is not considered a match.
For a complete list of the report filter and summary options, see the Symantec Data Loss
Prevention Administration Guide.
See “Common incident report features” on page 1933.
Note: This section appears only if a system administrator has configured custom attributes.
Loss Prevention. Administrators set the permissions for each file using other types of programs
on the endpoint. Permissions are generally set at the time that the file is created.
For example, User 1 has permission to access the file Example1.doc. User 1 can view and
edit the file. User 2 also has access to the file Example1.doc. However, User 2 can only view
the file. User 2 does not have permission to make changes to the file. In the ACL, both User
1 and User 2 are listed with the permissions that have been granted to them.
Table 56-1 shows the combinations.
Name Permission
The ACL contains a new line for each permission granted. The ACL only contains one line for
User 2 because User 2 only has one permission, to read the file. User 2 cannot make any
changes to the file. User 1 has two entries because User 1 has two permissions: reading the
file and editing it.
You can view ACL information only on Discover and Endpoint local drive incident snapshots.
You cannot view ACL information on any other type of incidents.
The Access Information section appears on the Key Info tab of the incident snapshot.
See “Discover incident snapshot” on page 1882.
See “Endpoint incident snapshot” on page 1866.
See “Network incident snapshot” on page 1857.
General filters
Advanced filters
Summary options
General filters The general filter options are the See “General filters for reports”
most commonly used. They are on page 1941.
always visible in the incident list
report.
Managing and reporting incidents 1941
General filters for reports
Advanced filters The advanced filters provide many See “Advanced filter options for
additional filter options. You must reports” on page 1949.
click the Advanced Filters &
Summarization bar, and then
click Add Filter to view these filter
options.
Summary options The summary options provide See “Summary options for
ways to summarize the incidents incident reports” on page 1944.
in the list. You must click the
Advanced Filters &
Summarization bar to view these
summary options.
Symantec Data Loss Prevention contains many standard reports. You can also create custom
reports or save report summary and filter options for reuse.
See “About Symantec Data Loss Prevention reports” on page 1899.
Name Description
Equals The status is equal to the field that is selected in the next drop-down.
Is Any Of The status can be any of the fields that are selected in the next drop-down.
Shift-click to select multiple fields.
Is None Of The status is none of the fields that are selected in the next drop-down.
Shift-click to select multiple fields.
These date filters are available for Network, and Endpoint incidents.
Name Description
Current Month to Date All of the incidents that were reported for the current month up to today's
date.
Current Quarter to Date All of the incidents that were reported for the current quarter up to today's
date.
Current Week to Date All of the incidents that were reported for the current week.
Current Year to Date All of the incidents that have been reported for the current year up to today's
date.
Custom A custom time frame. Select the dates that you want to view from the
calendar menu.
Last 7 Days All of the incidents that were reported in the previous seven days.
Last 30 Days All of the incidents that were reported in the previous 30 days.
Last Month All of the incidents that were reported during the previous calendar month.
Last Week All of the incidents that were reported during the previous calendar week.
Last Quarter All of the incidents that were reported during the previous quarter.
Last Year All of the incidents that were reported during the last calendar year.
Table 56-4 lists the general filter options by severity. Check the box to select the severities to
include in the filter.
These severity filters are available for Network, Endpoint, and Discover incidents.
Name Description
High Lists only the high-severity incidents. Displays how many high-severity
incidents are in the incident list.
Managing and reporting incidents 1943
General filters for reports
Name Description
Info Lists only the incidents that are informational only. Informational incidents
are not assigned any other severity. Displays how many informational
incidents are in the incident list.
Low Lists only the low-severity incidents. Displays how many low-severity
incidents are in the incident list.
Table 56-5 lists the general filter options for Network Discover scans. This filter is only available
for Discover incidents.
Name Description
All Scans All of the incidents that have been reported in all of the scans that have
been run.
Initial Scan All of the incidents that were reported in the initial scan.
In Process All of the incidents that have been reported in the scans that are currently
in progress.
Last Completed Scan All of the incidents that were reported in the last complete scan.
You can filter Discover incidents by Target ID. This filter is only available for Discover incidents.
Select the target, or select All Targets. Shift-click to select multiple fields.
Table 56-6 lists the general filter options by detection date for Discover incidents.
Name Description
Current Month to Date All of the incidents that were reported for the current month up to today's
date.
Current Quarter to Date All of the incidents that were reported for the current quarter up to today's
date.
Current Week to Date All of the incidents that were reported for the current week.
Managing and reporting incidents 1944
Summary options for incident reports
Name Description
Current Year to Date All of the incidents that have been reported for the current year up to today's
date.
Custom A custom time frame. Select the dates that you want to view from the
calendar menu.
Custom Since The Symantec DLP Agents that have connected to the Endpoint Server
from a specific date to the present date. Select the date where you want
the filter to begin.
Custom Before The Symantec DLP Agents that have connected to an Endpoint Server
before a specific date. Select the final date for the filter.
Last 7 Days All of the incidents that were reported in the previous seven days.
Last 30 Days All of the incidents that were reported in the previous 30 days.
Last Month All of the incidents that were reported during the previous calendar month.
Last Week All of the incidents that were reported during the previous calendar week.
Last Quarter All of the incidents that were reported during the previous quarter.
Last Year All of the incidents that were reported during the last calendar year.
Note: Hidden incidents are not included in report summaries unless the Advanced filter option
for the Is Hidden filter is set to Show All.
See “About incident hiding” on page 1958.
Data Owner Email Address The email address of the person Network
responsible for remediating the incident.
Endpoint
This field must be set manually, or with
a lookup plug-in. Discover
Discover
Discover
Discover
Endpoint
Discover
Discover
Years Since First Detected Summarize the incident by how many Discover
years have passed since the incident
was first detected.
Agent Configuration Status Summarize the agent by the status of the Endpoint
configuration entity.
■ Current Configuration
The configuration on the agent is the same
as the configuration on the Endpoint Server.
■ Outdated Configuration
The configuration on the agent is different
than the configuration on the Endpoint
Server.
■ Unknown/deleted Configuration
The agents either cannot report which
configuration is installed, or the configuration
on the agent has been deleted from the
Endpoint Server.
Agent Response Filter incidents by how the agent has responded Endpoint
to the incident.
Application Window Title Filter the incidents by a string in the title of the Endpoint
window where the incident was generated.
Attachment File Name Filter incidents by the file name of the Network
attachment that is associated with the incident.
Attachment File Size Filter incidents by the size of the attachment that Network
is associated with the incident.
Box: Collaborator Role Filter incidents by the role of the Box Discover
collaborator. Roles include:
■ Co-owner
■ Editor
■ Previewer
■ Previewer Uploader
■ Uploader
■ Viewer
■ Viewer Uploader
Managing and reporting incidents 1951
Advanced filter options for reports
Box: Shared Link Download Allowed Filter incidents by the presence or absence of Discover
a shared link that allows downloads.
Box: Shared Link Expiration Date Filter incidents by the expiration date setting of Discover
a shared link.
Box: Shared Link Password Protected Filter incidents by the presence or absence of Discover
a password-protected shared link.
Content Root Filter the incidents by the content root path. Discover
Data Owner Email Address The email address of the person responsible for Network
remediating the incident. This field must be set
Endpoint
manually, or with a lookup plug-in.
Discover
Data Owner Name The person responsible for remediating the Network
incident. This field must be set manually, or with
Endpoint
a lookup plug-in.
Discover
Reports can automatically be sent to the data
owner for remediation.
Detection Date Filter the incidents by the date that the incident Discover
was detected.
Document Name Filter the incidents by the name of the violating Discover
document.
File Last Modified Date Filter the incidents by the last date when the file Endpoint
was modified.
Discover
File Location Filter the incidents by the location of the violating Endpoint
file.
File Name Filter the incidents by the name of the violating Endpoint
file. No wildcards, but you can specify a partial
Discover
match, for example .pdf.
File Owner Filter the incidents by the owner of the violating Discover
files.
File Size Filter the incidents by the size of the violating Endpoint
file.
Discover
Incident History Issuer Filter the incidents by the user responsible for Network
issuing the history of the incident.
Endpoint
Discover
Endpoint
Discover
Incident Match Count Filter the incidents by the number of incident Network
matches.
Endpoint
Discover
Discover
Incident Reported On Filter the incidents by the date that the incident Endpoint
was reported.
Managing and reporting incidents 1953
Advanced filter options for reports
Investigating State Filter the agents by the investigation state. You Discover
can select one of the following:
Endpoint
■ Investigating
■ Not Investigating
Is Hiding Allowed Filters the incidents based on the state of the Is Network
Hiding Allowed flag. Select the Is Any Of
Endpoint
operator from the second field, then select either
the Allow Hiding or Do Not Hide option from Discover
the third field.
Last Connection Time Filter agents according to the last time each Endpoint
agent connected to the Endpoint Server.
Network Prevent Action Filter the incidents by the action from Network Network
Prevent.
Policy Filter the incidents by the policy from which they Network
were created.
Endpoint
Discover
Managing and reporting incidents 1954
Advanced filter options for reports
Policy Group Filter the incidents by the policy group to which Network
they belong.
Endpoint
Discover
Policy Rule Filter the incidents by the policy rule that Network
generated the incidents.
Endpoint
Discover
Protect Status Filter the incidents by the Network Protect status Discover
of the incidents.
Protocol or Endpoint Destination Filter the incidents by the protocol or the Endpoint
endpoint destination that generated the incident.
Read ACL: File Filter the incidents by the File access control Endpoint
list.
Discover
Read ACL: Share Filter the incidents by the Share access control Discover
list.
Discover
Remediation Detection Status Filter the incidents by their remediation detection Discover
status.
Scanned Machine Filter the incidents by the computers that have Discover
been scanned.
Seen Before Filter the incidents on whether an earlier Discover, but not
connected incident exists. for SQL Database
incidents (where
Seen Before is
always false)
Managing and reporting incidents 1955
Advanced filter options for reports
Endpoint
Discover
Server or Detector Filter the incidents by the server on which they Network
were created.
Endpoint
Discover
SharePoint ACL: Permission Level Filter the incidents on the permission level of Discover
the SharePoint access control list.
SharePoint ACL: User/Group Filter the incidents on the user or group in the Discover
SharePoint access control list.
Target Type Filter the incidents by the type of target that is Discover
associated with the incidents.
Time Since First Detected Filter the incidents by how much time has Discover, but not
passed since the incident was first detected. for SQL Database
incidents
User Justification Filter the incidents by the justification that was Endpoint
input by the user.
User Name Filter the incidents by the user who generated Endpoint
the incident.
The second field in the advanced filters lets you select the match type in the filter.
Managing and reporting incidents 1956
Advanced filter options for reports
Name Description
Contains Any Of Lets you modify the filter to include any words in the text string, or lets
you choose from a list in the third field.
Contains Ignore Case Lets you modify the filter to ignore a specific text string.
Does Not Contain Ignore Lets you modify the filter to filter out the ignored text string.
Case
Does Not Match Exactly Lets you modify the filter to match on any combination of the text string.
Ends with Ignore Case Lets you modify the filter so that only the incidents that end with the ignored
text string appear.
Is Any Of Lets you modify the filter so that the results include any of the text string,
or lets you choose from a list in the third field.
Is Between Lets you modify the filter so that the numerical results are between a range
of specified numbers.
Is Greater Than Lets you modify the filter so that the numerical results are greater than a
specified number.
Is Less Than Lets you modify the filter so that the numerical results are less than a
specified number.
Is None Of Lets you modify the filter so that the results do not include any of the text
string, or lets you choose from a list in the third field.
Is Unassigned Lets you modify the filter to match incidents for which the value specified
in the first field are unassigned.
Matches Exactly Lets you modify the filter to match exactly the text string.
Matches Exactly Ignore Lets you modify the filter so that the filter must match the ignored text
Case string exactly.
Starts with Ignore Case Lets you modify the filter so that only the incidents that start with the
ignored text string appear.
The third field in the advanced filters lets you select from a list of items, or provides an empty
box to enter a string.
This third field varies depending on the selections in the first and second fields.
For a list of items, use Shift-click to select multiple items.
For strings, wildcards are not allowed, but you can enter a partial string.
Managing and reporting incidents 1957
Advanced filter options for reports
For example, you can enter .pdf to select any PDF file.
If you do not know what text to enter, use the summary options to view the list of possible text
values. You can also see a summary of how many incidents are in each category.
See “Summary options for incident reports” on page 1944.
Table 56-10 lists some of the options in the third field.
Name Description
Blocked The user was blocked from performing the action that cause the incident.
Action Encrypted A managed user tried to copy or move a sensitive file using a supported
channel and the file was automatically encrypted.
Action Encrypted Blocked A user action was blocked and a file was not encrypted either because
an unmanaged user attempted to copy or move it using a supported
channel, or because a managed user attempted to copy or move the file
using an unsupported channel.
None No action was taken regarding the violation that caused the incident.
Protect File Copied The file in violation was copied to another location.
Protect File Quarantined The file in violation was quarantined to another location.
User Notified The user was notified that a violation had occurred.
Chapter 57
Hiding incidents
This chapter includes the following topics:
■ Hiding incidents
The hidden state of an incident displays in the incident snapshot screen in the Enforce Server
administration console. The History tab of the incident snapshot includes an entry for each
time the Do Not Hide or Allow Hiding flags are set for the incident.
See “Filtering reports” on page 1914.
Access to hiding functionality is controlled by roles. You can set the following user privileges
on a role to control access:
■ Hide Incidents—Grants permission for a user to hide incidents.
■ Unhide Incidents—Grants permission for a user to show hidden incidents.
■ Remediate Incidents—Grants permission for a user to set the Do Not Hide or Allow
Hiding flags.
See “About role-based access control” on page 109.
See “Hiding incidents ” on page 1959.
See “Unhiding hidden incidents” on page 1959.
See “Preventing incidents from being hidden” on page 1960.
Hiding incidents
To hide incidents
1 Open the Enforce Server administration console and navigate to an incident report.
2 Select the incidents you want to hide, either by selecting the incidents manually or by
setting filters or advanced filters to return the set of incidents that you want to hide.
3 Click the Incident Actions button and select Hide/Unhide > Hide Incidents.
The selected incidents are hidden.
Note: You can allow incidents to be hidden that you have prevented from being hidden
by selecting the incidents and then selecting Hide/Unhide > Allow Hiding from the
Incident Actions button.
Note: You can allow an incident to be hidden that you have prevented from being hidden
by opening the incident snapshot and then clicking Allow Hiding in the Incident Details
section.
Hiding incidents 1961
Deleting hidden incidents
Delete incident Permanently deletes the incident(s) and all associated data (for example,
completely any emails and attachments). Note that you cannot recover the incidents
that have been deleted.
Retain incident, but Retains the actual incident(s) but discards the Symantec Data Loss
delete message data Prevention copy of the data that triggered the incident(s). You have the
option of deleting only certain parts of the associated data. The rest of the
data is preserved.
Delete Original Deletes the message content (for example, the email message or HTML
Message post). This option applies only to Network incidents.
Delete This option refers to files (for Endpoint and Discover incidents) or email or
Attachments/Files posting attachments (for Network incidents). The options are All, which
deletes all attachments, and attachments with no violations. For example,
choose this option to delete files (for Endpoint and Discover incidents) or
email attachments (for Network incidents).
This option deletes only those attachments in which Symantec Data Loss
Prevention found no matches. For example, choose this option when you
have incidents with individual files taken from a compressed file (Endpoint
and Discover incidents) or several email attachments (Network incidents).
The Status Values section lists the current incident status attributes that can be assigned
to a given incident. Use this section to create new status attributes, modify them, and
change the order that each attribute appears in drop-down menus.
See “Configuring status attributes and values” on page 1964.
■ Status Groups
The Status Groups section lists the current incident status groups and their composition.
Use this section to create new status groups, modify them, and change the group order
they appear in drop-down menus.
See “Configuring status groups” on page 1965.
■ Custom Attributes on the Custom Attributes tab
The Custom Attributes tab provides a list of all of the currently defined custom incident
attributes. Custom attributes provide information about the incident or associated with the
incident. For example, the email address of the person who caused the incident, that
person's manager, why the incident was dismissed, and so on. Use this tab to add, configure,
delete, and order custom incident attributes.
See “About custom attributes” on page 1968.
The process for handling incidents goes through several stages from discovery to resolution.
Each stage is identified by a different status attribute such as "New," "Investigation," "Escalated,"
and "Resolved." This lets you track the progress of the incident through the workflow, and filter
lists and reports by incident status.
The solution pack you installed when you installed Symantec Data Loss Prevention provides
an initial default set of status attributes and status attribute groups. You can create new status
attributes, or modify existing ones. The status attribute values and status groups you use
should be based on the workflow your organization uses to process incidents. For example,
you might assign all new incidents a status of "New." Later, you might change the status to
"Assigned," "Investigation," or "Escalated." Eventually, most incidents will be marked as
"Resolved" or as "Dismissed."
For list and report filtering, you can also create status groups.
Based on the preferences of your organization and the commonly used terminology in your
industry, you can:
■ Customize the names of the status attributes and add new status attributes.
■ Customize the names of the status groups and add new status groups.
■ Set the order in which status attributes appear on the Status drop-down list of an incident.
■ Specify the default status attribute that is automatically assigned to new incidents.
See “Configuring status attributes and values” on page 1964.
See “About incident reports” on page 1902.
See “About incident remediation” on page 1841.
Working with incident data 1964
Configuring status attributes and values
Action Procedure
Delete an incident status attribute. Click the attribute's red X and then confirm your decision.
Change an incident status attribute. Click on the attribute you want to change, enter a new name,
and click Save.
Make an incident status attribute the Click [set as default] for an attribute to make it the default
default. status for all new incidents.
Change an incident status attribute's ■ Click [up] to move an attribute up in the order.
order in drop-down menus. ■ Click [down] to move an attribute down in the order.
Action Procedure
Create a new incident status group. Click the Add Status Group button.
Delete an incident status group. Click the group's red X and then confirm your decision.
Change the name or incident status Click on the group you want to change.Click the pencil icon.
attributes of a group. Change the name, check or uncheck attributes, and click Save.
Change a status group's order in ■ Click [up] to move a group up in the order.
drop-down menus. ■ Click [down] to move a group down in the order.
Field Description
Archive Name Specify a name for the archive you are creating
using normal Windows naming conventions.
Working with incident data 1967
Export web archive—All Recent Events
Field Description
Report to Export From the drop-down list, select the report that you
want to archive. Any reports you created are
available along with default report options.
The Network options are as follows:
After you complete the fields, click Create to compile the archive.
See “Export web archive” on page 1966.
Action Procedure
Action Procedure
Delete a custom attribute. Click the attribute's red "X" and then confirm your decision.
Change the name, email status, or Click on the attribute you want to change, change its
attribute group of an attribute. parameters, and Click Save.
Change the attributes order in 1 Click [up] to move an attribute up in the order.
drop-down menus.
2 Click [down] to move an attribute down in the order.
Reload Lookup Plugins Click Reload Lookup Plug-ins to reload any custom attribute
plug-ins that have been unloaded by the system.
Note: If the new lookup returns null or empty values for any custom attribute fields, those empty
values overwrite the existing values.
3 Type a name for the custom attribute in the Name box. If appropriate, check the Is Email
Address box.
The name you give to a custom attribute does not matter. But a custom attribute you
create must be structured the same as the corresponding external data source. For
example, suppose an external source stores department information as separate
geographic location and department name. In this case, you must create corresponding
location and department name custom attributes. You cannot create a single department
ID custom attribute combining both the location and the department name.
4 Select an attribute group from the Attribute Group drop-down list. If necessary, create
a new attribute group. Select Create New Attribute Group from the drop-down list, and
type the new group name in the text box that appears.
5 Click Save.
See “Configuring custom attributes” on page 1970.
See “About incident status attributes” on page 1962.
See “Configuring status groups” on page 1965.
See “Configuring status attributes and values” on page 1964.
Note: To auto-populate custom attribute values, use one or more lookup plugins. See “About
lookup plug-ins” on page 1986.
1 Create custom user attributes You can create custom attributes for filtering and working with user
risk summary reports. For example, you can create an attribute named
Employment Status to track the employment status of each of your
users. You can then import that information in a file that is exported
from your enterprise resource planning system, such as SAP.
2 Import user data You can import user data from an Active Directory connection or from
a CSV file. Incidents are associated with specific users by email
address and logon credentials. You can also upload files with your
custom attributes, such as information from your enterprise resource
planning system. Symantec Data Loss Prevention provides a CSV
template file that you can use to format any data you want to upload.
3 Configure IP address to user name Symantec Data Loss Prevention can resolve user names from IPv4
resolution addresses in HTTP/S and FTP incidents. The domain controller agent
queries Windows Events in the Microsoft Active Directory Security
Event Log of the domain controller. Symantec Data Loss Prevention
associates these Windows Events with user data in your database.
3 View the User List The User List is a list of all users in your system, including their email
address, domain, and logon name.
You can view details for specific users in the user snapshot.
4 View the User Risk Summary The User Risk Summary displays your users and their associated
Endpoint and Network incidents. Use the User Risk Summary to
drill into your user-centric incident data to help you find the
highest-risk users. You can sort and filter this list by policies, custom
attributes, incident status, incident severity, user name identified by
IP address, number of incidents, date, incident type, and user name.
5 Export user risk summary or user You can export data from the user risk summary and user snapshots
snapshot data. to a CSV file.
Using the information that is provided in the user risk summary, you can see who the high-risk
users are and determine the appropriate course of action to take. Such actions might include:
■ Determining whether or not a user poses an active threat to your data security.
■ Applying additional policies to monitor a user's behavior more closely.
■ Applying additional response rules to block actions or send alerts.
Working with user risk 1975
About user data sources
4 Click Submit.
(&
(objectClass=user)
(objectCategory=person)
(sAMAccountType=805306368)
(!
(|
(&
(sAMAccountType=805306368)
(sAMAccountName=-*)
)
(&
(sAMAccountType=805306368)
(sAMAccountName=_*)
)
)
)
)
Your Active Directory credentials must have permission to access the following user attributes:
FIRST_NAME givenName
Working with user risk 1979
About user data sources
LAST_NAME sn
EMAIL mail
LOGIN_NAME sAMAccountName
TELEPHONE telephoneNumber
TITLE title
COUNTRY co
DEPARTMENT department
EMPLOYEE_ID employeeId
STREET_ADDRESS streetAddress
LOCALITY_NAME l
POSTAL_CODE postalCode
STATE_OR_PROVINCE st
OBJECT_DISINGUISHED_NAME distinguishedName
Your Active Directory credentials must also have permission to access the RootDSE record.
Symantec Data Loss Prevention reads these attributes from RootDSE:
namingContexts
defaultNamingContext
rootDomainNamingContext
configurationNamingContext
schemaNamingContext
isGlobalCatalogReady
highestCommittedUSN
(&(region=North America)(!systemAccount=true))
4 Click Submit.
Note: A best practice is that you should refer to directory connection objects with baseDNs in
the user section of your directory tree. For example: ou=Users,dc=corp,dc=company,dc=com.
4 Click Submit.
To import a data source manually
1 In the Enforce Server administration console, go to System > Users > Data Sources.
2 On the Data Source Management page, select the data source you want to import.
3 Click Import.
Working with user risk 1981
About identifying users in web incidents
User identification requires an Enforce Server, Network Prevent for Web, domain controller
servers, and an Active Directory domain controller. See the section "Installing the domain
controller Agent" in the Symantec Data Loss Prevention Installation Guide for complete
instructions on installing the domain controller Agent. It is available at the Symantec Support
Center at http://www.symantec.com/doc/DOC9257. After you install all of the required
components, you can enable User Identification by configuring a mapping schedule on the
User Identification page.
Note: Symantec Data Loss Prevention supports the use of multiple domain controllers.
3 To filter the list, select your filter values using the options above the user risk summary
list:
Attributes None (0) Enter up to two custom attributes to filter the list. Select the
attribute from the drop-down list, then specify an include
or exclude condition and enter your desired values. To add
a second attribute filter, click Add Attribute Filter.
Include All You can filter the list by incident severity. You must select
at least one severity level.
Type Description
CSV The CSV Lookup Plug-in lets you retrieve incident data from a comma-separated values (CSV)
file uploaded to the Enforce Server. You can configure one CSV Lookup Plug-in per Enforce Server
instance.
LDAP The LDAP Lookup Plug-in lets you retrieve incident data from a directory server, such as Microsoft
Active Directory, Oracle Directory Server, or IBM Tivoli. You can configure multiple instances of
the LDAP Lookup Plug-in.
Script The Script Lookup Plug-in lets you write a script to retrieve incident data from any external resource.
For example, you can use a Script Lookup Plug-in to retrieve incident data from external resources
such as proxy log files or DNS systems. You can configure multiple instances of the Script Lookup
Plug-in.
Data Insight The Data Insight Lookup Plug-in lets you retrieve incident data from Symantec Data Insight so
that you can locate and manage data at risk. You can configure one Data Insight Lookup Plug-in
per Enforce Server instance.
Custom (Legacy) The Custom (Legacy) Lookup Plug-in lets you use Java code to retrieve incident data from any
external resource.
Unlike the CSV or LDAP Lookup Plug-ins, the Script Lookup Plug-In does not use in-line
attribute maps to specify how to look up parameter keys. Instead, you write this functionality
into each script as needed.
To implement a Script Lookup Plug-In , you can use any scripting language that reads standard
input (stdin) and writes standard output (stdout). The examples in the user interface and in
this documentation use Python version 2.6.
See “Configuring advanced plug-in properties” on page 2005.
Note: Custom (Legacy) Lookup Plug-Ins should only be used for migrating legacy lookup
plug-ins implemented using the Java Lookup API. Support for new Custom Java Lookup
Plug-Ins are not supported.
If you are upgrading to version 12.0 or later, existing lookup plug-ins are automatically upgraded
to the new framework and added to the user interface for configuration and deployment. In
addition, the plug-in state will be preserved after the upgrade, that is, if a plug-in was enabled
before the upgrade it should be turned on in the user interface after the upgrade.
If the upgrade of a lookup plug-in does not succeed, the system displays the following error
message:
In this case, check the plug-in at the System > Lookup Plugins screen and manually configure
it following the instructions provided with this documentation. Refer to the Symantec Data Loss
Prevention Release Notes for known issues related to the upgrade of lookup plug-ins.
Step Description
1 Decide what external data you want to extract and load into incidents as custom attributes.
2 Identify the sources from which custom attribute data is to be obtained and the appropriate
lookup plug-in for retrieving this information.
3 Create a custom attribute for each individual piece of external data that you want to include in
incident snapshots and reports.
4 Determine which lookup parameter groups include the specific lookup parameters you need
to extract the relevant data from the external sources.
Step Description
5 Configure the plug-in to extract data from the external data source and populate the custom
attributes.
8 Verify privileges. The end user must have Lookup Attribute privileges to use a lookup plug-in
to look up attribute values.
9 Generate an incident. The incident must be of the type that exposes one or more incident
attributes that you have designated as parameter keys.
10 View the incident details. For the incident you generated, go to the Incident Snapshot screen.
In the Attributes section, you should see the custom attributes you created. Note that they are
unpopulated (have no value). If you do not see the custom attributes, verify the privileges and
that the custom attributes were created.
11 If the lookup plug-in is properly implemented, you see the Lookup button available in the
Attributes section of the Incident Snapshot. Once you click Lookup you see that the value
for each custom attribute is populated. After the initial lookup, the connection is maintained and
subsequent incidents will have their custom attributes automatically populated by that lookup
plug-in; the remediator does not need to click Lookup for subsequent incidents. If necessary
you can reload the plug-ins.
Action Description
Modify Plugin Chain Select this option to enable (deploy) plug-ins and to set the order of lookup for multiple
plug-ins.
Lookup Parameters Select this option to choose which lookup parameter groups to use as keys to
populate attribute fields from external data sources.
Reload Plugins Select this option to refresh the system after making changes to enabled plug-ins
or if the external data is updated. This action automatically performs the enabled
lookups in order and populates the incidents as they are created.
See “Reloading lookup plug-ins” on page 2002.
For each configured lookup plug-in, the system displays the following information at the Lookup
Plugins List Page. You use this information to manage lookup plug-ins.
Execution Sequence This field displays the order in which the system executes lookup plug-ins.
Name This field displays the user-defined name of each lookup plug-in.
Type The field displays the type of lookup plug-in. You can configure one CSV and one
Data Insight Lookup Plug-in per Enforce Server instance. You can configure multiple
instances of the LDAP, Script, and Custom (Legacy) lookup plug-ins.
Description This field displays the user-defined description of each lookup plug-in.
Status The field displays the state of each lookup plug-in, either On (green) or Off (red).
To edit the state of a plug-in, click Modify Plugin Chain.
For each configured lookup plug-in, you can perform the following management functions at
the Lookup Plugins List Page.
Action Description
Edit Click the pencil icon in the Actions column to edit the plug-in.
Delete Click the X icon in the Actions column to delete the plug-in. You must confirm or
cancel the action to execute it.
Group Group the plug-ins according to the selected display column. For example, where
you have multiple plug-ins, it may be useful to group them by Type or by Status.
3 Select the type of lookup plug-in you want to create and configure it.
CSV
LDAP
Script
Data Insight
Custom (Legacy)
attachment-nameX Name of the attached file, where X is the unique index to distinguish between
multiple attachments, for example: attachment-name1, attachment-size1;
attachment-name2, attachment-size2; etc.
attachment-sizeX Original size of the attached file, where X is the unique index to distinguish
between multiple attachments. See above example.
date-detected Date and time when the incident was detected, for example:
date-detected=Tue May 15 15:08:23 PDT 2012.
Implementing lookup plug-ins 1998
Implementing and testing lookup plug-ins
incident-id The incident ID assigned by Enforce Server. The same ID can be seen in the
incident report. For example: incident-id=35.
protocol The name of the network protocol that was used to transfer the violating message,
such as SMTP and HTTP. For example: protocol=Email/SMTP.
data-owner-name The person responsible for remediating the incident. This attribute is not populated
by the system. Instead, it is set manually in the Incident Details section of the
Incident Snapshot screen, or automatically using a lookup plug-in.
Reports based on this attribute can automatically be sent to the data owner for
remediation.
data-owner-email The email address of the person responsible for remediating the incident. This
attribute is not populated by the system. Instead, it is set manually in the Incident
Details section of the Incident Snapshot screen, or automatically using a lookup
plug-in.
date-sent Date and time when the message was sent if it is an email. For example:
date-sent=Mon Aug 15 11:46:55 PDT 2011.
file-create-date Date that the file was created in its current location, whether it was originally
created there, or copied from another location. Retrieved from the operating
system.
file-modified-by Fully-qualified user credential for the computer where the violating copy action
took place.
file-owner The name of the user or the computer where the violating file is located.
discover-extraction-date Date a subfile was extracted from an encapsulated file during Discover scanning.
endpoint-volume-name The name of the local drive where an endpoint incident occurred.
endpoint-dos-volume-name The Windows name of the local drive where an endpoint incident occurred.
endpoint-application-name Name of application most recently used to open (or create) the violating file.
endpoint-application-path Path of the application that was used to create or open the violating file.
policy-name The name of the policy that was violated, for example: policy-name=Keyword
Policy.
recipient-emailX The email address of the recipient, where X is the unique index to distinguish
between multiple recipients; for example: recipient-email1,
recipient-ip1, recipient-url1; recipient-email2, recipient-ip2,
recipient-url2; etc.
recipient-ipX The IP address of the recipient, where X is the unique index to distinguish
between multiple recipients. See above example.
recipient-urlX The URL of the recipient, where X is the unique index to distinguish between
multiple recipients. See above example.
Implementing lookup plug-ins 2000
Implementing and testing lookup plug-ins
sender-email The email address of the sender for Network Prevent for Email (SMTP) incidents.
sender-ip The IP address of the sender for Endpoint and Network incidents on protocols
other than SMTP.
sender-port The port of the sender for Network incidents on protocols other than SMTP.
endpoint-user-name The user who was logged on to the endpoint when the violation occurred.
server-name The name of the detection server that reported the incident. This name is
user-defined and entered when the detection server is deployed. For example:
server-name=My Network Monitor.
monitor-name The name of the detection server that reported the incident. This name is
user-defined and entered when the detection server is deployed. For example:
server-name=My Network Monitor.
monitor-host The IP address of the detection server that reported the incident. For example:
monitor-host=127.0.0.1
monitor-id The system-defined numeric identifier of the detection server. For example:
monitor-id=1.
acl-principalX A string that indicates the user or group to whom the ACL applies.
Implementing lookup plug-ins 2001
Implementing and testing lookup plug-ins
acl-typeX A string that indicates whether the ACL applies to the file or to the share.
acl-grant-or-denyX A string that indicates whether the ACL grants or denies the permission.
acl-permissionX A string that indicates whether the ACL denotes read or write access.
client-user-id A string representing the identifier for the user within the client domain
making the detection request.
common-owner A string representing the user identification of the data owner. Used
in data-at-rest (DAR) requests only.
common-sharedwith An array of user identifiers for all users the file is shared with. Used
in DAR requests only.
Note: Administrators can also reload lookup plug-ins from the Custom Attributes tab of
the System > Incident Data > Attributes screen.
Problem Solution
Lookup plug-in fails to load If the plug-in failed to load, search for a message in the log file similar to the following:
SEVERE
[com.vontu.enforce.workflow.attributes.AttributeLookupLoader]
Error loading plugin [<Plugin_Name>]
Note the "Cause" section that follows this type of error message. Any such entries
will explain why the plug-in failed to load.
Attributes are not populated by If the plug-in loads but attributes are not populated, look in the log for the attribute
the lookup map. Verify that values are being populated, including for the lookup parameters that
you enabled. To do this, search for a lookup parameter key that you have enabled,
such as sender-email.
10 Open the file localhost.<date>.log using a text editor. Open the file with the most
recent date.
11 Search for the name of the lookup plug-in. You should see several messages.
12 If necessary, verify the lookup plug-in logging properties in file
ManagerLogging.properties in your config directory.
com.vontu.logging.ServletLogHandler.level=FINEST
com.vontu.enforce.workflow.attributes.CustomAttributeLookup.level=FINEST
com.vontu.lookup.level=FINEST
However, this property lets you modify the output of the Data
Owner Name and Data Owner Email attributes based on
retrieved values. These parameters are specified in lookup plug-in
configurations and scripts using the same syntax as custom
attributes. Both attributes are enabled by selecting the Incident
attribute group.
AttributeLookup.auto true The automatic lookup property specifies whether the lookup
should be triggered automatically when a new incident is detected.
This property automatically populates incident attributes using
the deployed lookup plug-ins after the initial lookup is executed.
AttributeLookup.reload false The automatic plug-in reload property specifies whether all
plug-ins should be automatically reloaded each day at 3:00 A.M.
Change to true to enable.
1 Create custom attributes. Define the custom attributes for the information you want to look up.
See “Setting the values of custom attributes manually” on page 1972.
2 Create the CSV data source file. The CSV file that contains the data to be used to populate custom
attributes for incident remediation.
3 Create a new CSV plug-in. See “Creating new lookup plug-ins” on page 1995.
4 Name and describe the plug-in. The name string is limited to 100 characters. We recommend that you
enter a description for the lookup plug-in.
5 Specify the file path. Provide the path to the CSV file. The CSV file must be local to the Enforce
Server.
6 Choose the File Delimiter. Specify the delimiter that is used in the CSV file. The pipe delimiter [|] is
recommended.
8 Map the attributes. Map the system and the custom attributes to the CSV file column heads
and define the keys to use to extract custom attribute data. Keys map to
column heads, not custom attributes.
attr.attribute_name=column_head
keys=column_head_first:column_head_next:column_head_3rd
See “Mapping attributes and parameter keys to CSV fields” on page 2010.
9 Save the plug-in. Verify that the correct save message for the plug-in is displayed.
9 Select the Lookup Parameter Define the keys which are used to extract custom attribute data.
Keys.
See “Selecting lookup parameters” on page 1996.
10 Enable the lookup plug-in. The CSV Lookup Plug-In must be enabled on the Enforce Server.
11 Troubleshoot the plug-in. See “Testing and troubleshooting the CSV Lookup Plug-In ” on page 2012.
Implementing lookup plug-ins 2008
Configuring the CSV Lookup Plug-In
email|first_name|last_name|domain_user_name|user_name|department|manager|manager_email
[email protected]|John|Smith|CORP\jsmith1|jsmith1|Accounting|Mei Wong|[email protected]
Implementing lookup plug-ins 2009
Configuring the CSV Lookup Plug-In
■ If more than 10% of the rows in the CSV file violate any of these requirements, the Plugin
does not load.
■ For accuracy in the lookup, the CSV file needs to be kept up to date.
See “About the CSV Lookup Plug-In ” on page 1988.
■ C:/SymantecDLP_csv_lookup_file/senders2.csv
On Windows you can use either forward or backward slashes. For example:
C:/Symantec/DataLossPrevention/EnforceServer/15.5/Protect/plugins/employees.csv
or C:\Program
Files\Symantec\DataLossPrevention\EnforceServer\15.5\Protect\plugins\employees.csv.
On Linux you can only use forward slashes.
The system validates the file path when you save the configuration. If the system cannot locate
the file it reports an error and does not let you save the configuration. Make sure that the CSV
file is not open and is stored locally to the Enforce Server.
attr.Store-ID=store-id
attr.Store\ Address=store_address
attr.incident-id=incident-id-key
attr.sender-email=sender-email-key
keys=sender-email-key:incident-id-key
With this example in mind, adhere to the following syntactical rules when mapping the attributes
to CSV file data.
attr.attribute\ name=column\ head Blank spaces in attribute and column names must
be preceded by a backslash.
attr.attribute_name=column_head
attr.attribute_name=column_head
Implementing lookup plug-ins 2011
Configuring the CSV Lookup Plug-In
attr.sender-email = Email
attr.endpoint-user-name = Username
attr.file-owner = File-owner
attr.sender-ip = IP
keys = Email:Username:File-owner:IP
4 If the plug-in fails to load, or the plug-in fails to return looked up values, check the file
c:\ProgramData\Symantec\DataLossPrevention\EnforceServer\Protect\
logs\tomcat\localhost.<latest-date>.log (Windows) or
/var/log/Symantec/DataLossPrevention/EnforceServer/15.5/
tomcat/localhost.<latest-date>.log (Linux).
■ Check that the database and table are created and that the CSV file is loaded into the
table. To verify, look for lines similar to the following:
INFO [com.vontu.lookup.csv.CsvLookup]
creating database
create table using SQL
importing data from file into table LOOKUP having columns
Note: To process large files, the CSV Lookup Plug-In uses an in-memory database
(Apache Derby). Only one instance of Derby can be running per Enforce Server. If a
previous instance is running, the CSV Lookup Plug-In does not load. If the database
and table are not created, restart the Symantec DLP Manager service and reload the
plug-in.
Look for a warning message indicating that "SQL query did not return any results." In this
case, make sure that the attribute mapping matches the CSV column heads and reload
the plug-in if changes were made.
See “Troubleshooting lookup plug-ins” on page 2003.
■ Department
■ Email Address
SENDER|MGR|DEPT|EMAIL
[email protected]|Merle Manager|Engineering|[email protected]
3 Save the CSV file to the same volume drive where the Enforce Server is installed.
For example: C:\Program Files\Symantec\DataLossPrevention\EnforceServer
\15.5\Protect\plugins\lookup\csv_lookup_file.csv.
attr.sender-email=SENDER
attr.Manager=MGR
attr.Department=DEPT
attr.Email\ Address=EMAIL
keys=SENDER
Implementing lookup plug-ins 2015
Configuring LDAP Lookup Plug-Ins
attr.sender-email = SENDER This is a lookup parameter key from the Sender group. It is mapped to
the corresponding column header in the CSV file.
attr.Email\ Address = EMAIL This is a space delimited custom attribute defines in Step 1. It is mapped
to the corresponding column head in the CSV file.
keys = SENDER This line declares one key to perform the lookup. The lookup ceases
once the first key is located, and the attribute values are populated.
10 Select System > Lookup Plugins > Modify Plugin Chain and enable the plug-in.
11 Open the Incident Snapshot for the incident generated in the Step 4.
12 Verify that the unpopulated custom attributes you created in Step 1 appear in the Attributes
pane to the right of the screen.
If they do not, complete Step 1.
13 Verify that the Lookup option appears in the Attributes pane above the custom attributes.
If it does not, verify that the Lookup Attributes privilege is granted to the user.
Click Reload Plugin after making any changes.
14 Click the Lookup option.
The custom attributes should be populated with values looked up and retrieved from the
CSV file.
15 Troubleshoot the plug-in as necessary.
See “Testing and troubleshooting the CSV Lookup Plug-In ” on page 2012.
The connection to the LDAP server can be configured from the link in the LDAP
Lookup Plug-In .
3 Create a new LDAP See “Creating new lookup plug-ins” on page 1995.
Lookup Plug-In .
4 Map the attributes. Map the attributes to the corresponding LDAP directory fields. The syntax is
as follows:
attr.CustomAttributeName = search_base:
(search_filter=$variable$):
ldapAttribute
5 Save and enable the The LDAP Lookup Plug-In must be enabled on the Enforce Server.
plug-in.
See “Enabling lookup plug-ins” on page 2001.
6 Test and troubleshoot the See “Troubleshooting lookup plug-ins” on page 2003.
LDAP Lookup Plug-In .
You can use an LDAP lookup tool such as Softerra LDAP Browser to confirm that you have
the correct credentials to connect to the LDAP server. Also confirm that you have the right
fields defined to populate your custom attributes.
See “About LDAP Lookup Plug-Ins” on page 1988.
attr.CustomAttributeName = search_base:
(search_filter=$variable$):
ldapAttribute
Element Description
CustomAttributeName The name of the custom attribute as it is defined in the Enforce Server.
Note: If the name of the attribute contains white-space characters, you must
precede each instance of the white space with a backslash. A white-space
character is a space or a tab. For example, you need to enter the Business
Unit custom attribute as: attr.Business\ Unit
search_filter The name of the LDAP attribute (field) that corresponds to the lookup parameter
(or other variable) passed to the plug-in from the Enforce Server.
variable The name of the lookup parameter that contains the value to be used as a key to
locate the correct data in the LDAP directory.
In cases where multiple plug-ins are chained together, the parameter might be a
variable that is passed to the LDAP Lookup Plug-In by a previous plug-in.
ldapAttribute The LDAP attribute whose data value is returned to the Enforce Server. This value
is used to populate the custom attribute that is specified in the first element of the
entry.
In the following attribute mapping example, a separate line is entered for each custom attribute
that is to be populated. In addition, note the use of the TempDeptCode temporary variable. The
department code is needed to obtain the department name from the LDAP hierarchy. But only
the department name needs to be stored as a custom attribute. The TempDeptCode variable
is created for this purpose.
5 Select Incidents > All Incidents for the detection server you are using to detect the
incident.
6 Select (check) several incidents and select Lookup Attributes from the Incident Actions
drop-down menu. (This action looks up attribute values for all incidents for that form of
detection.
7 Check the Incident Snapshot screen for an incident. Verify that the Lookup Custom
Attributes are filled with entries retrieved from the LDAP lookup.
8 If the correct values are not populated, or there is no value in a custom attribute you have
defined, make sure that there are no connection errors are recorded in the Incident History
tab.
9 Check the Tomcat log file.
See “Troubleshooting lookup plug-ins” on page 2003.
7 Save the plug-in. Verify that the correct save message for the plug-in is displayed.
8 Enable the following keys at the System > Lookup Plugins > Lookup Parameters page.
■ Incident
■ Message
■ Sender
9 Create an incident that generates one of the lookup parameters. For example, an email
incident exposes the sender-email attribute. There must be some corresponding information
in the Active Directory server.
10 Open the Incident Snapshot for the incident.
11 Click the Lookup button and verify the custom attributes created in the Step 1 are
populated in the right panel.
2 Create the script. See “Writing scripts for Script Lookup Plug-Ins” on page 2021.
3 Define the Lookup Select the keys to use to extract custom attribute data.
Parameter Keys.
See “Selecting lookup parameters” on page 1996.
Implementing lookup plug-ins 2021
Configuring Script Lookup Plug-Ins
4 Create a new Script See “Creating new lookup plug-ins” on page 1995.
Plugin.
5 Enter the Script This value is the local path to the script engine executable on the Enforce Server
Command. host.
6 Specify the Arguments. This value is the path to the Python script file to use for attribute lookup and any
command line arguments. Begin the script path with the -u argument to improve
lookup performance.
7 Enable the stdin and Enable both options to help prevent script injection attacks.
stout options.
See “Enabling the stdin and stdout options” on page 2023.
8 Optionally, enable You can specify the incident types by protocol for passing attribute values to look
protocol filtering. up scripts.
9 Optionally, enable and You can encrypt and pass credentials required by the script to connect to external
encrypt credentials. systems.
9 Save the plugin. Verify that the correct save message for the plugin is displayed.
10 Enable the lookup You can chain scripts together and chain scripts with other lookup plugins.
plugin.
When writing scripts for use with the Script Lookup Plug-In , adhere to the following syntax
requirements and calling conventions, including how a script plugin passes arguments to
scripts and the required format for script output.
Output stdout To work with the plugin and populate attributes, scripts
must output a set of key-value pairs to standard out
(stdout).
host-name=mycomputer.company.corp
username=DOMAIN\bsmith
exit code 0 Scripts must exit with an exit code of ‘0.’ If scripts exit with
any other code, the Enforce Server assumes that an error
has occurred in script execution and terminates the
attribute lookup.
error handling stderr to a file Scripts cannot print out error or debug information. Redirect
stderr to a file. In Python this would be:
■ Linux: /usr/local/bin/python
@ Attributes containing these characters will be ignored during processing if the stdin and
stdout options are enabled.
.
$ Attributes containing the $ and % characters are allowed if these characters are properly
escaped by a backslash.
%
Note: Network protocols are configured at the System > Settings > Protocols screen.
Endpoint protocols are configured at the System > Agents > Agent Configuration screen.
Discover protocols are configured at the Policies > Discover Scanning > Discover
Targets. And, once an incident is generated, the protocol value for the incident is displayed
at the top of the Incident Snapshot screen.
1 Create a text file that contains the The format of this file is key=value, where key is the name
credentials that are needed by the script of the credential.
to access the appropriate external
For example:
systems.
username=msantos password=esperanza9
2 Save this credential file to the file system The file needs to be saved to the Enforce Server temporarily.
local to the Enforce Server.
For example: C:\temp\MyCredentials.txt.
3 On the Enforce Server, open a shell or This directory on the Enforce Server contains the Credential
command prompt and change directories Generator Utility.
to \Program
Files\Symantec\DataLossPrevention
\EnforceServer\15.5\Protect\bin.
CredentialGenerator.bat C:\temp\MyCredentials.txt
C:\temp\MyCredentialsEncrypted.txt
5 Select Enable Credentials. At the System > Lookup Plugins > Edit Script Lookup
Plugin page, select (check) the Enable Credentials option.
6 Enter the Credentials File Path. Enter the fully qualified path to the encrypted credentials file.
For example: