RSA DLP 9.6 Endpoint Deployment Guide
RSA DLP 9.6 Endpoint Deployment Guide
6 Endpoint
Deployment Guide
Contact Information
Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/
index.htm
Trademarks
RSA, the RSA Logo and EMC are either registered trademarks or trademarks of EMC Corporation in the United States and/or
other countries. All other trademarks used herein are the property of their respective owners. For a list of EMC trademarks, go
to www.emc.com/legal/emc-corporation-trademarks.htm.
License Agreement
This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and
may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice
below. This software and the documentation, and any copies thereof, may not be provided or otherwise made available to any
other person.
No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any
unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability.
This software is subject to change without notice and should not be construed as a commitment by EMC.
Third-Party Licenses
This product may include software developed by parties other than RSA. The text of the license agreements applicable to
third-party software in this product may be viewed in the thirdpartylicenses_DLP_9.6.pdf file.
Note on Encryption Technologies
This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption
technologies, and current use, import, and export regulations should be followed when using, importing or exporting this
product.
Distribution
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO
REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS
PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE.
Copyright © 2013 EMC Corporation. All Rights Reserved. Published in the USA.
February 2013
RSA DLP 9.6 Endpoint Deployment Guide
Contents
Preface ..................................................................................................................................... 7
About This Guide................................................................................................................ 7
Product Version ........................................................................................................... 7
Organization of This Book .......................................................................................... 7
RSA DLP Documentation................................................................................................... 8
Related Documentation................................................................................................ 8
Support and Contact Information........................................................................................ 9
RSA DLP Customer Support....................................................................................... 9
Support Contacts................................................................................................... 9
Before You Call Customer Support...................................................................... 9
RSA DLP Consulting Services .................................................................................. 10
RSA DLP Education Services ................................................................................... 10
Contact RSA DLP...................................................................................................... 10
Chapter 1: Introduction.......................................................................................................11
About DLP Endpoint .........................................................................................................11
RSA DLP Endpoint Components ..................................................................................... 12
How DLP Endpoint Agent Works .................................................................................... 13
Policy-Based Content Analysis and User Action Control ......................................... 14
Contents 3
RSA DLP 9.6 Endpoint Deployment Guide
4 Contents
RSA DLP 9.6 Endpoint Deployment Guide
Index ....................................................................................................................................... 85
Contents 5
RSA DLP 9.6 Endpoint Deployment Guide
6 Contents
RSA DLP 9.6 Endpoint Deployment Guide
Preface
This guide is intended to help system administrators and information-technology
specialists install and configure RSA DLP Endpoint.
Topics:
Product Version
The information in this book is current as of DLP Endpoint version 9.6. Corrections or
updates to this information may be available through RSA SecurCare® Online, at
https://knowledge.rsasecurity.com
Preface 7
RSA DLP 9.6 Endpoint Deployment Guide
Category Documents
Related Documentation
For additional information to supplement the product documentation, see the
following:
Technical Notes. The technical notes discuss optional configuration procedures for
DLP components or third-party software.The DLP Technical Notes are available on
RSA SecurCare Online at https://knowledge.rsasecurity.com/scolcms/
set.aspx?id=8494
8 Preface
RSA DLP 9.6 Endpoint Deployment Guide
Support Contacts
The RSA Customer Support Information sites contains information on RSA support
programs plus an extensive Content Library of product-related documents such as
datasheets, guides and whitepapers.
The RSA Solution Gallery provides information about third-party hardware and
software products that have been certified to work with RSA products. The gallery
includes Secured by RSA Implementation Guides with step-by-step instructions and
other information about interoperation of RSA products with these third-party
products.
Preface 9
RSA DLP 9.6 Endpoint Deployment Guide
For general information about RSA and the RSA DLP, visit http://www.emc.com/
security/rsa-data-loss-prevention.htm.
10 Preface
RSA DLP 9.6 Endpoint Deployment Guide
1 Introduction
Topics:
DLP Endpoint offers different levels of protection, from auditing actions on sensitive
data to monitoring threshold behaviors for anomalies, to actively enforcing policies,
and stopping the misuse of data before it happens.
The Endpoint agent installed on the end-user machine does not interfere in the user’s
activities. Hence, end-users do not have to learn new software or change existing
processes to work with protected information.
Chapter 1: Introduction 11
RSA DLP 9.6 Endpoint Deployment Guide
Note: You can choose to have a test deployment without any Endpoint
Coordinators.
• Endpoint Agents. Software residing on each end-user machine that analyzes files
for sensitive content in the context of a user action. On detecting a violation, the
Endpoint agent, sends the details in an event to the configured Endpoint
Coordinator.
12 Chapter 1: Introduction
RSA DLP 9.6 Endpoint Deployment Guide
The following figure shows a sample DLP Endpoint deployment. For additional
deployment scenarios, see “DLP Deployment Scenarios” on page 77.
Enterprise Manager
Database
Root Endpoint Coordinator
Site 1 Site n
Endpoint Coordinator Endpoint Coordinator
The Endpoint agent runs from within the end-user’s operating system and is
transparent to desktop applications. The agent monitors each process running as local
user but not system processes, and intercepts application calls initiated by the
end-user.
Chapter 1: Introduction 13
RSA DLP 9.6 Endpoint Deployment Guide
The following figure shows the logical functioning of the Endpoint agent.
End-user machine
(DLP Endpoint agent installed)
1. Intercept calls
Endpoint agent
2. Analyze content activity
3. Enforce policy
Destination
When the Endpoint agent detects a call for a user action such as copying, moving, or
printing, it extracts the content of the document involved and performs content
analysis (if necessary) to determine whether the action constitutes a policy violation.
If the agent determines a policy violation has occurred, it either allows or denies the
action as defined by the policy and sends the event data to the Endpoint Coordinator.
Note: A policy does not have to be based on content analysis. Violations can
be defined based on user actions only, or on other file attributes such as file
extension type. For more details, see “Policy-Based Content Analysis and
User Action Control”.
The Endpoint agent communicates, when appropriate, with end-users through a user
interface that displays policy violation notification messages and accepts justification
text input from users. See “Endpoint Agent Messages” on page 67 for details.
The Endpoint agent continues to monitor user actions and enforce policies even when
the end-user machine it runs on is disconnected from the network. Information about
violations is stored locally and then sent to the Endpoint Coordinator once the
computer is back online.
14 Chapter 1: Introduction
RSA DLP 9.6 Endpoint Deployment Guide
For instruction on how to configure policies, see the RSA DLP Endpoint User Guide
or the Enterprise Manager online help.
The user actions (both Windows user actions and DOS command
User Actions
line) that can trigger a policy violation.
Chapter 1: Introduction 15
RSA DLP 9.6 Endpoint Deployment Guide
Justify User is prompted to justify the action that triggered the violation.
16 Chapter 1: Introduction
RSA DLP 9.6 Endpoint Deployment Guide
Topics:
• System Requirements
• Third-Party Application Integration
• DLP Endpoint Deployment Flow
System Requirements
Make sure that each machine that you intend to use in your DLP Endpoint deployment
meets the system requirements.
• Enterprise Manager Requirements
• Endpoint Coordinator Requirements
• Endpoint Agent Requirements
• Port Usage
• Network Accessibility
• Endpoint Agent Deployment Requirements
Hardware Requirements
Make sure that the Enterprise Manager machine meets the following hardware
requirements.
CPU 2 x 2 GHz
RAM 4 GB (8 GB is recommended)
Software Requirements
Make sure that the Enterprise Manager meets the following software requirements.
Database client software • SQL Server 2005/2008 Command Line Query Utility
• SQL Server 2005/2008 Native Client
Hypervisor • VMware ESX version 3.5, 4.0, 4.1, and ESXi 5.0
• Microsoft Hyper-V Server 2008
Hardware Requirements
Make sure that the Endpoint Coordinator machine meets the following hardware
requirements.
CPU • 2 x 2 GHz
• 4 x 2 GHz (Recommended)
RAM 4 GB (8 GB is recommended)
Disk space 40 GB
Software Requirements
Make sure the Endpoint Coordinator machine meets the following software
requirements.
Hypervisor • VMware ESX version 3.5, 4.0, 4.1, and ESXi 5.0
• Microsoft Hyper-V Server 2008
Hardware Requirements
Make sure that the Endpoint agent machine meets the following hardware
requirements.
CPU 2 GHz
RAM 1 GB
Software Requirements
Make sure the Endpoint agent machine meets the following software requirements.
Port Usage
The following ports are used by the products in the RSA DLP to communicate among
the different components. These ports must be opened for functioning of the
RSA DLP.
In/
Port Component Description Protocol
Out
123 Out • Network Controller Used for communication with NTP server. UDP or
• Sensor NTP
• Interceptor
• ICAP Server
135 Both Discovery agent Windows RPC port used for communication TCP
between Site Coordinator and Discovery
Both Site Coordinator agent during bootstrapping of Discovery
agent.
137 Both Discovery agent Windows NetBIOS Name Service port used UDP
for communication between Site Coordinator
Both Site Coordinator and Discovery agent during bootstrapping of
Discovery agent.
138 Both Discovery agent Windows NetBIOS Datagram Service used UDP
during communication between Site
Both Site Coordinator Coordinator and Discovery agent during
bootstrapping of Discovery agent.
139 Both Discovery agent Windows NetBIOS Session Service used TCP
during communication between Site
Both Site Coordinator Coordinator and Discovery agent during
bootstrapping of Discovery agent.
In/
Port Component Description Protocol
Out
445 In Discovery agent Microsoft-DS SMB file sharing port for TCP
communication between Site Coordinator and
Out Site Coordinator Discovery agent during bootstrapping of
Discovery agent.
1344 Both ICAP Server Communication between ICAP Server and TCP
ICAP client.
1352 Out • Enterprise Coordinator Used to connect with IBM Lotus Domino TCP
• Grid Worker server for Lotus Notes scans.
4369 In Root Endpoint Coordinator Local port used for communication between TCP
Endpoint Coordinator components.
In Endpoint Coordinator
In/
Port Component Description Protocol
Out
61613 In Root Endpoint Coordinator Local port used for communication between TCP
Endpoint Coordinator components.
In Endpoint Coordinator
9999 Out Network Controller Initial security certificate exchange between TLS
Network Controller and managed DLP
In • Sensor Network devices.
• Interceptor
• ICAP Server
Network Accessibility
Because of the distributed nature of a DLP Endpoint deployment, accessibility
between machines in the deployment infrastructure must be clearly defined.
Each monitored computer in an Endpoint group must be accessible from its Endpoint
Coordinator. If network firewall solution exist, please check the existing rules and add
exceptions if necessary.
RSA recommends that you use third-party deployment tools to install the Endpoint
agents on the end-user machines. You can use the following deployment tools:
• System Center Configuration Manager (SCCM)
• Altiris Deployment Solution
• IBM Tivoli Endpoint Manager (BigFix)
For more information, see the RSA technical note Enabling RSA SecurID
Authentication for RSA DLP.
SIEM Integration
RSA DLP can be integrated with the following Security Incident and Event
Management (SIEM) applications:
RSA enVision Version 3.7 or later with the November 2010 ESU (event source
update) applied.
DRM Integration
RSA DLP can be integrated with Rights Management Services (RMS) applications
using the Endpoint custom actions. For more information, see Endpoint User Guide.
Microsoft Windows 2008 Active Directory Rights Management Services (AD RMS)
LDAP Repositories
RSA DLP can be integrated with the following LDAP Repositories:
• Microsoft Active Directory
• SunOne
Start
Install Enterprise Manager
Install Root Endpoint Coordinator
Initialize Root Endpoint Coordinator in
Enterprise Manager
Do you need additional
Endpoint Coordinator ?
Add Endpoint Coordinator in
Yes Enterprise Manager
No
Install Endpoint Coordinator
Generate Endpoint agent installer
Install Endpoint agent
(use third‐party deployment tools like SCCM)
Stop
For a test deployment of DLP Endpoint, Enterprise Manager can be installed on the
same machine as the Root Endpoint Coordinator, the other primary component.
Topics:
• Perform Pre-Installation Tasks
• Installing Enterprise Manager
• Verify the Enterprise Manager Installation
• Uninstall Enterprise Manager
Note: Only a domain administrator can create a new domain user account.
You may set the “Password never expires” option for your Enterprise Manager
domain-user account. This makes sure that the Enterprise Manager service does not
fail to start due to a failed logon attempt.
In case you need to update the Enterprise Manager run-as user credentials, see
“Update Run-As User Credentials” on page 31.
Note: These instructions are based on Windows Server 2008 R2. The
instructions may vary depending on the operating system used. Refer to the
operating system help for more details.
1. Add the domain user to the Administrators group on the Enterprise Manager
machine.
a. Click Start > Control Panel > User Accounts > Manage User Accounts.
The User Accounts window appears.
b. Click Add, enter the User name and Domain, and click Next.
c. Select Administrator and click Finish
2. Set Log on as a service permission to the domain user.
a. Click Start > Control Panel > Administrative Tools > Local Security
Policy.
The Local Security Policy window appears.
b. In the left pane, select Local Policies > User Rights Assignment.
c. Double-click on the Log on as a service policy.
The Log on as a service Properties window appears.
In the above situations, if the Enterprise Manager run-as user credentials are not
updated, the Enterprise Manager service will no longer be able to run. The system may
display the following error when trying to start the service:
The service did not start due to a login failure.
1. On the Enterprise Manager machine, open the Services control panel, and
right-click RSA DLP Enterprise Manager.
2. Select Properties from the drop-down menu, then click the Log On tab.
3. Enter the new user name (if changed) and the new password.
4. Click OK.
The Enterprise Manager installation process creates this database. Steps during
installation prompt you to specify SQL Server connection information and a name for
the database.
Important: The SQL Server client software must be installed before installing
Enterprise Manager.
1. Download the SQL Server client software packages from the following locations:
– For SQL Server 2005,
http://www.microsoft.com/downloads/
details.aspx?familyid=df0ba5aa-b4bd-4705-aa0a-b477ba72a9c
b&displaylang=en
– For SQL Server 2008 R2,
http://www.microsoft.com/download/en/
details.aspx?id=26728
Important: Download the x86 or x64 package versions for the software as
needed to run on the Enterprise Manager machine.
2. Install the SQL Server client software on the Enterprise Manager machine.
You can install Enterprise Manager using one of the following methods:
• Install Enterprise Manager Using the Wizard
• Install Enterprise Manager Using the Command Line
• Install Enterprise Manager Remotely
The installation wizard opens and performs basic validation of the machine. One
of the following occurs:
– If the installer detects a previous version of DLP installed, you are prompted
to upgrade. If you wish to upgrade, see the RSA DLP Upgrade Guide.
– If the requirements are not met, or if required ports are in use, an error
message appears explaining the problem. Click OK to close the message and
Finish to exit the wizard, correct the problem, and then retry the installation.
– If the requirements are met, the buttons at the bottom of the window become
active.
2. Click Next to continue.
The License Agreement screen appears.
3. Review the license agreement, choose I accept the terms in the license
agreement, and click Next.
The Feature Selection screen appears.
Note: The rest of this procedure leads you through the installation of
Enterprise Manager only.
5. Click Next.
The Database Server screen appears.
c. (Optional) Select the Connect using port checkbox and specify the port using
which Enterprise Manager will connect to the database.
Use this option only if your database administrator has provided a static port
number to be used for connecting to the database.
d. Specify the user credentials to authenticate with SQL Server and create the
Enterprise Manager database. Do one of the following:
• If the current logged-in user has permission to connect and create the
database, select Windows authentication credentials of current user.
• If you want to specify a different user, select Server authentication
using the Login ID and password below and enter the user ID and
password.
Note: The credentials must have create privilege on the database. This
credential is used only during the upgrade process.
During run time Enterprise Manager Service Credentials is used and it must
have owner privilege on the Enterprise Manager database.
7. Click Next.
The Enterprise Manager Service Credentials screen appears.
8. Enter the user credentials for Enterprise Manager service. Enter the user name in
the format DOMAIN\username.
This user credential is used to connect with the Enterprise Manager database and
perform read and write operations.
9. Click Next.
The Enterprise Manager Administrator Credentials screen appears.
10. Enter and confirm the password for the default administrator account to access the
Enterprise Manager console.
The password must be minimum of six characters and contain only the following
characters:
– Uppercase characters (A-Z)
– Lowercase characters (a-z)
– Numbers (0-9)
– Special characters (!,@,#,?,_)
Note: Only English characters are allowed in the password. If you want to
have non-English characters in the password, you can log on to the
console and change the password, after installation of Enterprise
Manager.
– Run DLP Suite with FIPS mode enabled option is selected if the host
machine is configured to run with FIPS encryption. For details, see the
technical note Deploying RSA DLP in FIPS-Compliant Mode.
– Select Enable Partner Device Integration to set up a CA certificate for
secure communication between a partner device and Enterprise Manager.
RSA recommends that you select this option if you plan to use Enterprise
Manager to control a partner device with built-in RSA DLP features. For
more information, see the technical note Managing Partner Device DLP with
Enterprise Manager.
Note: If you do not select this option during installation and at a later
point of time you want to enable it, you will have to reinstall
Enterprise Manager.
The Results of the RSA DLP installation prerequisite check page appears.
b. Correct the validations with FAIL results and optionally WARNING results,
and then retry the installation.
16. On successful validation, the installation is performed and ends with the Wizard
Completed screen.
Click Finish to close the wizard.
17. Upgrade the JRE. For instructions, see RSA technical note Manually Updating
Java JRE.
For example, if you want to install Enterprise Manager on a drive other than the
default C: drive. Use a command such as this:
"RSA_DLP_Installer_9.6.exe" /v"INSTALLDIR=\"D:\Program
Files(x86)\RSA\" ADDLOCAL=EM"
The /v parameter passes MSI command line parameters to the .msi installer
embedded in the executable installer. On the command line, insert the MSI options
within a pair of quotation marks that immediately follow the /v parameter, without
spaces.
You can include any of the following options after the /v parameter:
• Standard MSI command line options.
For list of standard MSI options, see http://support.microsoft.com/kb/
314881
Use the /q option for silent installs, and the /l option for creating installation log
file.
• DLP installer properties, in the format PROPERTY=value.
– ADDLOCAL=EM
Specifies the components to install. For Enterprise Manager only use
ADDLOCAL=EM.
– AUTOCONFIGURE=NULL|1
Specifies if the installer automatically configures a sample Site Coordinator.
To use this property you must specify ADDLOCAL=ALL.
– CONFIG=filePath
The fully qualified file name to be used as a configuration file. By default, the
filename is EMInstall.ini.
– FIPS=NULL|1
Specifies if DLP is installed in FIPS-enabled mode.
For more information on FIPS requirements and configuration, see the
technical note Deploying RSA DLP in FIPS-Compliant Mode
– INSTALLDIR=installPath
The Enterprise Manager installation location.
– INDEXINGDIR=indexingdir
Set the location for Event and Report Indexing folder.
– IS_NET_API_LOGON_USERNAME=DOMAIN\name.
The name used in creating or modifying the database (include the domain and
username separated by a backslash).
– IS_NET_API_LOGON_PASSWORD=password
The password associated with the username.
– ADMIN_PASSWORD=password
The password for the default administrator account to access the Enterprise
Manager console. The password must be minimum of six characters and
contain only the following characters:
• Uppercase characters (A-Z)
• Lowercase characters (a-z)
• Numbers (0-9)
• Special characters (!,@,#,?,_)
– PARTNER=1
Enables partner device integration with Enterprise Manager. Specify 1 only if
you chose to integrate the partner device.
The CA certificate is required for enabling secure communication. If you have
enabled partner device integration, then you must enter the following
certificate details to create the common CA certificate.
• CA_COMMON_NAME=CommonName. Enter the common name of the CA.
• CA_STORE_PASSWORD=storepassword. Enter the store password of
the CA.
• STORE_PASSWORD=sitepassword. Enter the store password of the
interop local site certificate.
• ENABLE_SSL=1 to enable secure communication between Enterprise
Manager and the partner device.
– IS_SQLSERVER_SERVER=instanceName.
The database server instance name. By default in SQL Server, this has the
form hostName\serverInstance.
– IS_SQLSERVER_DB=databaseName.
The name of the Enterprise Manager database to be created during
installation.
– IS_SQLSERVER_AUTHENTICATION=NULL|1
Whether to use Windows authentication (default) or SQL Server
authentication (1) for the DLP installer to connect to SQL Server and create
the Enterprise Manager database.
– IS_SQLSERVER_USERNAME=name
The user name for the DLP installer to use to connect to SQL Server. Enter
only if SQL Server authentication is specified.
– IS_SQLSERVER_PASSWORD=password
The password for the DLP installer to use to connect to SQL Server. Enter
only if SQL Server authentication is specified.
– LOG_LEVEL=level
The verbosity level to be used in the Enterprise Manager and Enterprise
Coordinator installation log files. Acceptable values are INFO, WARNING,
DEBUG, ERROR.
– USE_SQL_PORT=1.
Specify 1 if the user wants to use non default port for SQL (default is 1433).
Enter the new port value:
• IS_SQLSERVER_PORT = CustomSQLPort
Instead of specifying the properties in the command line, you can set properties in a
configuration file, specified by the CONFIG property as shown above. For each
property, a configuration file value takes precedence over a command line value,
which takes precedence over the default value. If the CONFIG property is not set or
refers to a nonexistent file, the installer checks the directory that holds the Enterprise
Manager installer for a file named EMInstall.ini and uses the values from that
file.
A configuration file must be in standard .ini file format, in which all properties are
set in a section labeled [config] . For example:
[config]
INSTALLDIR="C:\RSA DLP"
IS_SQLSERVER_SERVER=DLP_Server_314
IS_SQLSERVER_DB=RSA_DLP_database
The following example command performs a silent install with parameters taken from
the file ConfigFile.ini:
RSA_DLP_Installer_9.6.exe /s /v"/qn CONFIG=\"C:\ConfigFolder\
ConfigFile.ini\""
You can use Windows Remote Desktop Protocol (RDP) to install Enterprise Manager
remotely. To do this, you must launch Remote Desktop from a command line using the
/console or /admin option. Using RDP without these options may cause a corrupt
installation or display the following error message:
1. Verify the presence of the Enterprise Manager service in the Windows Services
dialog box.
2. (Optional) Verify the presence of the interop service (RSA DLP Local Site
Interop) the Windows Services dialog box.
Note: If the installation fails the log file is available in the C:\Windows\
temp\ folder of the system on which Enterprise Manager is installed.
You can capture more detailed logging information by installing using the
command line and enabling full MSI logging. For information, see “Install
Enterprise Manager Using the Command Line” on page 39.
Note: Using Windows Programs and Features option will uninstall all the
DLP components. If you have more than one DLP components and plan to
uninstall only Enterprise manager, run the installer and select Modify.
Note: After uninstallation, the DLP installation folder (by default, C:\Program
Files(x86)\RSA) is not removed if you clicked No for removing associated files
and settings.
You may manually delete the installation folder after verifying that it does not impact
the product functioning.
This chapter explains how to install Endpoint Coordinators for use in DLP Endpoint
deployment.
Topics:
A DLP Endpoint deployment must have a Root Endpoint Coordinator. The Root
Endpoint Coordinator manages the certificates used for secure communication among
various components. In addition to the Root Endpoint Coordinator, you can have
multiple Endpoint Coordinators based on factors such as the number of Endpoint
agents and locations.
During bootstrapping, an Endpoint agent contacts the Root Endpoint Coordinator and
gets the following:
• A globally unique identifier that the agent will use to identify itself to Endpoint
Coordinators.
• Certificates for mutual SSL.
• The list of Endpoint Coordinators.
You must install a Root Endpoint Coordinator and install additional Endpoint
Coordinators based on your requirement. In a test or small deployment you can use a
Root Endpoint Coordinator without additional Endpoint Coordinators.
You can install Endpoint Coordinator using one of the following methods:
• Install Endpoint Coordinator Using the Wizard
• Install Endpoint Coordinator Using the Command Line
• Time on the machine must be synchronized with the domain controller and be
accurate.
• Add firewall exception for the following application:
DLP_install_dir\EndpointCoordinator\Erlang\erts-5.9\bin\
erl.exe, where DLP_install_dir is the planned DLP installation directory.
The default location is
C:\Program Files(x86)\RSA\
Click the drop-down list for RSA DLP Enterprise Manager and select This
feature will be installed on local hard drive.
For example, if you want to install Endpoint Coordinator on a drive other than the
default C: drive. Use a command such as this:
"RSA_DLP_Installer_9.6.exe" /v"INSTALLDIR=\"D:\Program
Files(x86)\RSA\" ADDLOCAL=EPC"
The /v parameter passes MSI command line parameters to the .msi installer
embedded in the executable installer. On the command line, insert the MSI options
within a pair of quotation marks that immediately follow the /v parameter, without
spaces.
You can include any of the following options after the /v parameter:
• Standard MSI command line options.
For list of standard MSI options, see http://support.microsoft.com/kb/
314881
Use the /q option for silent installs, and the /l option for creating installation log
file.
• DLP installer properties, in the format PROPERTY=value.
– ADDLOCAL=EPC
Specifies the components to install. For Endpoint Coordinator only use
ADDLOCAL=EPC.
– CONFIG=filePath
The fully qualified file name to be used as a configuration file. By default, the
filename is EMInstall.ini.
– INSTALLDIR_EPC=installPath
The Endpoint Coordinator installation location. Set this path only if you want
to install Endpoint Coordinator in a different location than Enterprise
Manager.
– EPC_TYPE=1|2
Specifies the role of the Endpoint Coordinator. Use 1 for a Root Endpoint
Coordinator and 2 for a Endpoint Coordinator.
– PASSCODE=passcode
The passcode used during initialization of Root Endpoint Coordinator in
Enterprise Manager.
– ROOT_EPC=hostname or IP address
Specifies the hostname or IP address of the Root Endpoint Coordinator in
your deployment.
– EPC_KEY=authorization_key
Specify the Authorization key of the Root Endpoint Coordinator. The
Authorization key is listed in the Root Endpoint Coordinator details pane on
the Enterprise Manager console.
– ROOT_THUMBPRINT=certificate_thumbprint
Specify the Certificate thumbprint of the Root Endpoint Coordinator. The
Certificate thumbprint is listed in the Root Endpoint Coordinator details pane
on the Enterprise Manager console.
Instead of specifying the properties in the command line, you can set properties in a
configuration file, specified by the CONFIG property as shown above. For each
property, a configuration file value takes precedence over a command line value,
which takes precedence over the default value. If the CONFIG property is not set or
refers to a nonexistent file, the installer checks the directory that holds the installer for
a file named EMInstall.ini and uses the values from that file.
A configuration file must be in standard .ini file format, in which all properties are
set in a section labeled [config] . For example:
[config]
ADDLOCAL=EPC
INSTALLDIR_EPC="C:\RSA DLP EPC"
EPC_TYPE=1
PASSCODE="Password#1"
The following example command performs a silent install with parameters taken from
the file ConfigFile.ini:
RSA_DLP_Installer_9.6.exe /s /v"/qn CONFIG=\"C:\ConfigFolder\
ConfigFile.ini\""
1. Verify the presence of the Endpoint Coordinator services in the Windows Services
dialog box.
– For Root Endpoint Coordinator:
Note: Only the RSA DLP Join Service is started immediately after
installation. Other services are started when the Root Endpoint
Coordinator is initalized. For instructions, see “Initialize the Root
Endpoint Coordinator” on page 55
Note: If the installation fails the log file is available in the %TEMP% folder
of the system on which Endpoint Coordinator is installed.
You can capture more detailed logging information by installing using the
command line and enabling full MSI logging. For information, see “Install
Endpoint Coordinator Using the Command Line” on page 51.
Note: Using Windows Programs and Features option will uninstall all the
DLP components. If you have more than one DLP components and plan to
uninstall only Endpoint Coordinator, run the installer and select Modify.
This chapter explains how to install DLP Endpoint agents on the end-user machines.
Topics:
Note: The Endpoint agent bootstrapping and certificate renewals will fail
if the endpoint machine is not able to contact the Root Endpoint
Coordinator.
You can install the Endpoint agent on one machine at a time, or you can use enterprise
desktop management software to install it on multiple machines.
Important: Make sure that *.bin files are allowed to be downloaded and
RSA DLP Endpoint agent is excluded from any other security products installed
on endpoint machines, like, Antivirus application and Cisco Security Agent.
RSA recommends that you add the DLP Endpoint agent to the corporate standard
images for virtual desktops and physical hosts, once the DLP Endpoint deployment is
stable in the production environment.
You can use one of the following methods to install an Endpoint agent.
• Install Endpoint Agent Using the Command Line
• Remotely Install Multiple Endpoint Agents
• Locally Install a Single Endpoint Agent
You can use standard MSI command line options like /q for silent installs, and the /l
for creating installation log file. For a list of standard MSI options, see http://
support.microsoft.com/kb/314881.
• SAFEMODE=1
Specifies if you want the installer to check for incompatible McAfee driver
version. If an incompatible McAfee driver version is found, then installation is
aborted.
For example,
msiexec /i "Endpoint_Agent.msi" SERVER=myepc.mydomain.com
JOIN_PARAMS=Default;335f253c-7982-4309-9307-21afab8fdbb2;14b4e0
e22040fa7927af716381f440379faf92b7;2TgKU/
2EypmqdODeC2KA9inHkuwFDsbnfdKYM8SvcfA=
Note: The following example is one of the way to deploy Endpoint agents
across the enterprise.
• Generate the Agent Authorization Key. For more information, see the RSA DLP
Endpoint User Guide or Enterprise Manager online help.
• Generate the Endpoint agent installer. For more information, see the RSA DLP
Endpoint User Guide or Enterprise Manager online help.
• You must be familiar with Active Directory and Microsoft Group Policy. For more
information, see the Microsoft documentation.
• You must launch cmd.exe as an administrator or disable UAC to execute the
installer from the command line.
subst x: /D
Where,
• \\computername\PathToAgentMSI is the UNC path to the agent
installer
• SERVER is the hostname or IP address of the Root Endpoint Coordinator.
• Generate the Agent Authorization Key. For more information, see the RSA DLP
Endpoint User Guide or Enterprise Manager online help.
• Generate the Endpoint agent installer. For more information, see the RSA DLP
Endpoint User Guide or Enterprise Manager online help.
4. Accept the default installation directory shown, or click Change and navigate to
the directory where you want the agent to be installed.
5. Click Next.
The Root Endpoint Coordinator Configuration screen appears.
6. Do the following:
a. Enter the FQDN, Hostname, or IP address of the Root Endpoint Coordinator.
b. Enter the Agent Authorization Key.
The Authorization key can be generated using the Enterprise Manager
console. For more information, see the RSA DLP Endpoint User Guide or
Enterprise Manager online help.
c. Click Next.
The Ready to Install the Application screen appears.
7. Click Install to begin installing the agent.
During the installation, the Installing RSA DLP Endpoint Agent screen displays
progress. When installation completes, the Successful Installation screen appears.
8. Click Finish to close the Installation Wizard.
Note: The following example is one of the way to deploy Endpoint agents
across the enterprise.
• You must be familiar with Active Directory and Microsoft Group Policy. For more
information, see the Microsoft documentation.
• You must launch cmd.exe as an administrator or disable UAC to execute the
installer from the command line.
1. Select Administrative Tools > Active Directory Users and Computers from the
Control Panel. The Active Directory Users and Computers window appears.
2. In the console tree, locate and right-click the Active Directory container that
contains the computers on which you have deployed the agent, then click
Properties. The Properties dialog for that container appears.
3. Select the Group Policy tab, then select the GPO you created for deployment.
Click Edit.
4. Select Software Settings > Software Installation. The Group Policy window
appears.
5. In the right pane of the Group Policy window, right-click the agent installation
program, select All Tasks, and then click Remove.
6. Select Immediately uninstall the software from users and computers, then
click OK.
This appendix describes the messages that an end-user may receive when an Endpoint
agent is active on the user’s computer.
The DLP Endpoint agent communicates with end-users by presenting messages, and
in some cases asking for text input.
Topics:
• About DLP Endpoint Agent User Interface
• Notification Dialogs
• Customizing Endpoint Agent Notifications
Note: If sensitive content has been detected in a file, print, and CD user
actions on all files opened by the same application during the same
application session, are subject to policy enforcement. That is, if an Excel file
containing sensitive content is open on an end-user’s desktop, and the user
attempts to print non-sensitive data from a different Excel file; that action, if a
violation of policy, may be blocked, or otherwise limited. To print the
non-sensitive data, the user must close all files and restart the application.
Notification Dialogs
The DLP Endpoint displays messages on the screen of the computer on which a policy
violation has taken place. The following are the supported notification dialogs:
• Notification Dialogs for File Operations
• Notification Dialogs for Clipboard Operations
The end-user acknowledges and dismisses the dialog box by clicking Close.
If the end-user believes that the blocking action is interfering with a valid business
case, the end-user can click Request Help... to request a temporary override to
Endpoint policies. The IT or security specialist analyzes the request and if there is
a valid reason for the override, generates a single-use password and sends it to the
end-user. The type of override is determined by the IT or security specialist
depending on the nature of the request. This password is then communicated to
the end-user, who can then proceed. If the override was to disable Endpoint,
monitoring will be stopped; if it was a policy override, the end-user must still
justify the action that had previously been blocked, ensuring that the action and
the reason for it is audited. See the RSA DLP Endpoint User Guide or the
Enterprise Manager online help for more details about requesting DLP Endpoint
Overrides and Management Tool settings.
Note: The Request Help... button is grayed out and inactive if contact
information is not set for the Endpoint Group to which this machine
belongs.
Click the information icon ( ) in the upper right corner to go to a URL defined
by your DLP administrator to find out more information about corporate policy.
• Justify and Audit. This dialog box notifies the end-user that the attempted action
violates policy and requires the end-user to enter a justification for the action
before continuing.
Click the information icon ( ) in the upper right corner to go to a URL defined
by your DLP administrator to find out more information about corporate policy.
• Notify and Audit. This dialog box notifies the end-user that the attempted action
may violate policy.
• Block and Audit. This dialog box informs the end-user that the text can only be
pasted within the virtual host.
The end-user acknowledges and dismisses the dialog box by clicking Close.
If the end-user believes that the blocking action is interfering with a valid business
case, the end-user can click Request Help... to request a temporary override to
Endpoint policies. The IT or security specialist analyzes the request and if there is
a valid reason for the override, generates a single-use password and sends it to the
end-user. The type of override is determined by the IT or security specialist
depending on the nature of the request. This password is then communicated to
the end-user, who can then proceed. If the override was to disable Endpoint,
monitoring will be stopped; if it was a policy override, the end-user must still
justify the action that had previously been blocked, ensuring that the action and
the reason for it is audited. See the RSA DLP Endpoint User Guide or the
Enterprise Manager online help for more details about requesting DLP Endpoint
Overrides and Management Tool settings.
Note: The Request Help... button is grayed out and inactive if contact
information is not set for the Endpoint Group to which this machine
belongs.
Click the information icon ( ) in the upper right corner to go to a URL defined
by your DLP administrator to find out more information about corporate policy.
• Justify and Audit. This dialog box notifies the end-user that the attempted action
violates policy and requires the end-user to enter a justification for the action
before continuing.
Click the information icon ( ) in the upper right corner to go to a URL defined
by your DLP administrator to find out more information about corporate policy.
• Notify and Audit. This dialog box notifies the end-user that the attempted action
violates policy and is given the option to cancel the action.
For example, if the you intend to copy the sensitive text within the virtual desktop,
select Do not prompt me again until next login and click No. For all subsequent
copy operations, the Notify message will not be displayed.
For more information, see the RSA DLP Endpoint User Guide, or the Enterprise
Manager online help.
DLP Endpoint administrators can also customize the appearance of the notification
dialogs to adhere to their own corporate branding by using their own color scheme,
corporate logos, and so on.
To change the background image for the DLP Endpoint notification dialogs:
1. Create a new background image that contains the images/color schemes you want
to use.
– Make sure your new image has the exact same dimensions as the original.
Default filenames and dimensions are:
Filename Resolution
– Make sure there is enough space/plain background color to display the DLP
content/message in the center of the image.
Refer to the default DLP Endpoint messages for comparisons. For example:
Corporate Policy Analysis
277 px
Message body
Footer
500 px
RSA Data Loss Prevention is highly scalable and configurable. You can deploy DLP
starting with all components on separate, geographically distributed machines, in a
production setup, to nearly all components integrated onto a single machine in a test
setup.
This appendix describes sample deployment scenarios supported by the RSA DLP.
Topics:
• Full Enterprise Deployment
• DLP Datacenter and DLP Network
• DLP Datacenter and DLP Endpoint
• DLP Network and DLP Endpoint
• DLP Network Only
• DLP Datacenter Only
• DLP Endpoint Only
Enterprise Manager
Database
Sensor
Interceptor
Data Repository Data Repository
ICAP Server
Note: You can install both the Datacenter and Endpoint agents on the same
end-user machine.
• Enterprise Coordinator
• Root Endpoint Coordinator
• Sensor
• Interceptor
• ICAP Server
Enterprise Manager
Database
Network Controller Enterprise Coordinator
Site 1 Site n
Site Coordinator Site Coordinator
Sensor
Interceptor
Data Repository Data Repository
ICAP Server
The Site Coordinators are installed on separate machines local to each site, and
Network managed devices are on separate appliances.
Enterprise Manager
Database
Enterprise Coordinator Root Endpoint Coordinator
Data Repository Data Repository
The Site Coordinators and Endpoint Coordinators are installed on separate machines
local to each site. Discovery agents and Endpoint agents can be installed on the same
end-user machines.
Enterprise Manager
Database
Network Controller Root Endpoint Coordinator
Site 1 Site n
Sensor
Endpoint Coordinator Endpoint Coordinator
Interceptor
ICAP Server
In a test deployment, the Enterprise Manager and Root Endpoint Coordinator can be
deployed on the same machines.
The Endpoint Coordinators are installed on separate machines local to each site, and
Endpoint agents installed on end-user machines.
Enterprise Manager
Database
Network Controller
Sensor
Interceptor
ICAP Server
Enterprise Manager
Database
Enterprise Coordinator
Site 1 Site n
Site Coordinator Site Coordinator
Data Repository Data Repository
The Site Coordinators are installed on separate machines local to each site.
Enterprise Manager
Database
Root Endpoint Coordinator
Site 1 Site n
Endpoint Coordinator Endpoint Coordinator
In a test deployment, the Enterprise Manager and Root Endpoint Coordinator can be
deployed on the same machines.
The Endpoint Coordinators are installed on separate machines local to each site, and
Endpoint agents installed on end-user machines.
Index
A Endpoint Coordinator
attribute rules 15 adding 56
installation prerequisites 48
C installation procedure 48
content analysis 14 overview 47
copy actions 15 Root 55
customer support 9 uninstalling 56
Endpoint Coordinatorr
D installing from a command line 51
desktop management software 61 installing using the wizard 49
DLP deployment Endpoint messages. See agent messages
Datacenter and Endpoint 80 Enterprise Manager
Datacenter and Network 79 installation 29
Datacenter only 83 installation procedure 34
Endpoint only 84 installing from a command line 39
enterprise deployment 78 installing remotely with RDP 43
Network and Endpoint 81 installing using the wizard 34
Network only 82 run-as user requirements 30
DLP deployment configurations 77 setting up SQL Server 32
DLP Endpoint system requirements
components 12 SQL Server client tools 33
deployment flow 27 uninstalling 44
installation 59 verifying the installation 43
introduction 11 Windows Service 43
E F
Endpoint file attributes 15
agent notifications 67
agent user interface 67 I
preparing for deployment 17 installation
Endpoint agent Endpoint agents 60
working 13 of an Endpoint agent 60
Endpoint agent messages 67 of Endpoint Coordinator 48
block 68, 71 of Enterprise Manager 34
customizing 74 system requirements 59
justify 69, 72 installation of Endpoint Coordinator
notify 70, 73 from a command line 51
Endpoint Cooordinato uninstalling 56
verifying the installation 54 using the wizard 49
Index 85
RSA DLP 9.6 Endpoint Deployment Guide
M
Manager 34
messages 67
move actions 15
P
policy actions
audit 15
block 15, 68, 71
justify 15, 69, 72
notify 15, 70, 73
R
Root Endpoint Coordinator
initialization 55
RSA DLP Enterprise Manager service 43
S
save as actions 15
setting up SQL Server 32
SQL Server client tools 33
system requirements 17, 59
Endpoint agent 21
Endpoint agent deployment 26
Endpoint Coordinator 19
port usage 23
T
technical support 9
third-party integration 26
U
uninstallation
of Endpoint Coordinator 56
86 Index