Option | Description |
Containing.. | the predefined settings for this filter are: • Credit Card numbers - The number formats used by American Express, Visa, and Mastercard credit cards are detected. • Social Security Numbers. |
Regular Expression | Network traffic is examined for the pattern described by the regular expression. |
Encrypted | This filter is triggered by encrypted files. |
File Size | Enter a file size in kilobytes. Files larger than the specified size are treated according to the selected action. |
File Type | Select a file filter list that includes the file patterns and file types the network traffic will be examined for. Files matching the types or patterns in the selected list are treated according to the selected action. To create a file filter list, see “Creating a file filter list”. |
File Finger Print | A fingerprint filter checks files in traffic against those in the FortiGate unit document fingerprint database. A match triggers the configured action. You must configure a document source or uploaded documents to the FortiGate unit for fingerprint scanning to work. For more information about document fingerprinting, see “Fingerprint”. |
Watermark Sensitivity | If you are using watermarking on your files you can use this filter to check for watermarks that correspond to sensitivity categories that you have set up. The Corporate Identifier is to make sure that you are only blocking watermarks that your company has place on the files, not watermarks with the same name by other companies. |
Services | Configure the filter to examine the traffic over the selected services. This setting gives you a tool to optimized the resources of the FortiGate unit by only using processing cycles on the relevant traffic. Just check the boxes associated with the service / protocol that you want to have checked for filter triggers. |
Action | Description |
None | No action is taken if filter even if filter is triggered |
Log Only | The FortiGate unit will take no action on network traffic matching a rule with this action. The filter match is logged, however. Other matching filters in the same sensor may still operate on matching traffic. |
Block | Traffic matching a filter with the block action will not be delivered. The matching message or download is replaced with the data leak prevention replacement message. |
Quarantine User | If the user is authenticated, this action blocks all traffic to or from the user using the protocol that triggered the rule and adds the user to the Banned User list. If the user is not authenticated, this action blocks all traffic of the protocol that triggered the rule from the user’s IP address. If the banned user is using HTTP, FTP, or NNTP (or HTTPS if the FortiGate unit supports SSL content scanning and inspection) the FortiGate unit displays the “Banned by data leak prevention” replacement message. If the user is using IM, the IM and P2P “Banned by data leak prevention” message replaces the banned IM message and this message is forwarded to the recipient. If the user is using IMAP, POP3, or SMTP (or IMAPS, POP3S, SMTPS if your FortiGate unit supports SSL content scanning and inspection) the Mail “Banned by data leak prevention” message replaces the banned email message and this message is forwarded to the recipient. These replacement messages also replace all subsequent communication attempts until the user is removed from the banned user list. If this action is chosen the additional field for [ ] minutes will appear so that a time limit can be set for the duration of the quarantine. This field cannot be left blank. |
Quarantine IP Address | This action blocks access for any IP address that sends traffic matching a filter with this action. The IP address is added to the Banned User list. The FortiGate unit displays the “NAC Quarantine DLP Message” replacement message for all connection attempts from this IP address until the IP address is removed from the banned user list. If this action is chosen the additional field for [ ] minutes will appear so that a time limit can be set for the duration of the quarantine. This field cannot be left blank. |
Quarantine Interface | This action blocks access to the network for all users connecting to the interface that received traffic matching a filter with this action. The FortiGate unit displays the “NAC Quarantine DLP Message” replacement message for all connection attempts to the interface until the interface is removed from the banned user list. If this action is chosen the additional field for [ ] minutes will appear so that a time limit can be set for the duration of the quarantine. This field cannot be left blank. |
If you have configured DLP to block IP addresses and if the FortiGate unit receives sessions that have passed through a NAT device, all traffic from that NAT device — not just traffic from individual users — could be blocked. You can avoid this problem by implementing authentication. |
To view or modify the replacement message text, go to System > Config > Replacement Message. |