One of the biggest fears you’ll likely have is the thought of your sensitive data leaving the network. Thankfully, FortiMail has data leak prevention (DLP).
This recipe guides you through the process of enabling DLP, defining sensitive data, and then configuring DLP rules and profiles.
config system global
set data-loss prevention enable
end
Defining the Sensitive Data |
|
We will need to configure manual document fingerprints. Document fingerprinting relies on you providing a characteristic of a file that you want to detect. The FortiMail unit generates a checksum fingerprint and stores it. The unit generates a fingerprint for all email attachments and compares them to all the fingerprints stored in the database. To configure manual document fingerprints:
You can also configure a fingerprint document source
|
|
Configuring DLP Rules |
|
Now we’ll configure DLP rules. We’ll essentially be telling the unit what to look for when emails. For example, we could scan for sensitive data in email bodies and attachments. To configure DLP rules
|
|
Configuring DLP Profiles |
|
After you configure the scan rules/conditions you can add them to DLP profiles. The profile specifies the action to take. To configure a DLP profile
|
|
Implementing into a Policy |
|
With the profile created, the last thing you`ll need to do is implement the profile into a new or existing policy. The steps are the same, regardless of what type of policy you implement your profile, but for these steps we will use Recipient policies as an example. To implement your profile
|
|
The post Preventing Data Loss in FortiMail appeared first on Fortinet Cookbook.