All Products
Search
Document Center

Secure Access Service Edge:Manage peripherals to ensure data security

Last Updated:Nov 06, 2024

If a user transfers sensitive files outbound by using peripherals such as USB flash drives and Bluetooth at work, major business loss may occur. To prevent such issues, you can use the data loss prevention (DLP) feature of Secure Access Service Edge (SASE). This feature allows you to manage peripherals, monitor outbound transfers of sensitive files in real time, and monitor data leaks. This topic describes how to configure peripheral control policies, view the results of sensitive behavior detection, and configure the user-specific peripheral whitelist.

Supported peripherals

Operating system

Supported peripheral and device port

Description

Windows

  • Supported peripherals: USB flash drives, USB storage devices, printers, portable devices, card readers, and optical drives

  • Supported device port: Bluetooth

The following options are available for USB flash drives and USB storage devices: Disable Use, Read/Write, and Read-only. The following option is available for peripherals other than USB flash drives and USB storage devices: Disable Use. If you select Disable Use for a peripheral or device port, users cannot use the peripheral or device port to transmit data.

If you set USB Flash Drive and USB Storage to Read/Write, sensitive behavior detection is triggered when a user transfers internal files by using a USB flash drive or USB storage device.

macOS

  • Supported peripherals: USB flash drives and USB storage devices

  • Supported device ports: Bluetooth and AirDrop

Prerequisites

Configure a peripheral control policy

  1. Log on to the SASE console.

  2. In the left-side navigation pane, choose Data Loss Prevention > Peripheral Management.

  3. On the Peripheral Management page, click Create Policy.

  4. In the Create Policy panel, configure parameters. The following table describes the parameters.

    Parameter

    Description

    Policy Name

    The name of the policy.

    The name must be 2 to 32 characters in length and can contain letters, digits, hyphens (-), and underscores (_).

    Policy Description

    The description of the policy.

    Status

    The status of the policy. You can turn on or turn off the switch to enable or disable the policy.

    The policy takes effect only if the switch is turned on.

    Priority

    The priority of the policy.

    Valid values: 1 to 10. A smaller value indicates a higher priority.

    Applicable User

    The users or user groups to which the policy is applied.

    Windows

    • Valid values for Peripheral: USB Flash Drive and USB Storage, Printer, Portable Device, Card Reader, and Optical Drive.

    • Valid value for Device Port: Bluetooth.

    The following options are available for USB flash drives and USB storage devices: Disable Use, Read/Write, and Read-only. The following option is available for peripherals other than USB flash drives and USB storage devices: Disable Use. If you select Disable Use for a peripheral or device port, users cannot use the peripheral or device port to transmit data.

    macOS

    • Valid value for Peripheral: USB Flash Drive and USB Storage.

    • Valid values for Device Port: Bluetooth and AirDrop.

    The following options are available for USB flash drives and USB storage devices: Disable Use, Read/Write, and Read-only. The following option is available for peripherals other than USB flash drives and USB storage devices: Disable Use. If you select Disable Use for a peripheral or device port, users cannot use the peripheral or device port to transmit data.

    Approval Process Configuration

    Specify whether users can submit an application for approval when the users want to use an at-risk peripheral.

    If you select Users can submit an application for approval, you must select an appropriate approval workflow. For more information, see Create an approval workflow.

    Prompt Display Configuration

    Configure the prompt message that appears in the dialog box when users want to use an at-risk peripheral. You can specify a message in Chinese or English.

  5. Click OK.

    After the policy is created, the policy is displayed in the policy list. DLP manages peripherals based on the policy.

View the results of sensitive behavior detection

If you set USB Flash Drive and USB Storage to Read/Write, sensitive behavior detection is triggered when a user transfers internal files by using a USB flash drive or USB storage device. Then, DLP analyzes data in the last 30 days, 7 days, or 24 hours based on the detection results.

  1. In the left-side navigation pane, choose Data Loss Prevention > Sensitive Behavior Detection.

  2. On the Sensitive Behavior Detection page, view the statistics about outbound transfers of sensitive files that are performed by using USB flash drives or USB storage devices within the specified period of time.

  3. In the lower part of the page, view the list of users who performed outbound transfers of sensitive files. Then, find a user and click Details in the Actions column to view more information.

  4. Find a file and click Details in the Actions column to view more information about the file. The information includes Sensitive Message, Hit Policy, Office Terminal, and Outbound Transfer Channel.

Configure the peripheral whitelist

If you do not want SASE to audit or manage the outbound transfers for users within your enterprise, you can configure the peripheral whitelist in DLP to allow the operations.

  1. On the Peripheral Management page, click Peripheral Whitelist.

  2. On the Whitelist tab, add users to the whitelist based on your business requirements.

    image.png

  3. Click Submit.

Change the priority of a policy

If you want to change the priority of a peripheral control policy, click the 编辑 icon and enter a different priority value. Valid values: 1 to 10. A smaller value indicates a higher priority.

image.png

Disable a policy

If you do not require a peripheral control policy, you can find the policy and turn off the switch in the Policy Status column to disable the policy. After the policy is disabled, the policy is retained. You can turn on the switch in the Policy Status column to enable the policy again.

Delete a policy

If you no longer require a peripheral control policy, you can find the policy and click Delete in the Actions column.

Important

After a policy is deleted, it cannot be restored. Proceed with caution.

References