Cisco Cisco Web Security Appliance S170 ユーザーガイド

ページ / 450
 
16-11
AsyncOS 9.1 for Cisco Web Security Appliances User Guide
 
Chapter 16      Prevent Loss of Sensitive Data
  Controlling Upload Requests Using External DLP Policies
Step 3
(Optional) You can add another DLP server by clicking Add Row and entering the DLP Server 
information in the new fields provided.
Step 4
Submit and Commit Changes.
Controlling Upload Requests Using External DLP Policies
Once the Web Proxy receives the upload request headers, it has the information necessary to decide if 
the request should go to the external DLP system for scanning. The DLP system scans the request and 
returns a verdict to the Web Proxy, either block or monitor (evaluate the request against the Access 
Policies). 
Step 1
Choose Web Security Manager > External Data Loss Prevention.
Step 2
Click the link under the Destinations column for the policy group you want to configure.
Step 3
Under the Edit Destination Settings section, choose “Define Destinations Scanning Custom Settings.”
Step 4
In the Destination to scan section, choose one of the following options:
Do not scan any uploads. No upload requests are sent to the configured DLP system(s) for 
scanning. All upload requests are evaluated against the Access Policies.
Scan all uploads. All upload requests are sent to the configured DLP system(s) for scanning. The 
upload request is blocked or evaluated against the Access Policies depending on the DLP system 
scanning verdict.
Scan uploads to specified custom URL categories only. Upload requests that fall in specific 
custom URL categories are sent to the configured DLP system for scanning. The upload request is 
blocked or evaluated against the Access Policies depending on the DLP system scanning verdict. 
Click Edit custom categories list to select the URL categories to scan.
Step 5
Submit and Commit Changes.
Maximum 
Simultaneous 
Connections
Specifies the maximum number of simultaneous ICAP request connections 
from the Web Security appliance to each configured external DLP server. The 
Failure Handling setting on this page applies to any request which exceeds this 
limit.
Default is 25.
Failure Handling
Choose whether upload requests are blocked or allowed (passed to Access 
Policies for evaluation) when the DLP server fails to provide a timely response.
Default is allow (“Permit all data transfers to proceed without scanning”).
Trusted Root 
Certificate
Browse to and select the trusted-root certificate for the certificate(s) provided 
with the External DLP Servers, and then click Upload File. See 
 for additional information.
Invalid Certificate 
Options
Specify how various invalid certificates are handled: Drop or Monitor.
Server Certificates
This section displays all DLP server certificates currently available on 
the appliance.
Setting
Description