Exercise 1 – Configure a PCI Message Quarantine folder in the

1523 - Protecting Email with DLP and Encryption
Hands-On Lab
Description
At the end of this lab,
you should be able to
Notes
Email is at once a critical staple of modern business communication and
one of the most popular targets for cybercriminals. In this lab you
perform key configuration steps integrating Symantec Messaging
Gateway with Symantec Data Loss Prevention and Symantec encryption
solutions. You will see first-hand how Symantec provides easy,
centralized management of data loss incidents and email quarantine
and you will take away a working knowledge of how to protect your
sensitive information using policy-based encryption.

Understand the threat vector that email represents

Learn how messages containing malicious URLs can be detected
and blocked

Discuss the flexible policy system in Symantec Messaging
Gateway

Understand Policy-Based Encryption and Content Controls

Define how Symantec Data Loss Prevent and Symantec
Messaging Gateway interoperate

A brief presentation will introduce this lab session and
discuss key concepts.

The lab will be directed and provide you with step-by-step
walkthroughs of key features.

Feel free to follow the lab using the instructions on the
following pages. You can optionally perform this lab at
your own pace.

Be sure to ask your instructor any questions you may
have.

Thank you for coming to our lab session.
Introduction to the Environment
Throughout this laboratory exercise, you will use the Endpoint-7 client workstation. At power
up, the Endpoint-7 workstation will automatically login to the desktop session. Should you need
to login manually, use these credentials:



Username:
Password:
Domain:
joe
Symc4now!
ACME
Your lab steps will involve using the Thunderbird Email Client and web-based administrative
consoles. The following graphic should help you understand how written navigation instructions
translate to your actions.
Your messaging environment is configured to simulate both inbound and outbound messaging
traffic. The internal domain, acme.com, can send messages to two “outside” domains
(anothercompany.com and trustedpartner.net). These domains are not real and they are hosted
all within the virtual infrastructure. This allows you to simulate a large range of messaging
scenarios without any external dependencies.
2 of 12
Figure 1: Message flow
Exercise 1 – Configure a PCI Message Quarantine folder
in the Messaging Gateway
The Symantec Messaging Gateway can withhold messages from delivery in message
quarantines. This feature is useful when suspect content may need to be retained, assessed and
dispatched. Multiple quarantine folders can be configured and each supports unique access and
retention policies. The goal of this exercise is to setup a dedicated quarantine folder in the
Messaging Gateway to contain messages that contain sensitive credit card data.
1. Start Internet Explorer and open a tab to https://smg.acme.com
2. Login to the SMG Control Center using the credentials
a. Username:
admin
b. Password:
Symc4now!
3. Navigate to Content > Settings > Content Incident Folders
4. In the Content Incident Folders workspace, click the Add button
5. In the Content Incident folder name textbox, type PCI Quarantine
6. In the Content Incident folder type dropdown, select Hold for Review (Content
Quarantine)
7. In the Expunger settings, check the box Days to store before default action occurs to
enable automatic quarantine purge
8. Click the Save button
3 of 12
Exercise 2 – Configure a DLP response policy in the
Messaging Gateway
In this exercise, you will prepare a special processing rule (or policy) in the Messaging Gateway
to move messages that have been flagged by Symantec Data Loss Prevention into the
quarantine folder that you created in the first exercise. The flag will be an SMTP message header
in the format of “X-DLP-Quarantine: PCI”.
Procedure:
1.
2.
3.
4.
Continuing in Control Center, open Content > Policies > Email
Check the box next to Symantec Data Loss Prevention – Quarantine
Click the Copy button; a policy editor dialog will open
Rename the policy to Symantec Data Loss Prevention – PCI
Quarantine
5. In the Conditions area, click the Add button to add a new condition
6. The Content Filtering Policy Condition dialog will open
a. Check the box for Text in this specific part of the message
b. In the adjoining dropdown, select Message Header
c. In the Header Name textbox, type X-DLP-Quarantine
d. Check the box for Contains
e. Enter 1 in the textbox adjacent to or more occurences of
f. Type PCI in the text box
7. Click the Add Condition button
4 of 12
8. In the Actions work area, check the box next to the action Create quarantine incident in
“Quarantine Incidents” folder
9. Click the Edit button just above
A popup dialog for Configure An Action will open
10. In the quarantine incident folder drop down, select PCI Quarantine
11. Click Update Action and the popup dialog will close
A policy consistents of conditions, actions and policy groups. Policy groups control the scope
of a policy based on sender or recipient email addresses. Policy groups can be associated
with LDAP groups so that your policy applicability can be managed at the directory level. In
order for a policy to be effective, it must be enabled and be assigned to at least one policy
group.
12. In the Policy Groups section, check the box next to default
13. Click the Save button at the bottom of the policy editor
Content policies are executed in the order they are listed. You may have noticed that the
policy you copied, Symantec Data Loss Prevention – Quarantine, used less specific criteria
and is listed first which means the policy would apply in all the same cases as the PCI
Quarantine policy. Therefore the new PCI quarantine policy will not work as intended until
you change the policy ordering.
14. Click-and-drag the new policy to the top of the policy list
Exercise 3 – Enable DLP integration in the Messaging
Gateway
In this exercise, you will configure the Messaging Gateway to deliver all outbound messages to
the Network Prevent for E-mail detection server deployed in the Symantec DLP installation. The
Network Prevent for E-mail service acts as an SMTP message transfer agent (MTA) receiving
email messages, processing those messages against DLP policies, rendering a verdict and
delivering message to the next MTA.
Procedure:
1.
2.
3.
4.
5.
6.
7.
8.
9.
Continuing in the Content workspace of Control Center, open Settings > DLP Connect
Check the box Enable DLP for the outbound Scanner host
In the Route Outbound Mail to DLP Servers pane, click the Add button
A new line in the DLP servers table will be created. Enter the following values:
a. Host or IP Address: 192.168.127.10
b. Port: 10025
c. MX Lookup: Unchecked
d. Preference: 1
In the Accept Scanned Mail from DLP Server pane, click the Add button
A new link in the DLP servers table will be created; enter 192.168.127.10
While still in the Connection Settings pane, click the Enforce Server Access tab
Check the box Enable connection with Enforce Server
Enter the following settings
a. Registered Enforce administration console host or IP address:
enforce.acme.com
5 of 12
b. Username: Administrator
c. Password: Symc4now!
d. Maximum number of incidents for status update: 5000
e. Synchronize with Enforce server every (minutes): 5
10. Click the Save button
Exercise 4 – Review Network Prevent for E-mail Settings
To save time, the DLP email detection server has been preconfigured for you. Review the
configuration settings before proceeding to the next exercise.
Procedure:
1. Start a new tab in Internet Explorer and open the Symantec Data Loss Prevention
Console at https://enforce.acme.com
2. Login to DLP using the username Administrator (password Symc4now!)
a. Note: The username in DLP is case sensitive! Use a capital A when typing
Administrator
3. Within the DLP console, navigate to Systems > Servers > Overview
4. Click the link for the Local Detection Server
The operational details pane for the Local Detection Server will open. In the DLP
architecture, software agents can be distributed and scaled throughout the enterprise. Each
of these agents performs policy inspection upon data according to the context (aka
channel). For example, this detection server is an inline SMTP inspector.
5. Click the Configure button
Examine the general setting available in Network Prevent for E-mail. One of the key settings
is the next hop configuration. Reflect mode is enabled in this configuration. In reflect mode,
as the messaging gateway sends a message into the DLP service a simultaneous return
connection is established back to the messaging gateway. In forward mode, messages are
inspected by DLP and then passed onto the next, defined MTA.
6. Click the Cancel button
7. Click the Server Settings button
In the server settings window, scroll to the bottom and examine the “RequestProcessor”
settings. In particular take note of the RequestProcessor.ServerSocketPort and how it
correlates to the DLP Connect settings you entered in the prior exercise. Why did we use
10025? In this case, it’s because of the lab setting where the same DLP host is also the
regular groupware (mail) server.
8. Return to the top of the page and click the Cancel button
6 of 12
Exercise 5 – Create a DLP Response Rule
When a policy in DLP is violated, the administrator-configured response rule determines what
actions are taken. The type actions available vary according to the channel (context) that the
violation occurs. For example, on an endpoint a clipboard copy operation may be blocked in real
time. For email messages, there are two basic actions: block the message or modify the
message. In this case, we’ll modify the message adding headers and then allow the messaging
gateway to respond based on headers.
Procedure:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
Continuing in the DLP Console, navigate to Manage > Policies > Response Rules
Click the Add Response Rule button to start the response rule wizard
Use the default response rule type, Automated Response, and click the Next button
Name the response rule Network: Quarantine Email in PCI Container
Click the Add Condition button
Use the dropdowns to build the condition
 Protocol or Endpoint Monitor
 is any of
 SMTP
In the Actions pane, click the drop down and select Modify SMTP Message
Click the Add Action button and the Network Prevent: Modify SMTP Message settings
pane will be added
In the Headers section, enter X-DLP-Quarantine in the Header 1 Name textbox
In the Headers section, enter PCI in the Header 1 Value textbox
Check the box at the bottom labeled Enable Email Quarantine Connect
This last option automatically adds two headers when a policy violation occurs:
 X-dlp-policyid
 X-dlp-uniquemsgid
Within Symantec Messaging Gateway, the built-in rule Symantec Data Loss Prevention is
triggered by the presence of these headers.
12. Click the Save button located towards the top of the page
Exercise 6 – Modify the Symantec DLP Credit Card
policy
A Credit Card policy has already been configured in DLP. This policy will be violated when
content contains credit card numbers. As configured, the credit card policy applies to all
contexts including email but there are no response rules that trigger actions.
Add the new response rule to an existing DLP policy and test out your changes.
Procedure:
1.
2.
3.
4.
Continuing in the DLP Console, navigate to Manage > Policies > Policy List
Click the Credit Card Data policy link to enter edit mode
Click the Response tab in the policy editor
In the Response dropdown box, select the rule Network: Quarantine Email in PCI
Container
7 of 12
5. Click the Add Response Rule button
6. Click the Save button at the top of the dialog
Test the DLP flow and configuration
7. Open the Thunderbird Email Client (
)
8. In the Templates folder of Joe’s mailbox, double-click the message titled How Much
This message contains an attachment with Names and Credit Card numbers and represents
a type of message that is a policy violation
9. Click the Send button
10. Wait about 60 seconds for actions to complete
Exercise 7 – Incident Response
At this point, the message has been processed by Symantec DLP and a policy violation has been
detected. The assigned Response Rule has added message headers and passed the email back to
the Symantec Messaging Gateway. The Content policy configured on the messaging gateway has
quarantined the message. Neither the sender nor the recipient is aware of these actions to this
point. What happens next?





An incident responder can see the violation in the DLP console
An SMG administrator can see that a message has been quarantined in the Message
Audit Log
With appropriate permissions, it also possible to see the quarantine message in the
SMG Control Center
In 7 days, if no action occurs, the message will be deleted from the quarantine with no
notification
All of these behaviors are configurable based on roles, alerting and other system
settings
In this exercise, you will act as an incident responder and process the scenario in the DLP
console. However, first take a few moments to research the situation using the SMG Control
Center.
Procedure:
1. Return to the SMG Control Center in Internet Explorer
2. Navigate to Status > SMTP > Message Audit Logs
3. In the filter pane, enter a single period (.) in the Mandatory Filter Value textbox
The period represents a universal pattern match.
4. Click the Display Filtered button
5. Click on the message to see more details
6. Navigate to Content > QUARANTINE FOLDERS > PCI Quarantine
You will see each of the quarantine messages. If the messages are missing, check the regular
Quarantine Incidents folder… you may have missed the last step of Exercise 2.
8 of 12
7. Proceed as an incident responder and return to the DLP Console, navigate to Incidents >
Network
The incident corresponding to the email you just sent should appear in the incident list.
8. Click on the How Much incident
Take note of some of the incident features that are critical to a responder
a. In the left pane, you will see that the incident was created by a violation of the
Credit Card Data policy with 40 data points matched
b. The high number of data matches has triggered a High rating on the incident.
The severity rules are established in the policy definition
c. Continuing though the incident details, sender, recipient and additional
message details are listed
d. The incident details include the original message
e. In the center column, sample data matches are listed
f. In the right column, the instigator is correlated to organizational data derived
from Active Directory
9. At the top of the incident, click Reject Email button
This action activates a FlexResponse process dialog
10. There are no selections to make, click the OK button
11. Return to Thunderbird Email Client
12. Refresh Joe’s Inbox
Joe should receive an email entitle Email Policy Violation. This notification is configured in
the SMG Content policy.
Trace back the notification settings in the SMG Control Center and then review how
notifications are configured.
13. First navigate to Content > Policies > Email and open the policy Symantec Data Loss
Prevention – PCI Quarantine
Review the set of Reject actions including send email notification. Message notifications are
configurable and localizable.
14. Navigate to Content > Resources > Notifications
15. Click the Email Policy Violation item
Exercise 8 – Policy-Based Encryption
In the previous exercises, we focused on preventing data loss and creating the architectural
relationship between Symantec Messaging Gateway and Symantec DLP. Equally important are
features to protect legitimate emails that may contain sensitive information.
As you may be aware, the transmissions between Message Transfer Agents are not typically
encrypted. The ESMTP protocol supports TLS encryption between MTA in a manner very similar
to HTTPS connections that you use when you require a secure browser session. When this
feature is enabled and enforced, we refer to it as boundary encryption. Boundary encryption
prevents unintended access while messages transit the network but provides no message
privacy or integrity in the groupware system.
9 of 12
When message integrity and privacy from sender to recipient are required, message (content)
encryption is employed. Message encryption is typically used in select scenarios rather than
universally applying encryption to every message. Thus we typically refer to message encryption
as policy-based encryption.
SMG contains built-in support for content encryption using Symantec .Cloud services. Of course,
SMG supports encryption through other gateway services including the Symantec Encryption
Management Server. In this exercise you will create FlexResponse scenarios with DLP to require
message encryption using a gateway service.
Procedure:
1. Using Internet Explorer, open https://keys.acme.com:9000
2. Login with the following credentials
a. Username: admin
b. Password: Symc4now!
3. Navigate to Mail > Mail Policy
4. Open the Outbound policy chain
5. Click on the last rule SWEP based on DLP Policies
Review the criteria for encryption
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
Switch the SMG Control Center
Navigate to Content > Policies > Email
Click to open the policy Symantec Data Loss Prevention – Quarantine
In the Actions pane, select and delete the actions listed in Message Review Custom
Actions section
In the same section, Message Review Custom Actions, click the Add Custom Action
button
A popup will dialog will open, choose the action Add a header
The dialog will adapt to your selection, enter the following values in the appropriate text
boxes
a. Header: X-Encrypt
b. Value: Yes
Click the button Add Custom Action
Using the same process, add the following action:
a. Action: Route the message
b. Host: keys.acme.com
c. Port: 25
d. Use MX Lookup: Unchecked
Using the same process, add the following action:
a. Action: Send notification
b. Notifications: Encrypted Email Delivery
Click the Save button
Wait for the save action to complete and then use the Thunderbird Email Client, send
the message titled Customer Data from Joe’s templates folder
Wait about 30 second, switch to the DLP Console and navigate to Manage > Incidents >
Network
Open the Customer Data incident and click the Encrypt Email option
In the FlexReponse action dialog, click OK
10 of 12
21. Return to the Encryption Management Server console and navigate to Reporting > Logs
You will see that the message has been released from the Symantec Messaging Gateway
and sent to the Encryption Management Server. In this case, the policy option selected uses
the Secure Web Mail feature of Symantec Encryption Management Server.
22.
23.
24.
25.
26.
Using the Thunderbird Email Client, refresh Larry’s inbox
Open the message titled Symantec Encryption Secure Message
Click the link embedded in the message
Enter Symc4now! for the new passphrase when prompted
Take note of the message delivery options and click the Choose Option button to see
the secure message
Thank You!
YOUR FEEDBACK IS VALUABLE TO US!
Please take a few minutes to fill out the short session survey available on the mobile app—the
survey will be available shortly after the session ends. Watch for and complete the more
extensive post-event survey that will arrive via email a few days after the conference.
To download the app, go to https://vision2014.quickmobile.com or search for Vision 2014 in the
iTunes or Android stores.
11 of 12
Appendix – Lab Configuration and Credentials
Roles:
 Student Workstation
 IE 10
 Thunderbird Portable (Email)
Endpoint-7.acme.com
2 vCPU, 2GB RAM
Eth0 - VNET1 - 192.168.127.10
Eth1 - VNET2 – Dynamic NAT
Roles:
 acme.com Domain Controller
 MailEnable (Groupware) for
acme.com,
anothercompany.com,
trustedpartner.net
 Symantec DLP 12
 Network Prevent for E-mail
Roles:
 Encryption Management
Server
Roles:
 Messaging Gateway (MTA) 10.5
Enforce.acme.com
4 vCPU , 6GB RAM
Eth0 - VNET1 - 192.168.127.10
Eth1 - VNET2 – Dynamic NAT
smg.acme.com
2 vCPU, 2GB RAM
Eth0 - VNET1 - 192.168.127.60
Eth1 - VNET2 – 10.10.100.60
keys.acme.com
1 vCPU, 1GB RAM
Eth0 - VNET1 - 192.168.127.20
Eth1 – N/A
Resource
Username
Password
Address
Enforce
Console
ACME\Administrator
Symc4now!
Desktop Console
W7/WXP
Console
ACME\joe
Symc4now!
Desktop Console
SMG Console
admin
Symc4now!
Desktop Console
SMG Control
Center
admin
Symc4now!
https://192.168.127.60
DLP Console
Administrator
Symc4now!
https://192.168.127.10
Encryption
Console
admin
Symc4now!
https://192.168.127.20:9000
12 of 12