Overview
The Endpoint Data Collection settings identify the exfiltration vectors monitored for risky activity. Incydr automatically collects all metadata associated with the files involved in such activity. You can also collect the contents of those files, when available, to provide important context during investigations.
Endpoint Data Collection settings
To view an organization's endpoint data collection settings:
- Select Administration > Environment > Organizations.
- Select an organization.
- Click the Endpoint Data Collection tab. If there's no Endpoint Data Collection tab in your environment, select the Insider Risk tab and go to the Endpoint data collection section.
Item | Description | |
---|---|---|
a | Collect file metadata |
Identifies the vectors monitored for file exfiltration. All vectors are enabled by default. If you need to disable a vector, contact our Technical Support Engineers. Removable media Scanning all removable media (such as USB drives or SD cards) for file metadata. Cloud sync applications Detection of files that are synced to cloud storage using these apps installed on the endpoint:
Browser and other application activity
Code42 requires macOS permissions to detect file upload destinations
To detect Browser and other Application Activity, you must take action to grant Code42 permission on Mac devices to detect the window title and URL active at the time a file is uploaded. For details, follow the steps in macOS permissions for the insider risk agent. Printers
|
b | Collect exfiltrated file contents |
Identifies whether Code42 collects the contents of the file itself when that file is involved in possible exfiltration activity.
|
c | Edit |
Click to update the Collect exfiltrated file contents settings. When the panel opens:
|