Citrix XenApp. RSA Secured Implementation Guide for RSA DLP Endpoint VDI. Partner Information. Last Modified: March 28 th, 2014

Similar documents
VMware VMware View. RSA Secured Implementation Guide for RSA DLP Endpoint VDI. Partner Information. Last Modified: March 27 th, 2014

Microsoft Exchange Online

Cisco Systems, Inc IronPort

Ipswitch MOVEit File Transfer (DMZ)

RSA SecurID Implementation

Palo Alto Networks PAN-OS

McAfee Endpoint Encryption

Intel Security/McAfee Endpoint Encryption

RSA SecurID Ready Implementation Guide. Last Modified: March 27, Cisco Systems, Inc.

RSA Data Loss Prevention (DLP)

<Partner Name> <Partner Product> RSA SECURID ACCESS Authenticator Implementation Guide. Intel Security Drive Encryption 7.1.3

VMware Identity Manager vidm 2.7

HOB HOB RD VPN. RSA SecurID Ready Implementation Guide. Partner Information. Product Information Partner Name. Last Modified: March 3, 2014 HOB

<Partner Name> <Partner Product> RSA NETWITNESS Logs Implementation Guide. Exabeam User Behavior Analytics 3.0

<Partner Name> <Partner Product> RSA SECURID ACCESS. Pulse Secure Connect Secure 8.3. Standard Agent Client Implementation Guide

Microsoft Unified Access Gateway 2010

Apple Computer, Inc. ios

Cisco Systems, Inc. Wireless LAN Controller

Symantec Encryption Desktop

RSA Ready Implementation Guide for

Citrix Systems, Inc. Web Interface

RSA Ready Implementation Guide for

<Partner Name> <Partner Product> RSA SECURID ACCESS. VMware Horizon View 7.2 Clients. Standard Agent Client Implementation Guide

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. CyberArk Enterprise Password Vault

<Partner Name> <Partner Product> RSA SECURID ACCESS Authenticator Implementation Guide. Check Point SmartEndpoint Security

<Partner Name> <Partner Product> RSA Ready Implementation Guide for. Rapid 7 Nexpose Enterprise 6.1

TalariaX sendquick Alert Plus

RSA Ready Implementation Guide for

RSA Ready Implementation Guide for

IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://

Barracuda Networks SSL VPN

RSA SecurID Ready Implementation Guide

RSA pro VMware. David Matějů. RSA, The Security Division of EMC

<Partner Name> <Partner Product> RSA ARCHER GRC Platform Implementation Guide. Swimlane 2.x

<Partner Name> <Partner Product> RSA Ready Implementation Guide for

<Partner Name> RSA NETWITNESS Security Operations Implementation Guide. Secdo Platform. <Partner Product>

Dell SonicWALL NSA 3600 vpn v

<Partner Name> RSA SECURID ACCESS. VMware Horizon View Client 6.2. Standard Agent Implementation Guide. <Partner Product>

WorldExtend Environment Preparation Guide

<Partner Name> RSA SECURID ACCESS Standard Agent Implementation Guide. WALLIX WAB Suite 5.0. <Partner Product>

<Partner Name> <Partner Product> NETWITNESS Logs Implementation Guide. Imperva Counter Breach 11.5

RSA SecurID Ready Implementation Guide

Cisco Virtualization Experience Media Engine Overview

RSA SecurID Ready Implementation Guide. Last Modified: November 19, 2009

RSA Ready Implementation Guide for

<Partner Name> <Partner Product> RSA Ready Implementation Guide for. MapR Converged Data Platform 3.1

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

Caradigm Single Sign-On and Context Management RSA Ready Implementation Guide for. Caradigm Single Sign-On and Context Management 6.2.

<Partner Name> RSA NETWITNESS Security Operations Implementation Guide. Swimlane 2.x. <Partner Product>

Application Notes for Virsae Service Management for Unified Communications with Avaya Aura Session Manager - Issue 1.0

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Pulse Connect Secure 8.x

Using NiceLabel with VDI and Application Virtualization

SSH Communications Tectia SSH

Configuring Avaya one-x Communicator 6.0 H.323 with Citrix XenApp TM 5 on Microsoft Windows 2003 (32-bit) Server Issue 1.0

Load Balancing VMware Workspace Portal/Identity Manager

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Citrix NetScaler Gateway 12.0

Thales nshield Series

<Partner Name> RSA ARCHER GRC Platform Implementation Guide. RiskLens <Partner Product>

Product Documentation

<Partner Name> <Partner Product> RSA SECURID ACCESS. NetMove SaAT Secure Starter. Standard Agent Client Implementation Guide

APM Proxy with Workspace One

AirWatch Mobile Device Management

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. PingIdentity PingFederate 8

McAfee Data Loss Prevention Endpoint

SSH Communications Tectia 6.4.5

Windows 7 Deployment Key Milestones

SAS and F5 integration at F5 Networks. Updates for Version 11.6

Authentify SMS Gateway

My The guide.

User Manual Documentation

Citrix StoreFront 2.0

HOW TO ADD S FROM FWCCU TO YOUR SAFE SENDERS

Downloading and editing signatures!

Barracuda Networks NG Firewall 7.0.0

Configuring a Virtual Desktop

<Partner Name> <Partner Product> RSA NETWITNESS Logs Implementation Guide. PAS Global, LLC ICS 5.5

Barron McCann Technology X-Kryptor

XenApp Secure Browser Installation with a Citrix Lifecycle Management Blueprint and NetScaler on Azure

Digital Defense Frontline VM 6.0

Pulse Secure Policy Secure

Product Documentation

RSA SecurID Ready Implementation Guide. Last Modified: December 13, 2013

SecureW2 Enterprise Client

Application Notes for Virsae Service Management for Unified Communications with Avaya Aura System Manager - Issue 1.0

Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios

<Partner Name> <Partner Product> RSA ARCHER GRC Platform Implementation Guide. WhiteHat Security Sentinel

SOFTEL Communications Password Reset and Identity Management Suite

Table of Contents. VMware AirWatch: Technology Partner Integration

Don t Be the Next Data Loss Story

RSA Secured Implementation Guide For User Management Products

Cisco Systems, Inc. Catalyst Switches

RSA Ready Implementation Guide for

KASPERSKY SECURITY FOR VIRTUALIZATION LIGHT AGENT. Quick Deployment Guide.

Cisco Systems, Inc. Aironet Access Point

Netwrix Auditor for SQL Server

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Windows Server VDI for Service Providers. White Paper Parallels Remote Application Server 2017

Revision A. McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Pulseway Security White Paper

Transcription:

RSA Secured Implementation Guide for RSA DLP Endpoint VDI Partner Information Last Modified: March 28 th, 2014 Product Information Partner Name Citrix Web Site www.citrix.com Product Name Version & Platform 6.5 Product Description Citrix is an on-demand application delivery solution that enables any Windows application to be virtualized, centralized, and managed in the datacenter and instantly delivered as a service to users anywhere on any device.

Solution Summary Compared to traditional application deployment technology, virtual application delivery with enables organizations to improve application management by centralizing applications in the datacenter to reduce costs, controlling and encrypting access to data and applications to improve security and delivering applications instantly to users anywhere. The RSA Data Loss Prevention Endpoint Enforce installed and configured on the server ensures prevention of data loss from sessions. Partner Integration Overview User Actions Supported Remediation Actions Available Print to, Copy/Move, Save As, Webmail,,,, - 2 -

Partner Product Configuration Before You Begin This section provides instructions for integrating Citrix with the RSA Data Loss Prevention (DLP) Suite. This document is not intended to suggest optimum installations or configurations. It is assumed that the reader has both working knowledge of all products involved, and the ability to perform the tasks outlined in this section. Administrators should have access to the product documentation for all products in order to install the required components. All vendor products/components must be installed and working prior to the integration. Perform the necessary tests to confirm that this is true before proceeding. Configuring Citrix Install and configure a DLP Endpoint Agent on each Citrix server where you want DLP policy enforced. The endpoint agent is a service that starts when the system starts and monitors user actions as long as the computer is running. To install the Endpoint agent, follow the instructions as defined in the Installing and Configuring DLP Endpoint chapter in the RSA DLP Endpoint 9.6 Deployment Guide. After the Endpoint agent and policies have been configured, the end user s will see the following RSA DLP Policy messages: - 3 -

& : & : - 4 -

& : (Copy to Clipboard): - 5 -

Configuring VDI options within the RSA DLP Enterprise Manager Once you have successfully deployed the RSA DLP Endpoint Agent, there are a couple of configuration options within the RSA Enterprise Manager to consider. The DLP Endpoint agent runs in a virtual system the same way that it does on physical hardware. The DLP Endpoint agent can monitor the drives of the physical host that are automatically mounted to the virtual desktop, the drives of the physical host that are accessed as network shares and the clipboard data in the virtual desktop. To enable or disable monitoring of Mounted Physical Drives and Copying of the Clipboard, perform the following steps: 1. From the RSA DLP Enterprise Manager, select Admin Endpoint Endpoint Groups and then select the Endpoint Group (e.g. Default) of the Citrix servers that have the RSA Endpoint agent installed. 2. Select Edit and then scroll down to VDI Settings. 3. Make the appropriate changes to the Monitor automatically mounted physical drives and the Monitor VDI clipboard settings. 4. Click the Save button to commit the changes. Once these settings are selected, you apply them through the Endpoint Policy User Actions settings within the DLP Enterprise Manager. To do so, perform the following actions: - 6 -

5. From the Policies tab, select the Endpoint policy you want to change (e.g. PCI-DSS). 6. Click the Edit button in the upper left-hand window of the policy. - 7 -

7. Click the Endpoint tab then the Any User Action box. Click the Copy in VDI checkbox then the Save button. This will enforce both the Monitor automatically mounted physical drives and the Monitor VDI clipboard settings. - 8 -

Monitoring Clipboard Data The clipboard contains the data that you transfer between documents or applications using copy and paste operations. Policy actions for monitoring the clipboard behave differently to the end-user and within the RSA Enterprise Manager than the standard enforced DLP actions. The following is the expected outcome for the corresponding policy action: Action: or The end-user is notified of the potential violation of policy and is given the option to cancel the action. If the user clicks Yes, an event is generated and the user is allowed to copy text out of virtual desktop. If user clicks No, the user is allowed to paste the text within the virtual desktop and no event is generated. Action: The end-user is notified of the potential violation of policy and the action is blocked. The user can paste the text only within the virtual desktop and no event is generated. Action: The end-user is prompted to justify the action that triggered the violation. If the user provides a justification, the user is allowed to paste text out of the virtual desktop and an event is generated. If user clicks No, the user is allowed to paste the text within the virtual desktop and no event is generated. Important: DLP Endpoint monitors only the data stored as text in the clipboard of the virtual desktop. - 9 -

Certification Checklist for RSA Data Loss Prevention Suite Date Tested: March 28 th, 2014 Certification Environment Product Name Version Information Operating System RSA DLP Enterprise Manager 9.6.1200.107 (SP2) Windows 2008 Server R2 (x64) RSA DLP Enterprise Coordinator 9.6.1200.31 (SP2) Windows 2008 Server R2 (x64) RSA DLP Endpoint Agent 9.6.1200.82 (SP2) Microsoft Windows 7 (x64) Citrix 6.5 Microsoft Windows 7 (x64) RSA Endpoint Copy to NetShare RSA Endpoint Copy to Removable Drive RSA Endpoint Copy to Mounted Physical Drive RSA Endpoint Save As to NetShare (same file name) - 10 -

RSA Endpoint Save As to NetShare (different file name) RSA Endpoint Save As to Removable Drive (same file name) RSA Endpoint Save As to Removable Drive (different file name) RSA Endpoint Save As to Mounted Physical Drive (same file name) RSA Endpoint Save As to Mounted Physical Drive (different file name) - 11 -

RSA Endpoint Print RSA Endpoint Print to File RSA Endpoint Print with Web Browser (IE/Firefox) RSA Endpoint Print with Web Browser (IE/Firefox) to File RSA Endpoint Clipboard Copy sensitive content Copy sensitive content Copy sensitive content Copy sensitive content - 12 -

Web Mail Gmail Sensitive content as email attachment, body & subject Web Mail Yahoo! Mail - 13 -

Web Mail Microsoft Outlook (Hotmail) JJO = Pass = Fail N/A = Non-Available Function - 14 -