Lab 7 — Endpoint DLP
Create an endpoint DLP policy that prevents sensitive data from being copied to USB storage devices.
1. Create an Endpoint DLP Policy [Alex]
Policy → Endpoint DLP → + New Rule
Create a new rule named:
- Detection Engine: Financial Data Detection
- Device Type: Removable storage (USB drive)
- Action: Block
- User notification: Enabled
Save the policy and confirm it is active.
2. Trigger a Policy Violation [Kevin]
Attempt to copy the following file to a USB drive:
Observe:
- File transfer is blocked by the endpoint agent
- User receives notification explaining why
- Incident is generated — even though no network traffic occurred
- Why is endpoint protection necessary even when network controls exist?
- Which employees or roles legitimately require exceptions for removable media?
- Should all USB activity be monitored even when it is not blocked? What value does audit-only mode provide?
Inline DLP protects data in transit over the network. Endpoint DLP protects data on the device.
These two controls are complementary — network DLP catches cloud uploads, endpoint DLP catches offline exfiltration. Both are required for complete protection coverage.
The "off-network" point is especially resonant for organizations with large remote workforces.
Labs 6 and 7 together make a clean argument: network and endpoint DLP are not redundant — they cover fundamentally different exfiltration vectors.