Skip to main content
Skip to main content

Proofpoint Endpoint DLP — Acceptable Use

Audience: IT Administrators and Security Officers.

Purpose: Determine appropriate deployment of DLP agents.


Overview

End user devices (laptops, tablets, smartphones) provide a gateway to university data, research, and teaching platforms. These devices are bound by TAMU Security Controls.

Requirements

Systems storing or processing critical or confidential data require:

  1. ✓ File encryption or whole-disk encryption
  2. ✓ Data loss prevention (DLP) software

Deployment Guidelines

When to Install DLP

Recommended for:

  • Faculty and staff devices handling critical or confidential data
  • Workstations with access to sensitive university systems
  • Devices used for administrative functions

When NOT to Install DLP

DLP agents are inappropriate for:

ScenarioReason
Devices used by users without access to sensitive dataNo data exposure risk
Digital signageCannot access confidential data
Open access workstationsStudent/public use
Ephemeral desktops (under 30 days lifespan)Transient systems
Servers (see Client-Server Model)Different security model
Application servers with only source codeNo direct data access

Client-Server Model

In client-server architectures where servers:

  • Are used exclusively in client-server mode
  • Do not allow interactive user sessions

The server may not need a DLP agent if:

  • All connecting endpoints have DLP agents installed
  • Information resource owner can verify endpoint coverage

Database Servers

Even when storing confidential information, database servers may not need DLP agents if:

  • Access follows least privilege principles
  • Connecting endpoints have DLP installed

Detection Capabilities

Proofpoint Endpoint DLP scans data in motion when it leaves the TAMU environment:

ActionDescription
Copy to USBUSB drives, thumb drives, external hard drives
Web File SyncCloud storage without university agreements (Dropbox, iCloud)
Web File UploadCloud storage other than TAMU tenants
Future Capabilities

Printing, web file download, and document open may be monitored in future releases.


Alert Response

StepOwner
Policy trigger → Alert in consoleAutomatic
Review all alertsTechnology Services
Optional: Campus IT reviewUnit admins
Policy violation incidentServiceNow notification
Response requestData owner/steward

Request Access

Contact cloudsecurity-notify@tamu.edu to:

  • Request console access
  • Obtain DLP software repository access
  • Ask questions about implementation