Nightfall Documentation
  • Data Detection and Response
  • Posture Management
  • Data Exfiltration Prevention
  • Data Encryption
  • Firewall for AI
  • Data Classification and Discovery
  • Nightfall Exfiltration
  • What is Data Exfiltration
  • Nightfall Detection Platform
    • Nightfall Detection Platform
  • Exfiltration Prevention for Google Drive
    • Installing Nightfall for Google Drive
    • Configuring Integration Alerts
    • Configuring Google Drive Policies
      • Google Drive App Selection
      • Scope
      • Trigger
      • Automated Actions
      • Creating Policy
    • Remediation for Google Drive Exfiltration
  • Exfiltration Prevention for Endpoint
    • Endpoint Exfiltration Prevention
    • Install Nightfall AI Agent for MAC OS
      • Manual Installation
      • Nightfall Agent Deployment with Kandji MDM
      • Nightfall Agent Deployment with Rippling MDM
      • Nightfall Agent Deployment with JAMF MDM
    • Install Nightfall AI Agent for Windows OS
      • Manual Installation
      • Nightfall Windows Agent Deployment: Rippling MDM
      • Nightfall Windows Agent Deployment: Generic MSI Deployment
    • Configuring Integration Alerts
    • Configuring Policies
      • MAC/Windows App Selection
      • Scope
      • Trigger
      • Advanced Settings
        • Admin Alerting
        • Automated Actions
        • End-User Notifications
      • Creating Policy
      • Remediation for MAC OS Policies
      • FAQs
      • Remediation for Windows OS Policies
  • Exfiltration Prevention for Salesforce
    • Nightfall Exfiltration for Salesforce
    • Installing Nightfall Exfiltration for Salesforce
    • Upgrading Nightfall DLP
    • Configuring Integration Alerts
    • Configuring Salesforce Exfiltration Policies
      • Salesforce App Selection
      • Scope
      • Trigger
      • Advanced Settings
      • Creating Policy
      • Remediation for Salesforce Exfiltration
Powered by GitBook
On this page
  • Managing Violations in Nightfall
  • Summary Tab
  • Assets Tab
  • Asset History
  • Device Tab
  • Actions

Was this helpful?

Export as PDF
  1. Exfiltration Prevention for Endpoint
  2. Configuring Policies

Remediation for MAC OS Policies

This document explains what admins can do when a macOS policy is violated.

Managing Violations in Nightfall

Nightfall admins can manage violations from within the Nightfall console. The Events page in Nightfall lists all the violations under the Exfiltration tab. End-users can get a detailed view of each exfiltration violation recorded.

To view violations in Nightfall

  1. Navigate to Exfiltration Prevention from the left menu.

Steps 2-6 help you filter the events to only view the alerts generated by macOS.

  1. Click Filter.

  2. Click + Add Filter.

  3. Select Integration.

  4. Select the macOS check box.

  5. Click Apply.

  6. Select Integration.

  7. Select the macOS check box.

  8. Select Integration.

  9. Select the macOS check box.

  10. Click Apply.

To view historic events, click the Time filter, select the required time period or enter it manually by selecting the Custom Range option. Once the required time period is selected, click Apply. By default, the filter displays results for the Last 7 days. You can click Last 7 Days and choose the required historic time period.

You can click an event to view the details. The detail view window consists of the following tabs.

Summary Tab

The Summary tab consists of the following details.

  • Assets: The name of the uploaded asset(s) that was exfiltrated.

  • Policy: The name of the policy violated.

  • Device ID: The device ID of the device from which the asset was uploaded.

  • Machine Name: The physical name of the device from which the asset was uploaded.

  • Browser Name: The name of the browser from which the asset was uploaded. This field is applicable only for browser uploads.

  • App Name: The name of the cloud storage app to which the asset containing sensitive data was uploaded. This field is applicable only for uploads done to cloud storage apps.

  • Account Type: The nature of the cloud storage app to which the asset was uploaded. The account type is generally either Personal account or Business account. This field is applicable only for uploads done to cloud storage apps.

  • Upload Start Time: The start date and start time of the upload.

  • Upload End Time: The end date and end time of the upload.

The Summary tab for a Browser upload action is as follows.

The Summary tab for a Cloud storage app event is as follows.

The Summary tab also displays a log of activities that occured on the Event. The Summary tab also displays a log of activities that occured on the Event. The first log entry is always the asset creation date. The subsequent logs display the actions applied on the event. You can also add comments on the Summary tab. The comments added by you can be viewed by other users as well.

Assets Tab

This tab displays the details of the asset that was uploaded to a domain or cloud storage app. The asset tab also displays a number in brackets. This number indicates the number of assets that were uploaded as part of the event.

In the following image, there are two assets which were uploaded and these four uplaods together triggered the event. In such cases when there are multiple assets involved, you can use the drop-down menu to switch between assets and view the asset details.

The Assets tab displays the following details.

  • Name: The name of the asset uploaded.

  • Where: The location of the asset in the device.

  • Medium: The medium used to upload the asset. This can be browser or cloud storage app.

  • Size: The size of the asset.

Asset History

The Assets tab also contains the Asset History section. This section displays the source or origin from where the asset was downloaded. Additionally, it also displays the destinations to which the asset was uploaded. If the source and destination details are not available, this section does not display any information. Users can use the time filter to view historic data. By default, the asset history is displayed for the last 7 days. You can click the Last 7 Days drop-down menu to view historic asset details.

Device Tab

The device tab displays the details of the device used to upload the asset. You can view the following details on this tab.

  • Device ID: The device ID of the device from which the asset was uploaded.

  • Device Name: The name of the device from which the asset was uploaded.

  • Connection Status: The current status of the device. This can either be Connected or Disconnected. If the device is not in contact with the Nightfall agent for more than 6 hours, the connection status changes to disconnected.

  • OS: The operating system used on the device.

  • MAC Address: The physical MAC address of the device.

  • Last Connection: The date and time when the device was last connected.

  • Agent Version: The Nightfall agent version installed on the device.

  • OS Version: The MAC OS version used on the device.

Important

If a user uploads the same file to multiple browser destinations (say 3), 3 exfiltration events are generated. However, if you uploads multiple files to the same destination, only a single event is generated.

If multiple violations are recorded within a span of five minutes, all the violations are clubbed under a single exfiltration event. The Assets Tab of this event displays the details of each asset.

However, if you upload multiple files to different browser domains or upload multiple files to different cloud storage apps, within a span of five minutes, a separate exfiltration event is generated for each of the uploaded file.

Actions

You can perform the following actions on all the three tabs. These actions are present at the bottom.

  • Copy Event Link: This action copies the link of the event to the clipboard.

  • Acknowledge: This action modifies the status of the event to Acknowledged.

  • Resolve: This action resolves the event and modifies the status to resolved.

  • Ignore: This action ignores the event and modifies the status to ignored.

PreviousCreating PolicyNextFAQs

Last updated 2 months ago

Was this helpful?

Domain: The domain URL to which the asset containing sensitive data was uploaded. This field is applicable only for browser uploads. When you hover over a domain that is not added to any , you can choose to add it to an existing Collection or create a new one. If you are already leveraging the domain collection as part of your monitoring policies, the new addition will be automatically picked up. For example, if the domain is added to a collection of sanctioned domains your policy is ignoring, future uploads to this destination will be ignored.

If you have configured in the Scope section of the policy and if the asset contains sensitive data, the asset tab also displays a preview of the sensitive data and the violated. Additionally, you can also find a new field called Sensitive Data that displays the name of the detector(s) violated.

Notify Slack: This action sends a Slack notification about the event to the recipient configured in the section.

Notify Email: This action sends an Email notification about the event o the recipient configured in the section.

Collection
detectors
#admin-alerting
#admin-alerting
Content Scanning