Trigger
Once you zero in on the policy Scope to the required devices and originating domains, you must now define the trigger actions that can be termed as exfiltration events.
Nightfall provides you with three types of triggers that you can set as exfiltration events.
Browser Uploads: In this section, if an asset is uploaded through a browser to an online portal (for example, a social media website), you can define such events as exfiltration events.
Cloud Syncing: In this section, if an asset is uploaded to an online cloud store application (for example, Google Drive), you can define such events as exfiltration events.
Clipboard Paste: In this section, if data is copied from a source and pasted to a destination, you can define such events as exfiltration events.
Git Push: Git Push Monitoring helps organizations detect when source code is pushed from managed endpoints to non‑approved Git destinations. This feature is designed to prevent accidental or intentional source‑code exfiltration. Detection is based on source and destination metadata.
The steps to use the above triggers are elaborated in the following sections.
Browser Uploads
Ensure that you have configured domain collections before using the browser uploads option.
To monitor browser uploads:
Select the Browser uploads to option.

Select one of the following options.
Any Domain: If you select this option, Nightfall monitors your uploads done to any domain on the Internet.
Domain in: If you select this option, you must additionally also select the domain collections created in the domain collections section. Nightfall monitors the uploads done to all the domains that belong to the selected domain collections.

Once you select a domain collection, it is displayed on the screen and greyed out from the drop-down menu. You can use the drop-down menu to select additional domain collections.

Domain Not in: If you select this option, you must additionally also select the domain collections created in the domain collections section. Nightfall does not monitor the uploads done to all the domains that belong to the selected domain collections.
Once you select a domain collection from the drop-down menu, it is displayed on the screen and grayed out from the drop-down menu. You can use the drop-down menu to select additional domain collections.
Cloud Sync App Uploads
In this option, you can either choose to monitor uploads done to every cloud sync app or select specific cloud sync apps to which the uploads must be monitored.
Select the Cloud Syncing option.
Select one of the following options.
Any Storage Apps: If you select this option, Nightfall monitors the uploads done to every cloud sync storage application.
Specific Storage App(s): If you select this option, you must additionally select the storage apps. Nightfall monitors the uploads done to the selected storage apps.
Once you select a cloud storage application from the drop-down menu, the selected option is displayed on the screen and grayed out from the drop-down menu. You can use the drop-down menu to select additional cloud storage apps.
Clipboard Paste
In this option, you can choose to monitor the copy/paste actions performed by end-users. If end-users copy some data and paste it to unsanctioned locations.
Apart from text data, Nightfall can also detect non-text clipboard content, including images and screenshots. Clipboard Paste trigger uses the optical character recognition (OCR) technology in combination with Nightfall detectors to prevent the exfiltration of sensitive data present in visuals like copied screenshots, scanned documents, or copied images from web browsers.
Use cases
A typical example of this trigger can be a scenario in which an end-user copies an API key and pastes it in a prompt in ChatGPT/Deepseek or any other Gen AI apps while attempting to generate a piece of code.
An employee attempting to capture a screenshot of dashboards, reports, or customer data from sensitive SaaS apps into unsanctioned destinations.
To enable the Clipboard Paste trigger:
Select the Paste To option.
Select one of the following options.
Any Domain: If you select this option, Nightfall monitors your paste actions performed on any domain on the Internet.
Domain in: If you select this option, you must additionally also select the domain collections created in the domain collections section. Nightfall monitors the uploads done to all the domains that belong to the selected domain collections. The process of domain selection remains the same as demonstrated in the case of theBrowser Uploads section.
Domain Not in: If you select this option, you must additionally also select the domain collections created in the domain collections section. Nightfall does not monitor the uploads done to all the domains that belong to the selected domain collections.
Once you select a domain collection from the drop-down menu, it is displayed on the screen and grayed out from the drop-down menu. You can use the drop-down menu to select additional domain collections.
If end-users attempt to paste content, once you enable the Clipboard Paste trigger, they receive an error message as shown in the following image.

Removable Media
Nightfall’s removable media controls allow you to monitor or block sensitive data exfiltration to external storage devices such as USB drives and external HDD/SSD. Policies are evaluated at the endpoint and can be scoped with device type, vendor, and serial number filters for precise enforcement.
Out of the box, Nightfall supports ~1,200 removable media vendors, enabling immediate coverage without manual vendor onboarding.
Nightfall detects and can block the following removable media categories:
USB storage devices (thumb drives, external HDD/SSD)
These are internally represented as removable media types and can be included or excluded in the policy configuration.
How Removable Media Policies Work
A removable media policy is evaluated using three layers of filters:
Origin - Where the content originated from
Destination Removable Media Filters - Which removable devices the rule applies to
Content Detection - Whether sensitive data is present
Endpoint Device - Which devices are included or excluded in the policy
If all conditions match, the configured enforcement (Monitor or Block) is applied.
Policy configuration:
Step 1 - To apply a policy to removable devices:
Set Action to “To removable media”
This ensures the rule only evaluates file transfers where data is being written to an external device.
Step 2 - Removable media filters
Removable media filters allow you to precisely control which removable devices are included in enforcement.
Device Type
Monitor all – Applies to all removable media types
Specific types – Limit enforcement to selected media types (USB, HDD/SSD)
All device types except – Exclude specific device types from enforcement
If no specific type is selected, all removable media types are included by default.
Vendor filtering
Nightfall supports ~1,200 removable media vendors out of the box.
You can configure vendor behavior as follows:
Monitor all vendors (default)
Specific vendor(s) – Apply the rule only to selected vendors
All vendors except – Exclude specific vendors from enforcement
Vendor matching is based on device metadata reported by the operating system.
Example use cases:
Allow corporate-approved encrypted USB vendors
Block unknown or consumer-grade USB brands
Device Serial Number Filtering
Serial number filters provide the most granular level of control.
Options:
Monitor all (default)
Specific serial numbers – Apply enforcement only to listed devices
All serial numbers except – Exclude specific devices from enforcement
Serial numbers are matched exactly as reported by the endpoint OS.
Example use cases:
Allow a small set of approved devices
Exempt forensic or IT-issued USB drives
Filter precedence and evaluation logic
When multiple device filters are configured, Nightfall evaluates them together using the following rules:
Include rules are evaluated first
Exclude rules override include rules
If no include filters are specified, the rule defaults to include all
Practical Implications
If you select Specific vendors, only those vendors are eligible
If you then exclude a serial number, that device will never trigger the policy
If both vendor and serial filters are empty, all removable media is in scope
Once a removable media action and device match, Nightfall evaluates the content being transferred:
Sensitive data types (PII, credentials, secrets, etc.), file classifiers or any other applicable detectors in the configured detection rules
If sensitive content is detected, enforcement is applied. Each policy can be configured to:
Monitor – Log the event for visibility and auditing
Block – Prevent the transfer to removable media
Both modes can be enabled simultaneously to provide audit visibility even when blocking.
Common Configuration Examples
Example 1: Block All USB Devices
Action: To removable media
Device Type: USB
Vendor: Monitor all
Serial Number: Monitor all
Enforcement: Block
Example 2: Allow Only Approved Vendors
Action: To removable media
Vendor: Specific vendor(s)
Enforcement: Block
All other vendors will be blocked.
Example 3: Allow Only Specific Devices
Action: To removable media
Serial Number: Specific serial numbers
Enforcement: Block
Only listed devices will be allowed; all others blocked.
Example 4: Exclude Corporate USB Drives
Action: To removable media
Vendor: All vendors
Serial Number: All serial numbers except
Enforcement: Block
Corporate-approved devices are excluded from enforcement.
For exfiltration events involving removable media, Nightfall surfaces additional asset-level metadata to help security teams understand where data was written and which physical device was involved.
In the Asset details panel, you can expect the following removable media–specific fields:
Medium – Indicates the destination medium as Removable Media
Mount Path – The local mount location of the device on the endpoint (for example, /Volumes/My USB Device on macOS)
Volume Label – The human-readable label assigned to the removable device
Media Type – The category of removable media (for example, USB, HDD/SSD)
Vendor ID – The hardware vendor identifier reported by the operating system
Serial Number – The device’s unique serial number, when available
These fields are available only for removable media events and enable precise investigations, device allowlisting, and policy tuning.
All other event information - including user identity, endpoint details, timestamps, policy action, file preview, activity log and risk context, manual actions - is consistent with other Endpoint Exfiltration events and is available in the Summary and Device tabs.
Git Push Monitoring
Nightfall monitors the following signals during a Git push operation:
The endpoint where the push originates
The user performing the push
The Git protocol (HTTPS / SSH)
The remote destination URL
The repository name and configured remotes
A Git Push Monitoring policy evaluates where code is being pushed, not what is being pushed. If the destination does not match your approved Git domains, Nightfall generates an exfiltration event.
Supported Git Destinations
Git Push Monitoring supports:
GitHub Cloud
GitLab Cloud
Bitbucket
Any Git server accessible via HTTPS or SSH
Policy Configuration
Step 1: Define Approved Git Destinations
Customers define approved Git hosting locations using Domain Collections.
Examples:
github.com/my‑company‑org/*
gitlab.company.com/*
bitbucket.org/company/*
These domains represent where source code is allowed to be pushed.
Step 2: Configure Git Push Monitoring Policy
Policy Type: Endpoint Exfiltration Action: Git Push
Destination Condition Options:
Any domain
Domain in approved list
Domain not in approved list (recommended)
Recommended Configuration:
This configuration alerts when developers push code outside approved repositories.
Example Use Cases
Prevent Personal GitHub Usage
Approved: github.com/company‑org/*
Detected: github.com/john‑doe/test‑repo
Monitor Scratch or Temporary Repositories
Even if the repository is newly created or unnamed, Nightfall detects the push if the destination domain is not approved.
Enforce Corporate GitHub & GitLab Usage
Ensure all production code stays within:
Corporate GitHub organizations
Internal GitLab instances
Event Details
When a Git push violates policy, Nightfall generates an event with metadata‑only context.
Event Summary Fields
Field
Description
Event Type
Git Push
Repository
Repository name
Actor
User performing the push
Device
Endpoint hostname
Destination URL
Git remote URL
Git Remotes
origin, personal, etc.
Risk
Critical, High, Medium, Low
Example Scenarios
The following scenarios illustrate the support matrix for this capability.
Push to Approved Repository
Git operation succeeds
No alert generated
Push to Non‑Approved Repository
Git operation succeeds (no blocking)
Exfiltration event generated
HTTPS and SSH Both Supported
Detection works for both authentication methods
Multiple Remotes Supported
Events reflect the actual remote used for the push
Unmanaged Devices
No detection occurs without an endpoint agent
Git Push Monitoring provides organizations with a simple and effective control to:
Detect source code exfiltration
Enforce approved Git destinations
Gain visibility into developer Git activity
Last updated
Was this helpful?