Remediation for Salesforce

This document explains what admins and end-users can do once a policy is violated.

Admin Notification and Remediation

When end-users violate a policy, the Nightfall admin is notified about the incident. The notification channel used to notify the Nightfall admin depends on the settings configured in the Admin Alerting section. If you have not enabled any notification channels in the Admin alerting section, Nightfall admins are not notified.

If you have enabled the email notification in the Admin alerts section, Nightfall admins receive an email. The email is as shown in the following image.

The Email consists of the following data.

  • Event: The event that caused the violation. For Salesforce, the event is always download of assets.

  • Who: The Email ID of the user who downloaded the file.

  • When: The date and time when the email was downloaded.

  • What: The name of the file that was downloaded.

  • Policies Violated: The name of the policy that was violated.

  • Violation Dashboard: The link to the Events screen to view the violation in detail.

  • Actions: The list of actions that the Nightfall admin can take.

Also, a Slack message is sent if you have enabled the Slack alerts for the Nightfall admin.

End-User Notification and Remediation

End-users receive notifications and remediation actions if the Nightfall admin has enabled these settings. The notifications are based on the settings configured in the Automation section. The end-user remediation actions are based on the settings configured in the End-User Remediation section.

If you have configured the Email notification for end-users and enabled the end-user remediation, end-users can take remediation actions from the Email itself. The end-user Email is shown in the following image.

If you have configured Slack notifications for end-user and enabled end-user remediation, end-users also get a message in the respective Slack channel configured.

Manage Violations in Nightfall

To manage violations in the Nightfall console:

  1. Click Events from the left menu.

  1. Click the Exfiltration tab.

The Exfiltration Events page lists all the exfiltration events. To view events specific to the Salesforce integration:

  1. Click Filters and select + Add Filter.

  1. Select Integration in the Select a filter field.

  1. Select the Salesforce check box in the Select an option field.

  1. Click Apply.

Now, only the Salesforce events are displayed.

  1. To view events with specific statuses, you can click the respective tabs.

To view historic events, click the Time filter and select the required time period.

You can click an event to view the details. The detail view window is as follows.

The detail view window consists of the following tabs.

  • Summary: The Summary tab displays highlights of the event like the name of the downloaded asset, the name of the violated policy, and the email ID of the user who violated the policy.

  • Asset: The asset tab displays the details of the asset. You can view details like name of the downloaded asset, size of the downloaded asset, exfiltration action (download), owner's Salesforce ID and IP address. If there are multiple assets in a single violation, you can choose which asset's details must be displayed.

  • Actor: The actor tab displays the email ID of the Salesforce user who downloaded the asset. You can add notes on this tab which is displayed in the Admin notes section.

Taking Actions on the Events Page

The events list view displays an ellipsis menu at the extreme right corner. Admins can click this menu to take appropriate action on an exfiltration event.

The various available actions are explained as follows.

  • Acknowledge: This action can be taken when you just wish to acknowledge that you have viewed the violation.

  • Notify Email: This action sends an email notification to the end-user who caused the violation.

  • Notify Slack: This action sends a Slack notification to the end-user who caused the violation.

  • Ignore: This action ignored the violation. You can take this action when an event is false positive.

  • Freeze User: This action freezes the user account and logs them out of Salesforce. Users cannot login until admin unfreezes their account.

  • Revoke User Permission: This permission revokes the user's download privileges. Users can only view data in Salesforce. This action assigns the Salesforce's Minimum access profile to the user. You can learn more about this profile from this Salesforce document.

  • Unfreeze User: Once you freeze a user, this action is active. You can unfreeze a freezed user with this action.

Once the action is implemented, the status of the event changes respectively. By default, an event can have one of the following two statuses.

  • Active: The event has been generated but no action has been taken.

  • Input Requested: A notification has been sent to the end-user requesting their response.

You can also take action from the event detail view page. The actions are available at the bottom of the detail view page.

Last updated