arrow-left

Only this pageAll pages
gitbookPowered by GitBook
1 of 62

Data Exfiltration Prevention

Loading...

Loading...

Nightfall Detection Platform

Nightfall Copilot - NyX

Loading...

Dashboard and Events

Loading...

Exfiltration Prevention for Google Drive

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Exfiltration Prevention for Endpoint

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Exfiltration Prevention for Salesforce

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Forensic Search

Loading...

App Intelligence

Loading...

Nightfall Exfiltration

Cover

Exfiltration for Google Drive

Cover

Endpoint Exfiltration Prevention

Cover

Exfiltration for Salesforce

Cover

App Intelligence

Cover

Forensic Search

What is Data Exfiltration

Data exfiltration, also known as data theft, data exportation, or data extrusion, is the unauthorized transfer of data from a device or network. It can occur as part of an automated attack or can be performed manually. The illegitimate transfer of data often looks very similar to legitimate transfers, making it difficult to detect.

hashtag
Common Techniques for Data Exfiltration

Data exfiltration can occur in various ways and through multiple attack methods. Here are some of the most commonly used techniques:

  • Social Engineering and Phishing Attacks: These attacks trick victims into downloading malware and giving up their account credentials.

  • Outbound Emails: Cyber criminals employees or intruders use email to exfiltrate any data that sits on organizations’ outbound email systems.

  • Downloads to Insecure Devices: Data is transferred by users from secure, trusted systems to an insecure device. From there, the attacker can infiltrate the device and exfiltrate the data.

  • Uploads to Cloud Storage: Data can be exfiltrated from cloud storage when data is uploaded to insecure or misconfigured resources.

hashtag
Nightfall Exfiltration Solution

Nightfall provides a highly revolutionised solution to data exfiltration. Nightfall AI's exfiltration prevention capabilities easily integrate with existing tools, thus catering to security teams and companies across industries. Nightfall's exfiltration solution is much more than just a tool; it proactively protects against data breaches, providing tangible benefits for organizations striving to secure their sensitive information.

Data exfiltration, also known as data theft, data exportation, or data extrusion, is the unauthorized transfer of data from a device or network. It can occur as part of an automated attack or can be performed manually. The illegitimate transfer of data often looks very similar to legitimate transfers, making it difficult to detect.

hashtag
Common Techniques for Data Exfiltration

Data exfiltration can occur in various ways and through multiple attack methods. Here are some of the most commonly used techniques:

  • Social Engineering and Phishing Attacks: These attacks trick victims into downloading malware and giving up their account credentials.

  • Outbound Emails: Cyber criminals employees or intruders use email to exfiltrate any data that sits on organizations’ outbound email systems.

  • Downloads to Insecure Devices: Data is transferred by users from secure, trusted systems to an insecure device. From there, the attacker can infiltrate the device and exfiltrate the data.

hashtag
Nightfall Exfiltration Solution

Nightfall provides a highly revolutionised solution to data exfiltration. Nightfall AI's exfiltration prevention capabilities easily integrate with existing tools, thus catering to security teams and companies across industries. Nightfall's exfiltration solution is much more than just a tool; it proactively protects against data breaches, providing tangible benefits for organizations striving to secure their sensitive information.

Uploads to Cloud Storage: Data can be exfiltrated from cloud storage when data is uploaded to insecure or misconfigured resources.

Creating Policy

In this final stage, you assign a name to the policy, verify your configurations, and create the policy.

  1. Enter a name for the policy.

  2. (Optional) Enter a description for the policy.

  3. Click Next.

  1. Verify if all the policy configurations are set up as per your requirements.

  2. (Optional) Click back or click on any specific stage to modify any of the policy configurations.

  3. Click Submit.

Install Nightfall AI Agent for Windows OS

Nightfall for Windows OS allows you to detect exfiltration events on your Windows OS devices. The Nightfall exfiltration feature can monitor any files being uploaded through supported cloud storage apps or browsers on Windows OS devices.

To use Nightfall for macOS, you must install the Nightfall AI agent. This agent monitors your Windows OS device continuously. You can install the agent either manually or through a Mobile device management (MDM) tool. You can request the Nightfall deployment bundle which contains the data required for your MDM deployment.

circle-exclamation

At this time the Nightfall AI Endpoint Agent does not support the ARM processor architecture. However, ARM compatibility is being prioritized in a future release.

Configuring Google Drive Policies

Exfiltration policies allow you to monitor download events across your Google Drive environment. Through real-time download monitoring, you can identify insider risk and anomalous behaviour before it escalates to large scale security incidents. You can monitor download activity for specific users or user groups, specific drives containing valuable sensitive assets, or downloads of any files containing sensitive data types as discovered and classified by Nightfall's ML/AI based detectors.

You can set up your policies to monitor only, to educate users in real-time about your download and data governance policies, or to automatically suspend user access to the Google Workspace to enforce zero tolerance policies.

The detailed steps to configure the Google Drive Exfiltration policy is explained in the following documents.

Google Drive App Selection

In this stage, you select the Integration for which the policy is created. In this case, Google Drive integration must be selected.

  1. Click Policies from the left menu.

  1. Click + New Policy.

Endpoint Exfiltration Prevention

Nightfall supports exfiltration prevention in endpoint devices. The exfiltration prevention in endpoint devices prevents your organization's employees from exfiltrating data out of your organization. This feature is available for devices running on the macOS and Windows OS.

To monitor each device for exfiltration, you must first install the Nightfall agent on the devices that require monitoring. You can install the Nightfall agent either manually on each device. Alternatively, you can also use an MDM to install the agent. Once you install the Nightfall agent, you must create policies to start the monitoring. Nightfall monitors the devices as per the policy rules set.

You can learn about how to install the Nightfall AI agent for macOS/Windows OS and the process to create policies from the following links.

MAC/Windows App Selection

In this stage, you select the Integration for which the policy is created. In this case, Google Drive integration must be selected.

  1. Click Policies from the left menu.

  2. Click + New Policy.

Creating Policy

In this final stage, you assign a name to the policy, verify your configurations, and create the policy.

  1. Enter a name for the policy.

  2. (Optional) Enter a description for the policy.

  3. Click Next

Select Exfiltration.
  • Select Endpoint.

  • .
  • Verify if all the policy configurations are set up as per your requirements.

  • (Optional) Click back or click on any specific stage to modify any of the policy configurations.

  • Click Submit.

  • Creating Policy

    Remediation for Google Drive Exfiltration

    Google Drive App Selection
    Trigger
    Automated Actions

    Install Nightfall AI Agent for Windows OS

  • Configuring Policies

  • Install Nightfall AI Agent for MAC OS
    triangle-exclamation

    If you manage Chrome extensions via Google Workspace Admin Console

    Before deploying the Nightfall Agent, you must configure Chrome's PolicyMergeList setting in your Google Admin Console. Without this, the Nightfall extension's machine-level Chrome policy will override your existing Google Workspace-managed extensions, causing them to disappear from users' browsers.

    To configure PolicyMergeList:

    1. Go to Admin Console → Devices → Chrome → Settings

    2. Search for PolicyMergeList

    3. Select the Organizational Unit that covers your managed devices

    4. In the Configuration field, enter a specific policy name to allow the Nightfall policy to be merged across sources

    5. Click Save

    6. To verify, open Chrome on an affected machine and navigate to chrome://policy. The ExtensionInstallForcelist policy should show Source: Merged

    7. Policy changes can take up to 30 minutes to propagate. You can force a refresh by clicking Reload policies in chrome://policy.

    Not sure if this applies to you? If your IT team uses Google Workspace (Google Admin Console) to manage which Chrome extensions are force-installed on employee machines, this applies to you.

    Nightfall supports the following agent installation methods for Windows:

    • Manual Installation

    • Nightfall Windows Agent Deployment: JumpCloud MDM

    • Nightfall Windows Agent Deployment: Microsoft Intune

  • Select Exfiltration.

    1. Select the Google Drive integration.

    Nightfall Windows Agent Deployment: Rippling MDM

    Learn how to install the Nightfall agent on Microsoft Windows OS using the Rippling MDM.

    hashtag
    Prerequisites

    1. You have the Device Administrator role in Rippling.

    2. Target Windows devices have been onboarded into Rippling MDM.

    3. On your Nightfall console, navigate to and click the Download Package button on the top right corner of the page. Click Download Package for Windows. A .msiextension file is downloaded.

    hashtag
    1. Configure and Deploy Software Package

    1

    hashtag
    Create and Configure the Software Package in Rippling

    1. Navigate to:

    Admin Alerting

    Learn how to configure admin alerts in Nightfall exfiltration policies.

    This stage allows you to select the notifications channels. If Nightfall detects sensitive data in any of the selected upload channels, the notifications are sent to the recipients configured in this section.

    hashtag
    Admin Alerting

    This section allows you to send notifications to Nightfall users. The various alert methods are as follows. You must first turn on the toggle switch to use an alert method.

    circle-info

    The alert configurations configured in this section describe the process of creating alerts at the policy level. Policy-level alerts apply only to the policy on which they are configured. To configure an alert on all the mac/Windows OS Exfiltration policies, you must configure alerts at the integration level. To learn more about how to configure integration-level alerts, read .

    The steps to configure alert channels for policy-level integration are the same as in the case of integration-level alerts. You can refer to for steps.

    Trigger

    The trigger section further enhances the unwanted noise reduction capabilities. With the trigger section, you can

    • Set what download behavior can be termed as an exfiltration event.

    • Exclude downloads by trusted apps from being termed as exfiltration events.

    hashtag
    Configuring Trigger Section

    In the trigger section, you can set the download behavior, the download frequency to be precise, must be termed as an exfiltration event.

    To configure the Trigger section:

    1. Set the minimum number of downloads threshold that must be considered as an exfiltration event.

    2. Set the required time period (frequency). If the minimum download threshold (set in the previous step) is reached or exceeded, within the set time period, an exfiltration event is generated.

    In the following image, the configurations are set such that if an asset is downloaded 2 or more times within 10 minutes, an exfiltration event is triggered.

    triangle-exclamation

    You must set the action frequency carefully. For example, consider that you set the download condition as 5 or more files, within 1 hour. In this case, if a user downloads four assets, every 1 hour, the policy does not trigger a violation, since the condition is not met.

    hashtag
    Exclude Apps

    Depending on your environment, a significant number of downloads may be attributed to applications (i.e. backup apps). You may choose to ignore such download events to reduce the noise and focus your monitoring on unexpected application and user download events.

    The Exclude apps section allows you to exclude specific applications from being monitored by your policy.

    To configure the Exclude apps section, select the applications to exclude from the drop-down menu. Once saved, Nightfall will not alert on download events attributed to the excluded applications.

    Nightfall Exfiltration for Salesforce

    Nightfall Exfiltration for Salesforce helps you to keep tab of the exfiltration activities in your Salesforce orgs. Nightfall leverages Salesforce Shield Real Time Event Monitoring for exfiltration activities across your Salesforce orgs and identifies activities which are in violation to configured policies.

    Download of attachments, files, reports and bulk download of objects are all exfiltration event recognised by Nightfall. You can configure policies to set appropriate thresholds for such events and identify them as unwarranted that may require scrutiny. You may configure the policy to alert the stakeholders who need to be notified and choose one of the available actions to be invoked automatically. You may also choose not to configure automated actions but only act after evaluating the specific exfiltration events.

    hashtag
    Prerequisites

    Nightfall exfiltration leverages Salesforce Shield's Event Monitoring to identify exfiltration events. Salesforce Shield provides multiple security tools to safeguard your Salesforce orgs. Nightfall depends on in Salesforce Shield which is available as an independent module within . You must enable the following Event Monitoring settings for all the Salesforce orgs that you wish to monitor,

    • Generate event log files - Generate an event log file when events occur in your org.

    • Enable Lightning Logger Events - Enable collection of Lightning Logger Events in custom components.

    • Enable the following events for storage and streaming

    You can learn more about Salesforce Shield and once enabled, advance to the next steps with

    If you have already onboarded your Salesforce org to Nightfall platform, please ensure you have the latest Nightfall DLP package deployed in your Salesforce org. Follow the steps mentioned in to upgrade it to the latest version.

    circle-exclamation

    You must perform the above actions only on those Salesforce orgs in which the Salesforce Shield Event monitoring module is enabled.

    hashtag
    Installation Doc Links

    The installation procedure remains the same as in case of Salesforce DLP for sensitive data. The links to the installation and upgradation documents are as follows.

    Configuring Salesforce Exfiltration Policies

    Exfiltration policies allow you to monitor download events across your Salesforce environment. Through real-time download monitoring, you can identify insider risk and anomalous behaviour before it escalates to large scale security incidents. The following are supported and monitored by Nightfall for exfiltration activities,

    • Attachments & Files

    • Reports

    • Records & Objects

    Download of any of the above information containers is an exfiltration activity for Nightfall, and if such activities breach a threshold set in one of the exfiltration policies in Nightfall, then Nightfall will flag it an exfiltration event. You can configure which users should receive notifications and what automatic actions must be taken when an exfiltration event is detected.

    The detailed steps to configure the Salesforce Exfiltration policy is explained in the following documents.

    Creating Policy

    In this final stage, you assign a name to the policy, verify your configurations, and create the policy.

    1. Enter a name for the policy.

    2. (Optional) Enter a description for the policy.

    3. Click Next.

    1. Verify if all the policy configurations are set up as per your requirements.

    2. (Optional) Click back or click on any specific stage to modify any of the policy configurations.

    3. Click Submit.

    Advanced Settings

    Learn about the advanced setting options present in the Nightfall exfiltration policy for MAC devices.

    The advanced settings pages allows you to configure notifications for Nightfall admins and end-users. Additionally, you can also configure automated actions. The various configurations available in the advanced settings pages are described in the following sections.

    • Admin Alerting

    • Automated Actions

    Salesforce App Selection

    In this stage, you select the Integration for which the policy is created. In this case, Salesforce integration must be selected.

    1. Click Policies from the left menu.

    1. Click + New Policy.

    1. Select Exfiltration.

    1. Select the Salesforce integration.

    circle-exclamation

    If the event monitoring module is not setup in Salesforce, event monitoring is displayed as "disabled" on the Scope page as shown in the following image.

    Nyx – AI-powered DLP Copilot

    Learn about Nyx. Nightfall's AI-powered Copilot.

    Nyx is Nightfall’s AI-powered DLP Copilot, designed to help you quickly investigate and understand exfiltration risks. She can surface patterns, summarize user activity, and suggest next steps — all through a simple natural-language conversation.

    hashtag
    Getting Started

    1. Click the Comet Icon: In the upper right corner of your Nightfall dashboard, click the comet icon to open Nyx.

    Automated Actions

    This stage allows you to select automated notification channels or actions if a policy violation occurs.

    hashtag
    Admin Alerting

    This section allows you to send notifications to Nightfall users. The various alert methods are as follows. You must first turn on the toggle switch to use an alert method.

    circle-info

    Automated Actions

    Learn more about how automated actions work in a Nightfall exfiltration policy.

    This section describes the various actions that Nightfall takes automatically when an exfiltration attempt is detected. This automated action is triggered when the condition set in the section is violated.

    The automated action supported by Nightfall is described as follows.

    hashtag
    Block Transfer

    This action automatically blocks the process of file transfer thus preventing an exfiltration attempt. You can use this action to prevent the upload of files with sensitive data, to web browsers or cloud storage apps. You must enable the toggle switch to activate the automated action.

    Scope

    The Scope section determines which areas of Nightfall needs to be monitored by Nightfall for Exfiltration. You can choose one or all of the following data types to be monitored.

    • Attachments & Files

    • Reports

    Nightfall macOS Agent Deployment: Mosyle MDM

    Below is a step-by-step guide to deploy the Nightfall Endpoint DLP agent for macOS using Mosyle MDM.

    hashtag
    Pre-Requisites

    1. Target macOS devices are onboarded and managed through your MDM.

    Trigger

    The Trigger section in Salesforce policies allows you to define the frequency of action that must be considered as an exfiltration event. In case of Salesforce policies, the download frequency is the trigger.

    The download frequency can be defined as the number of downloads over a period to time. This allows you to set custom thresholds in terms of number of downloads over a specific period of time and can be useful to identify anomalous download patterns for specific locations, users or content type. This can be set in combination to other scoping capabilities.

    hashtag
    Configuring Triggers

    In the Actions section, you can define the download action that must be considered as a potential exfiltration attempt by Nightfall. Nightfall allows you to set the frequency of downloads as the action.

    Nightfall Windows Agent Deployment: Workspace ONE UEM

    Below is a step-by-step guide to deploy the Nightfall Endpoint DLP agent for Windows using Workspace ONE UEM.

    hashtag
    Pre-Requisites

    1. Confirm that the Windows devices are enrolled and managed through Workspace ONE.

    End-User Notifications

    Learn how to configure end user notifications in Nightfall exfiltration policies.

    This section allows you to configure notifications to be sent to the end user whose actions triggered the violation.

    hashtag
    Custom Message

    Enter a custom message to be sent to the end user. This message is sent in an Email or a Slack message. You can modify the default message provided by Nightfall and draft your own. The total character length allowed is 1000 characters. You can also add hyperlinks in the custom message. The syntax is <link | text >. For example, to hyperlink https://www.nightfall.ai with the text Nightfall website, you must write < | Nightfall website>.

    Confirm that a device group has been set up for deployment.
    • From UEM, navigate to Groups & Settings > Groups > Assignment Groups > click "+ Add Smart Group" and follow the prompts

  • Download "NightfallAgent.msi" from the Nightfall console:

    1. Log into Nightfall > Integrations > Manage (Endpoint Windows) > click "Download Package" > click "Download Package for Windows"

    2. Unpack the file.

  • Additionally, take note of the install command for Windows machines. This will need to be copied later.

  • hashtag
    Deploy Nightfall Agent and Extension

    This step deploys both the agent and the extension via the same MSI file.

    1. Log into Workspace ONE UEM

    2. Navigate to Resources > Native Apps > click "Add" > select "Application File"

    3. Click "Upload" > click "Choose File" > select "NightfallAgent.msi" > click "Save"

    4. Click "Continue"

    5. Under Details tab > Supported Processor Architecture > Select "64-bit"

    6. Navigate to the Deployment Options tab > Locate "Install Command"

    7. Paste the command from the Nightfall console into "Install Command".

    8. Click "Save & Assign"

    9. Set a Name for the Distribution.

    10. Choose an Assignment Group. NOTE: Use the group that was created from the Prerequisites section.

    11. Decide if the App Delivery Method should be Auto or On Demand. For a manual trigger use On Demand.

    12. Click "Create" > click "Save" > click "Publish"

    Nightfall Windows Agent Deployment: MSI
    Nightfall Windows Agent Deployment: Rippling MDM
    Nightfall Windows Agent Deployment: Workspace ONE UEM
    this documentarrow-up-right
    this documentarrow-up-right

    Bulk API Result Event - Track when a user downloads the results of a Bulk API request

  • File Event - Track file activity. For example, track when a user downloads or previews a file

  • Report Event - Track when a user accesses or exports data with reports

  • SessionHijacking Event - Track when an unauthorised user gains ownership of a Salesforce user’s session with a stolen session identifier

  • Event Monitoringarrow-up-right
    Salesforce Shieldarrow-up-right
    herearrow-up-right
    Installing Nightfall DLP for Salesforcearrow-up-right
    Upgrading Nightfall DLParrow-up-right
    Installing Nightfall DLP for Salesforcearrow-up-right
    Upgrading Nightfall DLP for Salesforcearrow-up-right
    Salesforce App Selection
    Scope
    Trigger
    Advanced Settings
    Creating Policy
    Remediation for Salesforce Exfiltration
    End-User Notifications

    Click Upload Software on the right of the pane and provide the following details.

    1. Name: “Nightfall Endpoint DLP Agent <version>”

      • <version> is the version of the package your received from Nightfall.

    2. Operating System: “Windows”

    3. Category: “My Uploads” (Default)

    4. Description: “Nightfall Endpoint DLP Agent”.

    5. Upload Icon: use the .png icon file provided.

    6. Upload Installer File: Drop or select the downloaded NightfallAgent.msi file.

    7. Under Silent arguments add /qn /norestart API_KEY="" COMPANY_ID="" INSTALL_NF_DRIVER="1" where the content of API_KEY and COMPANY_ID are the values provided to you by Nightfall. Note that these values must be enclosed in " double quote characters.

    8. Click Submit.

    9. You will receive an email from Rippling with the subject: “Your recently uploaded custom software is processing”

    10. After a period of time (typically less than 1 hour) You will receive an email from Rippling: “Your recently uploaded custom software has been processed successfully!”

    11. You may now proceed to step 2. to deploy the agent.

    2

    hashtag
    Deploy the Nightfall Endpoint DLP Agent

    1. Click Add on the newly created Software Item in the Rippling Software Catalog.

    2. Click Finished Selecting.

    3. Search or scroll to the newly added item matching the name you used in the previous step.

      1. Click Edit

        1. Select all employees or specific target devices.

    circle-info

    The Nightfall Endpoint DLP Agent will now deploy to all selected target devices. This may take up to 72 hours and is dependent on the endpoint devices being turned on, connected.

    https://app.nightfall.ai/endpointarrow-up-right
    https://app.rippling.com/hardware/softwarearrow-up-right

    Start Conversing: Type your question in plain English — no special syntax required.

    hashtag
    Things You Can Ask Nyx

    • “What are my most common exfiltration patterns?”

    • “Summarize Bob’s activity over the last 7 days.”

    • “What are my most frequent upload domains? Put results in a table.”

    • "Write an email to Bob's supervisor for me."

    hashtag
    Beta Limitations

    • Nyx can process up to 100 exfiltration events at a time.

    • Available for endpoint customers only. Support for other event types coming soon.

    hashtag
    Give Us Feedback

    Your feedback will directly shape Nyx’s future! After trying her out, let us know what works well and what could be improved.

    hashtag
    Learn More

    • Inside the making of Nyx, our AI Copilotarrow-up-right

    • Get a Nyx demo

    The alert configurations configured in this section describe the process of creating alerts at the policy level. Policy-level alerts apply only to the policy on which they are configured. To configure an alert on all the Google Drive Exfiltration policies, you must configure alerts at the integration level. To learn more about how to configure integration-level alerts for the Google Drive integration, read this document.

    The steps to configure alert channels for policy-level integration are the same as in the case of integration-level alerts. You can refer to this document for steps.

    hashtag
    Automated Actions

    Automated actions allow you to configure automated remediation actions when an exfiltration attempt is detected by Nightfall policy. Nightfall supports the following automated actions for Google Drive. You can choose to implement the automated action immediately after detecting a download attempt or after some time.

    Suspend Account: This action suspends the user's account who tried to download files and triggered the exfiltration event.

    To enable the automated action, you must turn on the respective toggle switch.

    You must now select when exactly after detecting the event, the action must be triggered. if you select the Immediately option, the automated action is triggered immediately after the download attempt is made.

    If you select the After option, you must select the time gap after which the automated action must be implemented.

    hashtag
    End-User Notification

    This section allows you to configure notifications to be sent to the end user whose actions triggered the violation.

    hashtag
    Custom Message

    Enter a custom message to be sent to the end user. This message is sent in an Email. You can modify the default message provided by Nightfall and draft your message. The total character length allowed is 1000 characters. You can also add hyperlinks in the custom message. The syntax is <link | text >. For example, to hyperlink www.nightfall.aiarrow-up-right with the text Nightfall website, you must write <www.nightfall.ai|Nightfall website>.

    hashtag
    Automation

    The automation settings allow you to send notifications to end users. You can select one or both the notification methods. You must first turn on the toggle switch to use the automation option. The automation notification channels are as follows

    • Email: This option sends an Email to the user who attempted the download.

    • Slack: This option sends a Slack message to the user who attempted the download.

    hashtag
    End-User Remediation

    End-user remediation (also known as Human Firewall) allows you to configure remediation measures that end users can take, when a violation is detected on by their download attempt. You must turn on the toggle switch to use this option. End-users receive the remediation actions in an Email as an action item. The various available remediation actions for end-users are as follows.

    • Report as False Positive with Business Justification: This option allows end users to report false positive alerts and provide a business justification as to why the alert is considered to be false positive.

    When end-users report alerts as false positive, you can choose the resolution method to be either Automatic or manual.

    If end-users do not take any remediation action, you can set the frequency at which they must receive the notifications to take action.

    You can configure the Scope section and the Trigger section such that you can leverage this feature to:

    • Block transfer based on file origin: Block the upload of files downloaded from highly sensitive SaaS applications.

    • Block transfer based on destination: Allow uploads only to sanctioned destinations.

    • Combine origin and destination: Create powerful DLP policies that factor in both where files came from and where they are headed.

    circle-exclamation

    Currently, this action is supported only for MAC devices.

    Some use cases scenarios in which you can use the automatic Block action, are as follows.

    hashtag
    Scenario 1: Prevent Exfiltration of sensitive data to unsanctioned destinations

    Employees access confidential reports from an internal data repository and attempt to upload them to personal iCloud or unsanctioned personal email service.

    Solution

    Configure the filters in the Scope section to scope the policy to include domains to be monitored (for instance your organization *.drive.google.com or *.force.com). Now, any file(s) downloaded from the configured domain(s) are monitored. Configure the Trigger section to trigger an exfiltration action when an attempt is made to upload the downloaded file to an unsanctioned destination (for instance to personal iCloud or a non corporate sanctioned domain). Finally, enable the Block automated action.

    In this scenario, if a user downloads a file from an organization's Google Drive or Salesforce and attempts to upload it to their personal iCloud, the action is blocked and user gets the following error message.

    Also, other similar scenarios could be

    • A health department which prevents employees from uploading customer health data, downloaded from organization's domain, to employees' personal Google Drive, OneDrive, or any supported cloud storage app.

    • An employee working on code repository of an organization, attempting to upload a file to developer forums, LLM services, or generative AI apps like ChatGPT.

    hashtag
    Scenario 2: Allowing upload action only to approved destinations

    An organization allows employees to store work documents only in corporate-managed OneDrive or Google Drive but wants to prevent uploads to personal accounts.

    Solution

    Configure the filters in the Scope section to scope the policy to include domains to be monitored (for instance your organization Google Drive or OneDrive). Now, any file(s) downloaded from the configured domain(s) are monitored. Configure the Trigger section to monitor only unsanctioned domains. Finally, enable the Block automated action. Now any attempt to upload a file to sanctioned domains is allowed.

    Trigger
    Records & Objects

    After you make the required selection, you can also add filters to monitor specific Salesforce users or Salesforce profiles.

    circle-info

    If you have connected multiple Salesforce org, the scope page allows you to select one and only one Salesforce org for the policy.

    triangle-exclamation

    Nightfall can detect download actions done only from the Salesforce lightning version. Any download action done on the Salesforce Classic version cannot be detected by Nightfall.

    hashtag
    Data Types

    In the Data Types section, you must select the Salesforce data types to be monitored. By default, all the three data types are selected. You can choose to either retain all the three data types or clear any of the data types.

    circle-info

    It is mandatory to select at least one data type for monitoring.

    hashtag
    Filters

    The Filters section allows you to add additional filters, on top of the selected data types, to narrow down the monitoring scope. Nightfall provides the following two types of filters.

    hashtag
    Internal Users

    You can choose specific Salesforce users whose activities need to be monitored or excluded from being monitored. Nightfall populates the list of all your users from Salesforce. You need to select either the users whose activities need to be monitored or the users whose activities need to be excluded from monitoring.

    To add Users filter, click Add Filter and select Internal Users.

    To monitor specific users, select the Monitor specific option. To exclude specific users from being monitored, select the Monitor all, except option.

    Nightfall populates the list of Salesforce users in the Search users field. You can select the all the required users.

    hashtag
    Salesforce Profiles

    You can choose specific Salesforce profiles whose activities need to be monitored or excluded from being monitored. Nightfall populates the list of all your Salesforce profiles. You need to select either the profiles whose activities need to be monitored or the profiles whose activities need to be excluded from monitoring.

    To monitor specific Salesforce profiles, select the Monitor specific option. To exclude specific Salesforce profiles from being monitored, select the Monitor all, except option.

    Nightfall populates the list of Salesforce profiles in the Search profiles field. You can select the all the required users.

    hashtag
    Example Scenario

    Contoso Ltd. uses Salesforce to host their applications. They have three users Steve, Rick, and Matt in their Salesforce org. These users are not Contoso employees. They are employees of Acme corp. which is a prospective customer of Contoso Ltd. Steve, Rick, and Matt are evaluating Constoso's app so that they can check if it meets Acme corp's requirements. Contoso has created a Salesforce profile called Prospective customers and added these three users to this profile

    Contoso Ltd. uses Nightfall Salesforce exfiltration and wishes to check if any files with sensitive data is downloaded by any of these three users. They create a Salesforce exfiltration policy to monitor all the data types. They can choose one of the following filter.

    • They can use the Internal Users filter and add these three users.

    • They can select the Salesforce Profiles filter and add the Prospective customers profile to it. So, in future if any other prospective customers added, they are also automatically monitored.

    You have defined a device group to target your deployment to.

    hashtag
    Step 1: Deploy Nightfall’s Custom Profile

    1. Unpack the zip file provided and locate the NightfallAI_Profile.mobileconfig file in the Profiles folder.

    2. Navigate to Management > Configuration Profiles.

    3. Click the Upload button and upload NightfallAI_Profile.mobileconfig.

    4. Configure the settings for your configuration profile.

    5. In the Scope tab, add the target devices or device groups to which this profile should be deployed.

    6. Click Save.

    Once assigned, the profile will be automatically deployed to target machines.

    hashtag
    Step 2: Upload the Nightfall .pkg to Mosyle CDN

    1. On Mosyle, navigate to Management > Install PKG > CDN.

    2. Upload the nightfall-ai-agent-signed.pkg.

    3. This creates a unique CDN reference, e.g.: %MosyleCDNFile:d4d8f767-3f99-4747-8041-253ea90c462d%

    hashtag
    Step 3: Custom Command

    1. Unpack the zip file provided and locate the mdm_pre_installation_check_script.sh file in the mdm_scripts folder.

    2. On Mosyle, navigate to Management > Custom Commands.

    3. Paste the content of mdm_pre_installation_check_script.sh into the script editor.

    4. Update the script as follows:

      1. Remove the exit 0 line at the bottom of the script.

      2. Append the following block at the end of the script:

    5. Target the command to desired devices group

    6. Click Save.

    hashtag
    How to Perform an Upgrade

    1. Upload the new version of the .pkg file to the same Install PKG entry in Mosyle.

    2. Update the CDN variable in the script accordingly.

    3. Re-save the custom command profile to trigger an update on target devices.

    To configure Actions:

    1. Click the minimum number of files that must be the download threshold.

    1. Set the time period within which the minimum no. of downloads must be considered as exfiltration event.

    In the following case, an exfiltration event is created if, there are 2 or more downloads within a minute.

    triangle-exclamation

    You must set the action frequency carefully. For example, consider that you set the action condition as 5 or more files, within 1 hour as shown in the following image. In this case, if a user downloads four assets, every 1 hour, the policy does not trigger a violation, since the Action condition does not match. So, a user can keep downloading four files every hour and get away with it.

    hashtag
    Automation

    You can either select Email, Slack, or both as an automated notification method. You must turn the toggle switch to use this option. Based on the options selected, end-users receive notifications in their Email or Slack, based on the option(s) enabled.

    hashtag
    End-User Remediation

    End-User Remediation (also known as Human Firewall) allows you to configure remediation measures that end-users can take when an exfiltration event is triggered due to their actions. You must turn on the toggle switch to use this option. When you configure end-user remediation, the user whose actions triggered the exfiltration event receives a notification from Nightfall. This notification provides details of the user's actions that caused the exfiltration along with your custom message. End-users can take appropriate actions.

    Nightfall supports the following remediation actions for end-users.

    • Provide Business Justification: This option allows end-users to add a descriptive note on the file transfer or exfiltration event. Basically, users can provide a business justification giving you more context into the file transfer or a business justification. The user input is delivered directly to the console for review, saving you time and helping you assess the risk of the data transfer based on the additional user input.

    When an end-user decides to provide a business justification, the following screen is displayed.

    Based on the user response, the Exfiltration Event is updated.

    The other options available to be configured in this section are:

    • When a Violation is Reported as False Positive (justified): You can use this option to set actions to be taken when input has been provided by the end-user. You can automatically ignore violations for which the user has provided input.

    • Remind Every (until Violation expires): You can use this option to adjust the frequency at which Nightfall should remind the user to provide context into their data transfer. You can choose to remind the end user every 24, 48, or 72 hours.

    https://www.nightfall.aiarrow-up-right

    Install Nightfall AI Agent for MAC OS

    Nightfall for macOS allows you to detect exfiltration events on your macOS devices. The Nightfall exfiltration feature can monitor any files being uploaded through supported cloud storage apps or browsers on macOS devices.

    To use Nightfall on macOS, you’ll need to install the Nightfall AI agent. You can install it manually for testing or evaluation purposes, or automate the install through MDM.

    triangle-exclamation

    Apple requires the use of MDM profiles for applications like Nightfall AI to obtain the necessary permissions to function properly. While you can grant these permissions manually, there is no supported or scriptable alternative to an MDM solution for seamless, unattended deployment at scale.

    triangle-exclamation

    If you manage Chrome extensions via Google Workspace Admin Console

    Before deploying the Nightfall Agent, you must configure Chrome's PolicyMergeList setting in your Google Admin Console. Without this, the Nightfall extension's machine-level Chrome policy will override your existing Google Workspace-managed extensions, causing them to disappear from users' browsers.

    To configure PolicyMergeList:

    Nightfall supports the following agent installation methods for macOS:

    hashtag
    Stealth Mode Installation

    You can install the Nightfall AI macOS agent in stealth/hidden mode. Installing the agent in stealth mode allows you to hide visible UI elements once the Nightfall agent is installed. When you install the agent in silent mode, the Nightfall status bar icon. Additionally, the Nightfall application will not be visible in the Applications folder when viewed in Finder.

    hashtag
    Use cases

    • Covert Monitoring: If an organization suspects an employee of exfiltrating sensitive data, they can install the agent in stealth mode to monitor the employee's asset without the employee's knowledge.

    • Ensuring Bias-Free Compliance: An organization wishes to confirm if their employees are adhering to HIPAA/PCI compliances; they can install the agent in stealth mode without giving any indication to their employees (which can prompt a change in their behavior).

    • Prevent User Distractions: Organizations that do not wish to distract their users about the agent presence and monitoring can depoy in stealth mode.

    hashtag
    Stealth Mode Installation Process

    1. In the mdm_pre_installation_script.shfile, find the hide_status_iconflag.

    2. Set the flag to true. By default, the flag is set to false⁣.

    triangle-exclamation

    Stealth mode installation hides the agent only from UI. Employees can find Nightfall if they navigate to the Application folder via Terminal.

    hashtag
    Nightfall Agent Auto Update

    Nightfall employs the automatic endpoint update functionality. With this feature, Nightfall can deliver the majority of endpoint agent bug fixes and feature updates directly to endpoints.

    Features:

    • Stay Secure: Receive the latest security patches and updates promptly, reducing the risk of vulnerabilities being exploited.

    • Remain Compatible: Keep your deployment compatible with the latest operating system updates and other software changes.

    • Receive New Features: You get access to new features and improvements to exfiltration monitoring without manual intervention.

    Installing Nightfall for Google Drive

    This document explains the steps to install the Nightfall for Google Drive.

    hashtag
    Requirements

    To install the Nightfall DLP for Google Drive integration, you must have the following:

    • A Google Workspace account, preferably a service account.

    • An admin user account of your organization's Google Workspace account (or any other Google Workspace account) on which you wish to install the integration.

    hashtag
    Installation

    To install Nightfall for Google Drive:

    1. Log in to Nightfall.

    2. Click Google Drive under the MY INTEGRATIONS section (click Show more if you are unable to view Google Drive)

    3. Click Begin Setup. 

    The access permission page is displayed as follows. Copy the client ID and Scopes ID generated.

    1. Login to your Google Workspace with an admin account.

    2. Click the menu icon.

    3. Select Admin.

    1. In the Admin console left pane, expand Security and then expand Access and data control.

    2. Click API controls.

    1. Click MANAGE DOMAIN WIDE DELEGATION under Domain wide delegation.

    1. Click Add New.

    1. Paste the Client ID copied from the Nightfall app, in the Client ID field.

    2. Paste the Scopes ID copied from the Nightfall app, under OAuth Scope field. Use comma to add multiple scope IDs.

    3. Click AUTHORIZE.

    1. Return to the Nightfall app and click Next Step.

    1. Click Connect.

    Once the installation is completed, you can view the details of your Google Drive in the Nightfall app.

    circle-info

    Once the installation is completed, Nightfall connects to your Google Workspace account and fetches all the domains. In the above image, you can see that 3 domains are fetched. These three domains were already present in your Google Workspace and are considered to be internal. You can add additional domains by clicking the ellipsis menu at the right end and selecting Manage Domains.

    Nightfall macOS Agent Deployment: PDQ SimpleMDM

    Below is a step-by-step guide to deploy the Nightfall Endpoint DLP agent for macOS using PDQ's SimpleMDM.

    hashtag
    Pre-Requisites

    1. Enroll devices in PDQ SimpleMDM

    2. Create a Device Group with the respective macOS machines assigned to it

    3. Download and unpack Nightfall's install package from the console:

      • Integrations > Manage (Endpoint Windows) > Download Package > click "Download Package"

    circle-exclamation

    PDQ SimpleMDM does not have the ability to run a job to deploy in a specific order. Due to this, follow the steps below explicitly so as to make sure the agent has the appropriate permissions during install.

    hashtag
    Step 1: Deploy the Script

    1. From within SimpleMDM, navigate to Scripts > click “Scripts” > click “Create Script”

    2. Name: Nightfall Pre-Installation Script

    3. Click “Choose File”

    hashtag
    Step 2: Deploy the Profile

    1. Navigate to Configs > click “Profiles” > click “Create Profile”

    2. Select “Custom Configuration Profile”

      1. Name: Nightfall Profile

    hashtag
    Step 3: Deploy the Agent

    1. Navigate to Apps & Media > click “Catalog” > click “Add App” > select “Custom App”

    2. From the mac_bundle folder, locate the “nightfall-ai-agent-signed.pkg” > click “Open”

    3. Click the “Groups” tab > click “Assign Groups”

    Nightfall macOS Agent Deployment: Workspace ONE UEM

    Below is a step-by-step guide to deploy the Nightfall Endpoint agent for macOS using Workspace ONE UEM.

    hashtag
    Pre-Requisites

    1. Confirm that the macOS devices are enrolled and managed through your MDM.

    Manual Installation

    Learn how to install the Nightfall agent on Microsoft Windows OS manually.

    hashtag
    Overview

    This document outlines the steps to manually deploy the Nightfall AI Agent on a Windows device.

    hashtag

    Click Save.
    Select the “mdm_pre_installation_script.sh” from the mdm_scripts folder that was downloaded from the Nightfall Console.
  • Create a job.

    1. Navigate to Scripts > click “Job” > click “Create Job”

    2. Name: Deploy Nightfall Pre-Install Script

    3. Script: Select the “Nightfall Pre-Installation Script”

    4. Run on: Select the Group

    5. Run Options: Select “Run ASAP”

    6. Click “Create”

  • Uncheck “Install via Declarative Management”
    circle-exclamation

    In testing there were issues with profile deployment unless this was unchecked.

  • Mobileconfig: Click “Choose File”

  • From the mac_bundle folder, navigate to “profiles” > select “NightfallAI_Profile_with_Browser_Extensions.mobileconfig”

  • OS: Only select “macOS”

  • Navigate to the “Groups” tab

  • Click “Assign Group”

  • Select the group > click “Assign”

  • Navigate back to “Profile” tab > click “Save”

  • Install Method: MDM
  • Install Type: Auto

  • Groups: (select group)

  • Click “Assign”

  • Click “Done”

  • Go to Admin Console → Devices → Chrome → Settings

  • Search for PolicyMergeList

  • Select the Organizational Unit that covers your managed devices

  • In the Configuration field, enter a specific policy name to scope this down to Nightfall policy to be merged across sources

  • Click Save

  • To verify, open Chrome on an affected machine and navigate to chrome://policy. The ExtensionInstallForcelist policy should show Source: Merged

  • Policy changes can take up to 30 minutes to propagate. You can force a refresh by clicking Reload policies in chrome://policy.

  • Not sure if this applies to you? If your IT team uses Google Workspace (Google Admin Console) to manage which Chrome extensions are force-installed on employee machines, this applies to you.

    Nightfall macOS Agent Deployment: Iru (Kandji) MDM
  • Nightfall macOS Agent Deployment: Mosyle MDM

  • Nightfall macOS Agent Deployment: PDQ SimpleMDM

  • Nightfall macOS Agent Deployment: Rippling MDM

  • Nightfall macOS Agent Deployment: Workspace ONE UEM

  • Minimize Administrative Overhead: IT administrators don't need to manually deploy updates to each endpoint, saving time and resources.

    Manual Installation
    Nightfall macOS Agent Deployment: JAMF MDM
    Nightfall macOS Agent Deployment: JumpCloud MDM
    Update the MosyleCDNFile variable with the unique entry generated from the previous step.
    # Define variables
    PKG_URL="%MosyleCDNFile:<your-pkg-id-here>%"  # Replace with your actual Mosyle CDN variable
    SAVE_PATH="/tmp/nightfall-ai-agent-signed.pkg"
    
    # Download and install the agent
    curl -L "$PKG_URL" -o "$SAVE_PATH"
    installer -pkg "$SAVE_PATH" -target /
    
    # Do NOT include `exit 0` or `exit 1`
    Confirm that a device group has been set up for deployment.
    • From UEM, navigate to Groups & Settings > Groups > Assignment Groups > click "+ Add Smart Group" and follow the prompts

  • Download "mac_bundle.zip" from the Nightfall console:

    1. Log into Nightfall > Integrations > Manage (Endpoint macOS) > click "Download Package" > click "Download Package for macOS"

    2. Unpack the file.

  • circle-exclamation

    The steps below will immediately push to the Assignment Group what is being published at that time. To deploy everything at once and in a specific flow, use the Freestyle Orchestrator feature.

    This guide does not cover the Freestyle Orchestrator Workflow.

    hashtag
    Step 1: Deploy Nightfall Scripts

    This step deploys one script - the pre_installation_script. The "pre installation script" ensures the machine is in a clean state for the Nightfall install and wipes any preexisting Nightfall installations.

    1. From UEM, navigate to Resources > Scripting > Scripts > click "Add" > select "macOS"

    2. Add the Nightfall Pre-Installation Script:

      1. Name the script "Nightfall Pre-Installation Script" and add a description.

      2. Confirm the language is "Bash".

      3. Click "Upload" > navigate to "mac_bundle" > "mdm_scripts" > and select the mdm_pre_installation_script.sh > click "Open" > click "Next"

      4. Click "Save".

    3. Assign the Pre-Installation Script to the smart group.

      1. From the Scripts page > select the "Nightfall Pre-Installation Script" > click "Assign"

      2. Click "New Assignment" at the top-left.

    hashtag
    Step 2: Deploy Nightfall’s Custom Profile

    This step deploys the mobileconfig profile to push the browser extension and to give permissions to the agent. Always make sure this step takes place before Step 3 - deploying the PKG.

    1. From Workspace ONE UEM, navigate to Resources > Profiles & Baselines > Profiles

    2. Click the "Add" dropdown > select "Upload Profile" > Select platform: "Apple macOS"

    3. Select "Device Profile" (if desired)

    4. Click "Upload" > "Choose File" > navigate to mac_bundle > profiles

    5. Select the mobileconfig entitled, NightfallAI_Profile_with_Browser_Extensions.mobileconfig NOTE: If the "with_browser_extensions" file is not selected it will not deploy the Nightfall extension within the browser and key functionality of Nightfall could be lost.

    6. Click "Save" > click "Continue".

    7. Under "Smart Groups", assign target devices by adding the group previously created from the Prerequisite steps. NOTE: All other settings are optional and depend upon your organization's preference.

    8. Click "Save and Publish"

    9. Review to confirm that the device assignment is correct.

    10. Click "Publish"

    Once published, the profile will be automatically deployed to target machines.

    circle-info

    The Profiles page needs refreshed to see the new profile. Come back to this page and click "View" to see the status of the deployment.

    hashtag
    Step 3: Deploy Nightfall's .PKG

    This step deploys the PKG, which pushes out the agent to the targeted devices.

    1. From UEM, navigate to Resources > Apps > Native Apps

    2. Click "Add" dropdown > select "Application File"

    3. Click "Upload" > tick "Local File" > Click "Choose File" > select nightfall-ai-agent-signed.pkg > click "Open" > click "Save" > click "Continue"

    4. Select the preferred Deployment Type as "Full Software Management"

    5. Download and run the Workspace One Admin Assistant and follow the steps to generate a .plist for the Nightfall PKG.

    6. Click "Upload" > click "Choose File" > navigate to the plist file > click "Open" > click "Save"

    7. Click "Continue" > navigate to the "Images" tab > drag over the Nightfall icon generated

    8. Click "Save & Assign"

    9. Name the Distribution and add a description.

    10. Choose the same "Assignment Group" as in Step 2.

    11. Adjust the "App Delivery Method" accordingly > click "Create"

    12. Click "Save"

    13. Review the devices being deployed to, and if correct click "Publish".

    hashtag
    How to Perform an Upgrade

    Nightfall upgrades the agents automatically when the latest version is available from the console. To push a newer version from Workspace One UEM out-of-band simply perform Step 3arrow-up-right again by uploading a new package.

    circle-info

    Once a managed package is uploaded, as in Step 3, it is not possible to upload another package within the already created app. A newly created Native App will be required.

    Prerequisites
    • Ensure that Windows endpoint has been enabled on your Nightfall tenant.

      • Download the Nightfall AI Agent NightfallAgent.msi file from Nightfall.

        • Download NightfallAgent.msi from Nightfall portalarrow-up-right to a local folder on the target machine

          • Integrations -> Endpoint Windows -> Manage -> Download Package -> Download Package For Windows

    • Navigate to https://app.nightfall.ai/policies/setuparrow-up-right > Exfiltration > Endpoint - (optional)

    hashtag
    Deployment Steps

    1. Copy downloaded NightfallAgent.msi to a folder on a target machine.

    2. Run the Installer:

      1. Launch CMD as an Administrator

    b. Navigate to the folder where NightfallAgent.msi is downloaded to.

    i. cd C:\\users\\<username>\\Downloads\\ update the above accordingly.

    c. Copy the installation command from Nightfall Portalarrow-up-right.

    i. Note : this includes the necessary command line parameters for the agent to communicate with Nightfall

    ii. Integrations -> Endpoint Windows -> Manage -> Download Package -> 'To install, run the command as admin.

    d. Paste the msiexec installation command copied from the above step to cmd and press Enter key.

    e. Installation should start in silent mode.

    1. Verify Installation

      1. Once installation is complete, check if the agent is running:

        1. Open Task Manager (Ctrl + Shift + Esc).

        2. Look for the Nightfall Agent & NightfallUI processes under the Processes tab.

    b. Confirm the Nightfall agent is configured to your Nightfall tenant

    i. On the windows machine:

    1. Double-click the Nightfall agent icon in the status bar.

    2. The displayed UUID should match your Nightfall tenant UUID located under https://app.nightfall.ai/settings/arrow-up-right

    ii. On the Nightfall console:

    1. The newly configured device should be listed under https://app.nightfall.ai/endpointarrow-up-right

    hashtag
    Conclusion

    The Nightfall AI Agent should now be successfully installed, running on your Windows machine, and connected to your Nightfall tenant. If you run into any issues, please contact Nightfall AI support.

    Nightfall macOS Agent Deployment: JumpCloud MDM

    hashtag
    Overview

    This guide provides instructions for deploying the Nightfall AI Endpoint Agent to macOS devices via JumpCloud MDM. It highlights Software Management (Private Repository) as the preferred method, while also documenting an alternative method using Commands + hosted**.pkg**.


    hashtag
    Prerequisites

    • macOS devices enrolled in JumpCloud MDM.

    • Deployment assets:

      • Configuration profile (default, recommended): NightfallAI_Profile_with_Browser_Extensions.mobileconfig


    hashtag
    Step 1 — Deploy the Configuration Profile

    Always use the default profile with browser extensions:

    1. In JumpCloud Admin Portal → Device Management → Policy Management → Configuration Profiles.

    2. Create a new macOS Custom Configuration Profile.

    3. Upload NightfallAI_Profile_with_Browser_Extensions.mobileconfig.

    circle-info

    The Nightfall agent will only install correctly if the required .mobileconfig profile has been deployed beforehand.


    hashtag
    Step 2 — Distribute the Agent

    hashtag
    Preferred Method: Software Management (Private Repository)

    1. First, run the pre-install script as a Command:

      • In JumpCloud Admin Console → Device Management → Commands → + Command (macOS).

      • Attach both scripts:

    circle-info

    Important: Always run the script Command first before assigning the managed .pkg. This ensures proper environment setup and avoids unnecessary reinstalls.


    hashtag
    Alternative Method: Commands + Hosted nightfall-ai-agent-signed.pkg

    Use this method if you want scripts and installation tightly coupledIn JumpCloud Admin Console → Device Management → Commands → + Command (macOS).

    1. Attach both scripts:

      • mdm_pre_installation_script.sh

    2. Paste the following command (update PKG_URL):


    hashtag
    Step 3 — Monitor & Verify

    • Software Management: Check JumpCloud’s app inventory to confirm installation.

    • Commands: View Commands → Results for logs and exit codes.

    • On-device: check /var/log/nightfall_install.log.


    hashtag
    Recommendation

    • Default: Use Software Management (Private Repository) with a script Command run first for environment prep.

    • Alternative: Use Commands + hosted .pkg only if you need script-driven installs inline or cannot use the Private Repository.

    Configuring Integration Alerts

    Nightfall for Google Drive allows you to configure alerts at the policy level and also at the integration level. Alerts can be sent in Google drive by using the following alert channels.

    • Slack

    • Email

    • Webhook

    • Jira Tickets

    When you configure alert settings at the integration level, the alert settings apply to all the policies, created for the Google Drive integration. However, when you configure alert settings specifically for a policy, which is created in the Google Drive integration, the alert settings are applicable only for that specific policy.

    This document explains how to configure alerts at the integration level. To learn about how to configure alerts at the policy level, read .

    hashtag
    Prerequisites

    • To use Slack as an alert platform, you must first perform the required Slack configurations. You can refer to to learn more about how to configure Slack as an Alert platform.

    • To use Webhook as an alert platform, you must first perform the required Webhook configurations. You can refer to to learn more about how to configure Webhook as an Alert platform.

    • To use JIRA as an alert platform, you must have the DLP for the JIRA app installed from the . You can read more about the DLP for JIRA integration .

    hashtag
    Configure Alerts at the Integration Level

    You can configure alerts at the integration level once you have installed the Nightfall for Google Drive integration.

    To configure alerts at the integration level:

    1. Navigate to the Google Drive integration

    2. Scroll down to the Alerting section.

    3. You can configure one or multiple alert channels.

    hashtag
    Configuring Slack as an Alert Channel

    1. To configure Slack as an alert channel, click + Slack channel.

    1. In the Slack alert channel field, enter the name of the Slack channel in which you wish to receive the alerts.

    2. Click Save.

    A confirmation pop-up box is displayed to confirm if the Slack channel (entered in the second step) must be used only for Google Drive integration or all the Nightfall integrations.

    1. Select No, only integration level to use the Slack channel only for Google Drive, or select Yes, please to use the selected Slack channel for all the Nightfall integrations.

    hashtag
    Configuring Email as an Alert Channel

    1. Click + Email.

    1. Enter the Email ID of the recipient who should receive the notifications.

    2. Click Save.

    A confirmation pop-up box is displayed to confirm if the Email ID (entered in the second step) must be used only for Google Drive integration or all the Nightfall integrations.

    1. Select No, only integration level to use the Slack channel only for Google Drive, or select Yes, please to use the selected Slack channel for all the Nightfall integrations.

    hashtag
    Configuring Webhook as an Alert Channel

    1. Click + Webhook.

    2. Enter the Webhook URL.

    3. Click Test. If the test result is not successful, check the Webhook URL.

    circle-info

    When you configure alerts to a Webhook, Nightfall AI sends occasional posts to:

    • To validate that the Webhook is properly configured before the policy is saved.

    • Periodically thereafter to ensure that the Webhook is still valid.

    hashtag
    Configuring JIRA as an Alert Channel

    1. Click + Jira Ticket.

    2. Select a JIRA project from the Jira Project drop-down menu.

    3. Select an issue type from the Issue Type drop-down menu.

    A confirmation pop-up box is displayed to confirm if the JIRA settings configured for the Google Drive integration must be applied to all the other Nightfall integrations too.

    1. Select No, only integration level to use the configurations only for Google Drive, or select Yes, please to use the selected JIRA configurations for all the Nightfall integrations.

    hashtag
    Configure End-User Notification

    When a Violation occurs, Nightfall sends a notification to the end-user whose actions triggered the violation. While notifying the end-user, Nightfall also sends a text message. You can draft the text message to be sent to the end-user. This message applies to all the policies. Click Save changes once done.

    Remediation for Google Drive Exfiltration

    This document explains what admins and end-users can do once a policy is violated.

    hashtag
    Admin Notification and Remediation

    When end-users violate a policy, the Nightfall admin is notified about the incident. The notification channel used to notify the Nightfall admin depends on the settings configured in the Admin Alerting section. If you have not enabled any notification channels in the Admin alerting section, Nightfall admins are not notified.

    If you have enabled the email notification in the Admin alerts section, Nightfall admins receive an email. The email is as shown in the following image.

    The Email consists of the following data.

    • Event: The event that caused the violation. For Google Drive, the event is always a download of assets.

    • Actor: The Email ID of the user who downloaded the file.

    • When: The date and time when the email was downloaded.

    Also, a Slack message is sent if you have enabled the Slack alerts for the Nightfall admin. The Slack message looks as shown in the following image.

    hashtag
    End-User Notification and Remediation

    End-users receive notifications and remediation actions if the Nightfall admin has enabled these settings. The notifications are based on the settings configured in the section. The end-user remediation actions are based on the settings configured in the section.

    If you have configured the Email notification for end-users and enabled the end-user remediation, end-users can take remediation actions from the Email itself.

    If you have configured Slack notifications for end-user and enabled end-user remediation, end-users can view the Slack message.

    hashtag
    Managing Events in Nightfall

    Nightfall admins can manage violations from within the Nightfall console. The Events page in Nightfall lists all the violations under the Exfiltration tab. End-users can get a detailed view of each exfiltration Event triggered.

    To view violations in Nightfall navigate to the Exfiltration Prevention page from the left menu.

    The Exfiltration Events page lists all the exfiltration events. To view events with specific statuses, you can click the respective tabs.

    To view the past events, click the Time filter and select the required time period. By default, the time period displays Events for the Last 7 Days.

    hashtag
    Event List View

    The Event list view consists of the following columns.

    Column Name
    Description

    hashtag
    Event Detail View

    You can click an event to view the details. The detail view window consists of the following tabs.

    • Summary: The Summary tab displays highlights of the event like the name of the downloaded asset, the name of the violated policy, the email ID of the user who violated the policy, and so on.

    • Asset: The asset window displays the details of the asset and the history of the asset. You can also choose to view historic asset data. If there are multiple assets in a single violation, you can choose which asset's details must be displayed.

    • Actor: The actor tab displays the details and history of the user who downloaded the asset. You can choose to view historical data of the user. You can also add which can serve as metadata for the violation.

    hashtag
    Taking Actions on the Events Page

    The events list view displays an ellipsis menu at the extreme right corner. Admins can click this menu to take appropriate action on an exfiltration event.

    The various available actions are explained as follows.

    • Acknowledge: This action can be taken when you just wish to acknowledge that you have viewed the violation.

    • Notify Email: This action sends an email notification to the end-user who caused the violation.

    • Notify Slack: This action sends a Slack notification to the end-user who caused the violation.

    Once the action is implemented, the status of the event changes respectively. By default, an event can have one of the following two statuses.

    • Active: The event has been generated but no action has been taken.

    • Input Requested: A notification has been sent to the end-user requesting their response.

    circle-info

    You can also take action from the event detail view page. The actions are available at the bottom of the detail view page.

    Remediation for Salesforce Exfiltration

    This document explains what admins and end-users can do once a policy is violated.

    hashtag
    Admin Notification and Remediation

    When end-users violate a policy, the Nightfall admin is notified about the incident. The notification channel used to notify the Nightfall admin depends on the settings configured in the Admin Alerting section. If you have not enabled any notification channels in the Admin alerting section, Nightfall admins are not notified.

    If you have enabled the email notification in the Admin alerts section, Nightfall admins receive an email. The email is as shown in the following image.

    The Email consists of the following data.

    • Event: The event that caused the violation. For Salesforce, the event is always download of assets.

    • Who: The Email ID of the user who downloaded the file.

    • When: The date and time when the email was downloaded.

    Also, a Slack message is sent if you have enabled the Slack alerts for the Nightfall admin.

    hashtag
    End-User Notification and Remediation

    End-users receive notifications and remediation actions if the Nightfall admin has enabled these settings. The notifications are based on the settings configured in the section. The end-user remediation actions are based on the settings configured in the section.

    If you have configured the Email notification for end-users and enabled the end-user remediation, end-users can take remediation actions from the Email itself. The end-user Email is shown in the following image.

    If you have configured Slack notifications for end-user and enabled end-user remediation, end-users also get a message in the respective Slack channel configured.

    hashtag
    Manage Violations in Nightfall

    To manage violations in the Nightfall console:

    1. Click Events from the left menu.

    1. Click the Exfiltration tab.

    The Exfiltration Events page lists all the exfiltration events. To view events specific to the Salesforce integration:

    1. Click Filters and select + Add Filter.

    1. Select Integration in the Select a filter field.

    1. Select the Salesforce check box in the Select an option field.

    1. Click Apply.

    Now, only the Salesforce events are displayed.

    1. To view events with specific statuses, you can click the respective tabs.

    To view historic events, click the Time filter and select the required time period.

    You can click an event to view the details. The detail view window is as follows.

    The detail view window consists of the following tabs.

    • Summary: The Summary tab displays highlights of the event like the name of the downloaded asset, the name of the violated policy, and the email ID of the user who violated the policy.

    • Asset: The asset tab displays the details of the asset. You can view details like name of the downloaded asset, size of the downloaded asset, exfiltration action (download), owner's Salesforce ID and IP address. If there are multiple assets in a single violation, you can choose which asset's details must be displayed.

    • Actor: The actor tab displays the email ID of the Salesforce user who downloaded the asset. You can add notes on this tab which is displayed in the Admin notes section.

    hashtag
    Taking Actions on the Events Page

    The events list view displays an ellipsis menu at the extreme right corner. Admins can click this menu to take appropriate action on an exfiltration event.

    The various available actions are explained as follows.

    • Acknowledge: This action can be taken when you just wish to acknowledge that you have viewed the violation.

    • Notify Email: This action sends an email notification to the end-user who caused the violation.

    • Notify Slack: This action sends a Slack notification to the end-user who caused the violation.

    Once the action is implemented, the status of the event changes respectively. By default, an event can have one of the following two statuses.

    • Active: The event has been generated but no action has been taken.

    • Input Requested: A notification has been sent to the end-user requesting their response.

    circle-info

    You can also take action from the event detail view page. The actions are available at the bottom of the detail view page.

    Advanced Settings

    This stage allows you to select automated notification channels or actions if a policy violation occurs.

    hashtag
    Admin Alerting

    This section allows you to send notifications to Nightfall users. The various alert methods are as follows. You must first turn on the toggle switch to use an alert method.

    circle-info

    The alert configurations configured in this section describe the process of creating alerts at the policy level. Policy-level alerts apply only to the policy on which they are configured. To configure an alert on all the Salesforce Exfiltration policies, you must configure alerts at the integration level. To learn more about how to configure integration-level policies for the Salesforce integration, read

    The steps to configure alert channels for policy-level integration are the same as in the case of integration-level alerts. You can refer to the document.

    hashtag
    Automated Actions

    Automated actions allow you to configure automated remediation actions when an exfiltration attempt is detected by Nightfall policy. Nightfall supports the following automated actions for Salesforce. You can choose to implement the automated action immediately after detecting a download attempt or after some time.

    To enable the automated action, you must turn on the respective toggle switch.

    hashtag
    Freeze Salesforce User Account

    This action logs out the user from the Salesforce account. They cannot login until a Salesforce admin revokes the freeze on the account.

    You must now select when exactly after detecting the event, the action must be triggered. if you select the Immediately option, the automated action is triggered immediately after the download attempt is made.

    If you select the After option, you must select the time gap after which the automated action must be implemented.

    hashtag
    Revoke User Permissions

    This action revokes the permissions of the user. The user can now only view data across al Salesforce pages. They cannot download any data. This action assigns the user Salesforce's minimum access profile. You can learn more about this profile from this .

    You must now select when exactly after detecting the event, the action must be triggered. if you select the Immediately option, the automated action is triggered immediately after the download attempt is made.

    If you select the After option, you must select the time gap after which the automated action must be implemented.

    hashtag
    End-User Notification

    This section allows you to configure notifications to be sent to the end user whose actions triggered the violation.

    hashtag
    Custom Message

    Enter a custom message to be sent to the end user. This message is sent in an Email. You can modify the default message provided by Nightfall and draft your message. The total character length allowed is 1000 characters. You can also add hyperlinks in the custom message. The syntax is <link | text >. For example, to hyperlink with the text Nightfall website, you must write <www.nightfall.ai|Nightfall website>.

    hashtag
    Automation

    The automation settings allow you to send notifications to end users. You can select one or both the notification methods. You must first turn on the toggle switch to use the automation option. The automation notification channels are as follows

    • Email: This option sends an Email to the user who attempted the download.

    • Slack: This option sends a Slack message to the user who attempted the download.

    hashtag
    End-User Remediation

    End-user remediation (also known as Human Firewall) allows you to configure remediation measures that end users can take, when a violation is detected on by their download attempt. You must turn on the toggle switch to use this option. End-users receive the remediation actions in an Email as an action item. The various available remediation actions for end-users are as follows.

    • Report as False Positive with Business Justification: This option allows end users to report false positive alerts and provide a business justification as to why the alert is considered to be false positive.

    When end-users report alerts as false positive, you can choose the resolution method to be either Automatic or manual.

    If end-users do not take any remediation action, you can set the frequency at which they must receive the notifications to take action.

    Remediation for Windows OS Policies

    Managing Violations in Nightfall

    Nightfall admins can manage violations from within the Nightfall console. The Events page in Nightfall lists all the violations under the Exfiltration tab. End-users can get a detailed view of each exfiltration violation recorded.

    To view violations in Nightfall

    1. Navigate to Exfiltration Prevention from the left menu.

    Steps 2-6 help you filter the events to only view the alerts generated by Windows OS.

    1. Click Filter.

    2. Click + Add Filter.

    3. Select Integration.

    4. Select the Windows check box.

    5. Click Apply.

    circle-info

    To view historic events, click the Time filter, select the required time period or enter it manually by selecting the Custom Range option. Once the required time period is selected, click Apply. By default, the filter displays results for the Last 7 days. You can click Last 7 Days and choose the required historic time period.

    You can click an event to view the details. The detail view window consists of the following tabs.

    hashtag
    Summary Tab

    The Summary tab consists of the following details.

    • Assets: The name of the uploaded asset(s) that was exfiltrated.

    • Policy: The name of the policy violated.

    • Device ID: The device ID of the device from which the file upload was performed.

    The Summary tab also displays a log of activities that occured on the Event. The first log entry is always the asset creation date. The subsequent logs display the actions applied on the event. You can also add comments on the Summary tab. The comments added by you can be viewed by other users as well.

    hashtag
    Assets Tab

    This tab displays the details of the asset (with sensitive data) that was uploaded to a domain or cloud storage app. The asset tab also displays a number in brackets. This number indicates the number of assets that were uploaded as part of the event.

    In the following image, there were two assets which were uploaded, and these four uploads together triggered the event. In such cases when there are multiple assets involved, you can use the drop-down menu to switch between assets and view the asset details.

    The Assets tab displays the following details.

    • Name: The name of the asset uploaded.

    • Where: The location of the asset in the device.

    • Medium: The medium used to upload the asset.

    hashtag
    Asset History

    The Assets tab also contains the Asset History section. This section displays the source or origin from where the asset was downloaded. Additionally, it also displays the destinations to which the asset was uploaded. If the source and destination details are not available, this section does not display any information. Users can use the time filter to view historic data.

    hashtag
    Device Tab

    The device tab displays the details of the device used to upload the asset. You can view the following details on this tab.

    • Device ID: The device ID of the device from which the asset was uploaded.

    • Device Name: The name of the device from which the asset was uploaded.

    • Connection Status: The current status of the device. This can either be Connected or Disconnected. If the device is not in contact with the Nightfall agent for more than 6 hours, the connection status changes to disconnected.

    Remediation for MAC OS Policies

    This document explains what admins can do when a macOS policy is violated.

    hashtag
    Managing Violations in Nightfall

    Nightfall admins can manage violations from within the Nightfall console. The Events page in Nightfall lists all the violations under the Exfiltration tab. End-users can get a detailed view of each exfiltration violation recorded.

    To view violations in Nightfall

    Nightfall macOS Agent Deployment: Rippling MDM

    This document explains the process of installing Nightfall AI agent using the Rippling MDM.

    circle-info

    NOTE: Rippling MDM has a requirement where the .mobileconfig profile has to be uploaded from a MacBook. It cannot be uploaded from another type of OS; otherwise the upload will not stick.

    Please note there are two parts to this process:

    1. Deploy the "mobileconfig" that pushes the profile and permissions.

    Configuring Policies

    The Exfiltration policies for MAC and Windows OS allow you to monitor if there are any uploads via browser or cloud storage apps. You can configure the domains in Internet that needs to be monitored and also the cloud storage apps which need to be monitored.

    When there are any uploads to the configured domain or cloud storage apps, the Nightfall AI agent notifies this action. You can configure the notification channels through which you wish to receive notifications when there is an attempt to upload files/folders.

    hashtag
    Verify Connection

    Once you have completed the installation of the Nightfall agent, you must ensure that the connection is live. If the Nightfall agent cannot connect to the macOS or the Windows OS device for more than 6 hours, the connection is lost. When the connection is live, a

    Name the assignment and select a smart group. NOTE: This should be the same group as the previous script step.
  • Click "Next"

  • Select "Run Once Immediately" > Click "Add"

  • Click "Save and Publish"

  • Machine Name: The physical name of the device from which the file upload was performed.
  • Browser Name: The name of the browser from which the asset was uploaded.

  • Domain: The domain URL to which the asset containing sensitive data was uploaded. This field is applicable only for browser uploads. When you hover over a domain that is not added to any Collectionarrow-up-right, the list of Collections is displayed. You can choose to add the domain to an existing Collection or create a new collection and add the domain to the newly created collection. If you are already leveraging the domain collection as part of your monitoring policies, the new addition will be automatically picked up. For example, if the domain is added to a collection of sanctioned domains your policy is ignoring, future uploads to this destination will be ignored.

  • Upload Start Time: The start date and start time of the upload.

  • Upload End Time: The end date and end time of the upload.

  • User: The username of the device owner.
  • Size: The size of the downloaded asset.

  • OS: The operating system used on the device. This field always displays the Windows OS.

  • MAC Address: The physical MAC address of the device.

  • Last Connection: The date and time when the device was last connected.

  • Agent Version: The Nightfall agent version installed on the device.

  • OS Version: The Windows OS version used on the device.

  • Where: The name of the file that was downloaded.
  • Policies Violated: The name of the policy that was violated.

  • Violation Dashboard: The link to the Events screen to view the violation in detail.

  • Actions: The list of actions that the Nightfall admin can take.

  • Suspend Account: This action suspends the account of the user who caused the violation.

  • Ignore: This action ignored the violation. You can take this action when an event is false positive.

  • Copy Link: This action is only available on the Asset detail view. You can copy the direct link to the Event with this action.

  • Event type and asset(s)

    The nature of the event (asset download) and the name of the asset that is either downloaded or uploaded.

    Location

    The location of the asset (Google Drive in this case)

    When

    Number of days/months since the event occured.

    Actor

    The email ID of the user who downloaded the asset. In some cases, you can also find the name of an app in brackets. This indicates that the app present in your Google Workspace downloaded the asset on behalf of the user. You can find more info in this Google documentarrow-up-right.

    Policy

    The name of the policy violated by the event.

    Status

    THe current status of the event.

    Automation
    End-User Remediation
    What: The name of the file that was downloaded.
  • Policies Violated: The name of the policy that was violated.

  • Violation Dashboard: The link to the Events screen to view the violation in detail.

  • Actions: The list of actions that the Nightfall admin can take.

  • Ignore: This action ignored the violation. You can take this action when an event is false positive.

  • Freeze User: This action freezes the user account and logs them out of Salesforce. Users cannot login until admin unfreezes their account.

  • Revoke User Permission: This permission revokes the user's download privileges. Users can only view data in Salesforce. This action assigns the Salesforce's Minimum access profile to the user. You can learn more about this profile from this Salesforce documentarrow-up-right.

  • Unfreeze User: Once you freeze a user, this action is active. You can unfreeze a freezed user with this action.

  • Automation
    End-User Remediation

    Pre-install script: mdm_pre_installation_script.sh

  • Nightfall agent nightfall-ai-agent-signed.pkg (signed for Software Management, or hosted on HTTPS for Commands)

  • Assign it to device groups or systems.

  • Save and confirm devices receive the profile.

  • mdm_pre_installation_script.sh

  • Assign this command to the same device groups you plan to assign the app.

  • Run it to ensure systems are properly prepared and to skip reinstall on healthy hosts.

  • Then, assign the managed app:

    • In JumpCloud Admin Console → Software Management → Private Repository → Add App → Custom (Apple/macOS).

    • Upload the signed Nightfall nightfall-ai-agent-signed.pkg.

    • Assign it to the same device groups.

    • JumpCloud will install the agent as a managed application.

  • Assign the command to devices or groups.

  • Run now or schedule as needed.

  • Confirm .mobileconfig profile is installed (profiles list).
  • Verify the Nightfall agent is running.

    • Launch Activity Monitor > CPU > Search for Nightfall.

    • Identify two running processes - one running as root and the second as the user.

  • Verify the endpoint is communicating with Nightfall.

    • Open Nightfall web console > Integrations > macOS > Manage.

    • Confirm the device(s) listed show as Agent Status = Connected

  • mdm_pre_installation_script.sh

    The script is used by MDMs to ensure that a macOS machine is in a clean state before installing the Nightfall Agent. It wipes any existing Nightfall installation and prepares a clean environment for a new install, including:

    • Loading API keys

    • Rebuilding folders

    • Resetting launch daemons

    NightfallAI_Profile_with_Browser_Extension.mobileconfig

    This profile is designed to pre-authorize and enable what the Nightfall Endpoint Agent requires on a macOS machine without needing user prompts.

    • Silently installs/enables the Nightfall browser extension

    • Allows the extension to run without prompts

    • Authorizes required permissions (content inspection, file uploads, scanning)

    • Grants macOS Privacy Permissions required by Nightfall:

      • Full Disk Access (FDA)

      • System Events/Automation Permissions

      • Application Control Permissions

    • Configures the payloads for browser + system integration

    • Prevents users from tampering with the security controls

    (Optional) Click Add Header to add headers.
  • Click Save.

  • The response to the test Webhooks is 200 status code if successful.

    An example of Webhook request is as follows.

    This is part of alert event consumption and can be ignored.

    (Optional) Add comments to be added in the JIRA ticket.
  • Click Save changes.

  • this documentarrow-up-right
    this documentarrow-up-right
    this documentarrow-up-right
    arrow-up-right
    Atlassian Marketplacearrow-up-right
    herearrow-up-right
    #!/bin/bash
    set -euo pipefail
    
    LOG="/var/log/nightfall_install.log"
    PKG_URL="<https://your-bucket.s3.amazonaws.com/nightfall-ai-agent-signed.pkg>"
    PKG_LOCAL="/tmp/nightfall-ai-agent-signed.pkg"
    
    PREP="/tmp/mdm_pre_installation_script.sh"
    
    echo "$(date) — Starting Nightfall install" >>"$LOG"
    
    cp ./mdm_pre_install_check_script.sh "$PRECHECK"
    cp ./mdm_pre_installation_script.sh "$PREP"
    chmod +x "$PRECHECK" "$PREP"
    
    if "$PRECHECK" >>"$LOG" 2>&1; then
      echo "$(date) — Agent already installed & healthy, skipping." >>"$LOG"
      exit 0
    fi
    
    "$PREP" >>"$LOG" 2>&1
    
    curl -fL "$PKG_URL" -o "$PKG_LOCAL"
    /usr/sbin/installer -pkg "$PKG_LOCAL" -target / >>"$LOG" 2>&1
    rm -f "$PKG_LOCAL"
    
    echo "$(date) — Nightfall install completed" >>"$LOG"
    {
      "service": "nightfall",
      "test": true,
      "timestamp": "2024-03-07T23:18:39Z"
    }

    Navigate to Exfiltration Prevention from the left menu.

    Steps 2-6 help you filter the events to only view the alerts generated by macOS.

    1. Click Filter.

    2. Click + Add Filter.

    3. Select Integration.

    4. Select the macOS check box.

    5. Click Apply.

    6. Select Integration.

    7. Select the macOS check box.

    8. Select Integration.

    9. Select the macOS check box.

    10. Click Apply.

    circle-info

    To view historic events, click the Time filter, select the required time period or enter it manually by selecting the Custom Range option. Once the required time period is selected, click Apply. By default, the filter displays results for the Last 7 days. You can click Last 7 Days and choose the required historic time period.

    You can click an event to view the details. The detail view window consists of the following tabs.

    hashtag
    Summary Tab

    The Summary tab consists of the following details.

    • Assets: The name of the uploaded asset(s) that was exfiltrated.

    • Policy: The name of the policy violated.

    • Device ID: The device ID of the device from which the asset was uploaded.

    • Machine Name: The physical name of the device from which the asset was uploaded.

    • Browser Name: The name of the browser from which the asset was uploaded. This field is applicable only for those events that were triggered by the browser upload action.

    • Domain: The domain URL to which the asset containing sensitive data was uploaded. This field is applicable only for browser uploads. When you hover over a domain that is not added to any , you can choose to add it to an existing Collection or create a new one. If you are already leveraging the domain collection as part of your monitoring policies, the new addition will be automatically picked up. For example, if the domain is added to a collection of sanctioned domains your policy is ignoring, future uploads to this destination will be ignored.

    • App Name: The name of the cloud storage app to which the asset containing sensitive data was uploaded. This field is applicable only for uploads done to cloud storage apps.

    • Account Type: The nature of the cloud storage app to which the asset was uploaded. The account type is generally either a personal account or a business account. This field is applicable only for uploads done to cloud storage apps.

      • Account type: Personal → when a personal session is detected

      • Account type: Corporate → when corporate session is detected

      • Empty → when session differentiation is not applicable or unavailable

    • Upload Start Time: The start date and start time of the upload.

    • Upload End Time: The end date and end time of the upload.

    The Summary tab for a Browser upload action is as follows.

    The Summary tab for a Cloud storage app event is as follows.

    The Summary tab for a Clipboard Paste action is as follows.

    The Summary tab also displays a log of activities that occurred on the event. The Summary tab also displays a log of activities that occurred on the event. The first log entry is always the asset creation date. The subsequent logs display the actions applied to the event. You can also add comments on the Summary tab. The comments added by you can be viewed by other users as well.

    hashtag
    Assets Tab

    This tab displays the details of the asset that was uploaded to a domain or cloud storage app. The asset tab also displays a number in brackets. This number indicates the number of assets that were uploaded as part of the event.

    In the following image, there are two assets that were uploaded, and these four uploads together triggered the event. In such cases when there are multiple assets involved, you can use the drop-down menu to switch between assets and view the asset details.

    The Assets tab displays the following details for the Browser upload action and the Cloud Storage app action.

    • Name: The name of the asset uploaded.

    • Where: The location of the asset in the device.

    • Medium: The medium used to upload the asset. This can be a browser or cloud storage app.

    • Size: The size of the asset.

    circle-info

    If you have configured in the Scope section of the policy and if the asset contains sensitive data, the asset tab also displays a preview of the sensitive data and the detectorsarrow-up-right violated. Additionally, you can also find a new field called Sensitive Data that displays the name of the detector(s) violated.

    hashtag
    Asset History

    The Assets tab also contains the Asset History section. This section displays the source or origin from where the asset was downloaded. Additionally, it also displays the destinations to which the asset was uploaded. If the source and destination details are not available, this section does not display any information. Users can use the time filter to view historic data. By default, the asset history is displayed for the last 7 days. You can click the Last 7 Days drop-down menu to view historic asset details.

    hashtag
    Asset Tab for Clipboard Paste Action

    The assets tab for the copy/paste action displays the following information.

    • Content Origin: The site from which the data was copied. If Nightfall cannot find the origin, this field displays Local Machine (Unknown origin).

    • Content Destination: The location where the copied information was pasted.

    • Time of Copy: The date and time when the data was copied.

    • Time of Paste: The date and time when the data was pasted.

    If the copy/pasted content contains sensitive data, the asset tab displays the sensitive data and also the text surrounding the sensitive data. The sensitive data is highlighted so that it can be recognized easily.

    The asset history section displays the timeline and the number of times data was copied and pasted.

    hashtag
    Device Tab

    The device tab displays the details of the device used to upload the asset. You can view the following details on this tab.

    • Device ID: The device ID of the device from which the asset was uploaded.

    • Device Name: The name of the device from which the asset was uploaded.

    • Connection Status: The current status of the device. This can either be Connected or Disconnected. If the device is not in contact with the Nightfall agent for more than 6 hours, the connection status changes to disconnected.

    • OS: The operating system used on the device.

    • MAC Address: The physical MAC address of the device.

    • Last Connection: The date and time when the device was last connected.

    • Agent Version: The Nightfall agent version installed on the device.

    • OS Version: The MAC OS version used on the device.

    circle-info

    Important

    If a user uploads the same file to multiple browser destinations (say 3), 3 exfiltration events are generated. However, if you uploads multiple files to the same destination, only a single event is generated.

    If multiple violations are recorded within a span of five minutes, all the violations are clubbed under a single exfiltration event. The Assets Tab of this event displays the details of each asset.

    However, if you upload multiple files to different browser domains or upload multiple files to different cloud storage apps, within a span of five minutes, a separate exfiltration event is generated for each of the uploaded file.

    hashtag
    Actions

    You can perform the following actions on all three tabs. These actions are present at the bottom.

    • Copy Event Link: This action copies the link of the event to the clipboard.

    • Acknowledge: This action modifies the status of the event to Acknowledged.

    • Notify Slack: This action sends a Slack notification about the event to the recipient configured in the⁣Advanced Settings section.

    • Notify Email: This action sends an email notification about the event to the recipient configured in the section.

    • Resolve: This action resolves the event and modifies the status to resolved.

    • Ignore: This action ignores the event and modifies the status to ignored.

  • Step 1 - Create & Deploy Profiles

  • Deploy the agent via the .PKG and scripts.

    1. Step 2.1 - Create & Configure the Software Package

    2. Step 2.2 - Deploy the Nightfall Endpoint DLP Agent

  • circle-exclamation

    IMPORTANT: Both Steps 1 and 2 require defining the devices to deploy to. This means that the "mobileconfig" profile requires the devices to be selected to assign to, and the agent requires selecting the devices to assign to as well. Ideally, both lists should match.

    hashtag
    Prerequisites

    Confirm the following:

    • The macOS devices are onboarded.

    • Download the package from the console:

      • On your Nightfall console, navigate to https://app.nightfall.ai/endpointarrow-up-right

      • Click Download Package for macOS

      • Unpack the contents of the downloaded file.

    • (Optional) In the downloaded folder, locate the README.md under /Profiles to learn about the various MDM profiles available.

    After confirming, move to "Step 1" as shown below.

    circle-info

    To install the Nightfall agent in stealth mode (without notifying the end-user), see Install Nightfall AI Agent for MAC OS.

    mdm_pre_installation_script.sh

    The script is used by MDMs to ensure that a macOS machine is in a clean state before installing the Nightfall Agent. It wipes any existing Nightfall installation and prepares a clean environment for a new install, including:

    • Loading API keys

    • Rebuilding folders

    • Resetting launch daemons

    NightfallAI_Profile_with_Browser_Extension.mobileconfig

    This profile is designed to pre-authorize and enable what the Nightfall Endpoint Agent requires on a macOS machine without needing user prompts.

    • Silently installs/enables the Nightfall browser extension

    • Allows the extension to run without prompts

    • Authorizes required permissions (content inspection, file uploads, scanning)

    1

    hashtag
    Step 1 - Create & Deploy Profiles

    In this step, you will create a custom profile for each of the profiles provided in your Nightfall endpoint payload.

    1. Locate NightfallAI_Profile_with_Browser_Extensions.mobileconfig in the downloaded Nightfall Endpoint payload package.

    2. Navigate to and click Upload.

    3. Upload and save provided config profile.

      • Policy name: “Nightfall AI Agent Profile”

      • Policy description: “Nightfall AI Agent profile”

    4. Navigate to . Click the three-dot context menu located on the far right of the new profile. Deploy from

      • Select all employees or specific target devices.

      • Click Save to deploy the software.

    2

    hashtag
    Step 2 - Configure & Deploy Software Package

    hashtag

    hashtag
    Upgrading to a New Version

    The below describes the steps to upgrade endpoints with a new version of the agent:

    1. Search or scroll to the old version of the Nightfall Endpoint DLP Agent and click “Edit”.

      a. Remove all devices from the installation list and click “Save”.

    2. Follow the steps to configure the new software package for the new version

    3. Follow these steps to deploy the new version.

    The Nightfall Endpoint DLP Agent will now deploy to all selected target endpoints. Installation may take up to 48 hours and is dependent on the endpoint devices being turned on and connected.

    Connected
    message is displayed. If the connection is lost, a
    Disconnected
    message is displayed under the
    Agent Status
    column.

    hashtag
    Removing Disconnected Devices

    When a macOS or Windows OS device is disconnected, you can remove the device from the monitored list (Devices tab). To remove a disconnected device from the monitored list, click the delete icon for the respective device.

    Clicking the delete icon displays a warning pop-up window as shown in the following image. Click Remove Device to confirm the removal of the device.

    If a removed device reconnects, it is automatically added to the monitored list. To permanently prevent the monitoring of a device, you must de-provision the device through MDM (uninstall the Nightfall Agents and remove it from future targeting).

    This feature declutters your monitoring list and ensures that only active devices that are being monitored are displayed.

    You can leverage this feature efficiently with loaner laptops. When a former employee returns a device, the connection is lost and the status is displayed as disconnected. Security teams can be concerned about the device displaying the Disconnected status for a prolonged period and can initiate an investigation. Instead, you can use this feature and remove the device from the monitored list. When the device is reassigned to another employee, it connects back automatically, and the monitoring resumes.

    Similarly, you can use this feature for seasonal and dormant devices; remove them once they are not in use. They will connect back automatically once they are in use again.

    hashtag
    Create Domain Collections

    Collections help you refine your monitoring to reduce noise from sanctioned upload destinations as well as closely monitor exfiltration of files originating from high-value SaaS applications accessed through the browser. You can also define specific domain collections to closely monitor upload activity to specific categories of upload destinations. For instance, to track files uploaded to social media, you can create a domain collection called social media and add domains like Facebook, Instagram, Twitter, and so on. Similarly, you create a collection for known and sanctioned upload destinations that are safe to upload to so you can ignore them from your monitoring policies or monitor the upload of items originating from such domains. While creating a policy, you can directly add the collection to be monitored. All the domains in the collection will be monitored.

    You can create a domain by either manually entering all the domain URLs manually or by uploading a comma-delimited list of domains in a text file.

    To group domains:

    1. Log in to the Nightfall app.

    2. Navigate to Integrations from the left menu.

    3. Click Manage on the macOS/Windows OS integration.

    1. Click the Domains tab.

    2. Click + New Collection.

    You can either add the domains manually or upload a text file containing the list of domains. The following section has two tabs. The first explains the process of manually adding domains, and the second tab explains adding domains by uploading a file.

    1. Click + Add Domain.

    1. Enter a name for the Collection in the Collection Name field (Social Media in the following image)

    2. Enter a domain and hit the enter key (facebook.com in the following image).

    circle-info

    Important

    When you add a domain, the sub domain is not included automatically. For instance, if you add abcd.com, docs.abcd.com is not included. To include subdomains, you must enter the full URL containing the subdomain. If you have multiple subdomains, you can use the asterisk wildcard (*) and enter the domain as *.abcd.com

    1. (Optional) Click + Add Domain to add multiple domains to the collection.

    2. (Optional) Click the delete icon to delete a domain.

    3. Click Save Changes.

    1. Enter a name for the Collection in the Collection Name field.

    2. Click Upload.

    1. Browse and upload the text file containing the list of domains.

    hashtag
    Creating Policy

    The detailed steps to configure the MAC OS/Windows OS device exfiltration policy are explained in the following documents.

    • MAC/Windows App Selection

    • Scope

    • Trigger

    Configuring Integration Alerts
    Salesforce documentarrow-up-right
    www.nightfall.aiarrow-up-right

    Manual Installation

    This document explains the process of installing the Nightfall agent manually.

    hashtag
    Prerequisites

    1. Ensure that you have root level access to the target macOS device.

    2. On your Nightfall console, navigate to and click the Download Package button on the top right corner of the page. Click Download Package for macOS and unpack the contents of the downloaded file.

    3. Create a default policy for web browser uploads and cloud storage application sync.

    circle-info

    To install the Nightfall agent in stealth mode (to hide UI elements), see .

    hashtag
    Installing the Package

    1. Locate the mdm_pre_installation_script.sh in the payload downloaded from Nightfall.

    2. Open a Terminal window.

    3. Run the mdm_pre_installation_script.shscript on your local machine as a root user, by executing the following command.

    1. Double click the provided nightfall-ai-agent_<version>.pkg.

    2. Click Continue.

    1. Click Install.

    1. Click Use Password to enter your device password and start the installation process.

    Once the installation is completed, you get a completion message as shown in the following image.

    1. Click Close.

    At the top right corner of your screen, you can view the Nightfall AI agent icon which looks as follows.

    When you click this icon, you can view the details of the agent.

    hashtag
    Grant System Permissions

    These system permissions and handled automatically through MDM profiles. For manual install, enabling these permissions manually is required.

    hashtag
    Grant Full Disk Access

    To monitor your MAC device, you must grant access to the hard disk. This section explains the process of granting disk access.

    1. Navigate to System Settings > Privacy & Security > Full Disk Access.

    1. If Nightfall is listed, make sure to toggle the permission to ON

    2. [Optional] Should Nightfall not be listed in the primary list

      1. Click the + icon at the bottom of the list (you may be prompted to enter your macOS password)

    1. Select NightfallAIAgent (under Applications) and click Open.

    1. Click Quit & Reopen.

    On the Full Disk Access page, ensure that the toggle switch is turned on for the NightfallAIAgent. This ensures that the full disk access is granted.

    hashtag
    Grant Accessibility Permissions

    For clipboard monitoring, you must grant the Nightfall agent accessibility permissions. This section explains the process.

    1. Navigate to System Settings > Privacy & Security > Accessibility.

    1. If Nightfall is listed, make sure to toggle the permission to ON

    1. [Optional] If Nightfall is not listed in the primary list

      1. Click the + icon at the bottom of the list (you may be prompted to enter your macOS password)

    b. Select NightfallAIAgent (under Applications) and click Open.

    c. On the Accessibility settings page, ensure that the toggle switch is turned on for the NightfallAIAgent. This ensures that the full disk access is granted.

    hashtag
    Reboot The Agent

    To ensure changes are picked up by the agent:

    1. Open Activity Monitor > Search of Nightfall > you should see two Nightfall processes running

      1. If you do not see two Nightfall processes, make sure to expand your view to all processes

    hashtag
    Grant Browser Permissions

    Apart from the disk access and accessibility permissions, you must also grant permission to the Nightfall AI agent to monitor browser uploads. This section explains the process.

    To grant access to browser uploads:

    1. Open a browser instance and upload a test file to any destination.

    2. When prompted, grant the Nightfall AI agent permissions.

    circle-check

    At this stage, your manual installation is complete. Your machines should start showing up on you Nightfall AI management console under

    Nightfall delivers broad browser coverage with full data exfiltration protection across modern AI browsers and traditional browsers. Customers can confidently deploy Nightfall across supported environments without compromising on security or feature depth.

    hashtag
    Supported Browsers

    AI Browsers

    • Perplexity Comet (macOS only)

    • ChatGPT Atlas (macOS only)

    Chromium-Based Browsers

    • Google Chrome

    • Microsoft Edge

    • Arc

    • Brave

    Other Browsers

    • Firefox

    Operating System Support

    1. macOS - The following browsers are supported on macOS:

      1. Chrome

      2. Edge

    hashtag
    Uninstalling the Nightfall AI Agent

    To uninstall the Nightfall AI agent, locate the uninstallation script provided as part of the deployment bundle. You must execute the following command on your MAC device, as a root user.

    Configuring Integration Alerts

    Nightfall for macOS and Nightfall for Windows OS allow you to configure alerts at the policy level and also at the integration level.

    You can navigate to the alerts page by executing the following steps:

    1. Click Integrations in the left pane.

    2. Click Manage for either Endpoint macOS or Endpoint Windows widget.

    3. Click the Alerting tab.

    Alerts can be sent in macOS and windows OS policies by using the following alert channels.

    • Slack

    • Email

    • Webhook

    • Jira Tickets

    When you configure alert settings at the integration level, the alert settings apply to all the policies, created for the macOS/Windows OS integration. However, when you configure alert settings specifically for a policy, which is created in the macOS/Windows OS integration, the alert settings are applicable only for that specific policy.

    This document explains how to configure alerts at the integration level. To learn about how to configure alerts at the policy level, read .

    hashtag
    Prerequisites

    • To use Slack as an alert platform, you must first perform the required Slack configurations. You can refer to to learn more about how to configure Slack as an Alert platform.

    • To use Webhook as an alert platform, you must first perform the required Webhook configurations. You can refer to to learn more about how to configure Webhook as an Alert platform.

    • To use JIRA as an alert platform, you must have the DLP for the JIRA app installed from the . You can read more about the DLP for JIRA integration .

    hashtag
    Configure Alerts at the Integration Level

    You can configure alerts at the integration level once you have installed the Nightfall for macOS/ Nightfall for Windows OS integration.

    To configure alerts at the integration level:

    1. Navigate to the macOS integration

    2. Scroll down to the Alerting section.

    3. You can configure one or multiple alert channels.

    hashtag
    Configuring Slack as an Alert Channel

    1. To configure Slack as an alert channel, click + Slack channel.

    1. In the Slack alert channel field, enter the name of the Slack channel in which you wish to receive the alerts.

    2. Click Save.

    A confirmation pop-up box is displayed to confirm if the Slack channel (entered in the second step) must be used only for macOS integration or all the Nightfall integrations.

    1. Select No, only integration level to use the Slack channel only for macOS, or select Yes, please to use the selected Slack channel for all the Nightfall integrations.

    hashtag
    Configuring Email as an Alert Channel

    1. Click + Email.

    1. Enter the Email ID of the recipient who should receive the notifications.

    2. Click Save.

    A confirmation pop-up box is displayed to confirm if the Email ID (entered in the second step) must be used only for macOS integration or all the Nightfall integrations.

    1. Select No, only integration level to use the Slack channel only for macOS, or select Yes, please to use the selected email address for all the Nightfall integrations.

    hashtag
    Configuring Webhook as an Alert Channel

    1. Click + Webhook.

    2. Enter the Webhook URL.

    3. Click Test. If the test result is not successful, check the Webhook URL.

    circle-info

    When you configure alerts to a Webhook, Nightfall AI sends occasional posts to:

    • To validate that the Webhook is properly configured before the policy is saved.

    • Periodically thereafter to ensure that the Webhook is still valid.

    hashtag
    Configuring JIRA as an Alert Channel

    1. Click + Jira Ticket.

    2. Select a JIRA project from the Jira Project drop-down menu.

    3. Select an issue type from the Issue Type drop-down menu.

    A confirmation pop-up box is displayed to confirm if the JIRA settings configured for the macOS integration must be applied to all the other Nightfall integrations too.

    1. Select No, only integration level to use the configurations only for macOS, or select Yes, please to use the selected JIRA configurations for all the Nightfall integrations.

    hashtag
    Configure End-User Notifications

    When a Violation occurs, Nightfall sends a notification to the end-user whose actions triggered the violation. While notifying the end-user, Nightfall also sends a text message. You can draft the text message to be sent to the end-user. This message applies to all the policies. Click Save changes once done.

    Nightfall Windows Agent Deployment: Microsoft Intune

    Learn how to install the Nightfall Agent for Windows using Intune as a Line-of-Business (LOB) app.

    The Microsoft Intune installation consists of the following steps:

    1. Connect Microsoft Intune to Nightfall (API-based MDM Onboarding)

    2. Deploy the Nightfall Agent via Intune

    hashtag
    Prerequisites

    • You are a Systems Administrator in Nightfall

    • You must have access to Microsoft Intune with the necessary admin privileges. An Intune administrator account with permission to approve OAuth access

    • Get the .msi package and command arguments form

    hashtag
    Step 1: Connect Microsoft Intune to Nightfall (API-based MDM Onboarding)

    This step enables automated mapping of user profiles to devices without requiring manual scripts.

    API-based MDM onboarding allows Nightfall to automatically map the user email attribute to specific devices by syncing device inventory from your Microsoft Intune tenant using OAuth-based authentication.

    hashtag
    Connecting Microsoft Intune to Nightfall

    1. Log in to the Nightfall Console at

    2. Navigate to Settings - MDM Profile

    3. Click Add MDM

    Once authentication is complete, Nightfall will automatically connect to your Intune tenant and begin syncing device data.

    Important: This API-based connection enables Nightfall to automatically map user email addresses to devices. You do not need to deploy any additional scripts for user-to-device mapping when using this method.

    hashtag
    Permissions Required

    Nightfall requests the following Microsoft Graph API permissions:

    • DeviceManagementManagedDevices.Read.All - Read managed device information

    • User.Read.All - Read user profiles

    • Organization.Read.All - Read basic organization details

    These are read-only permissions. Nightfall does not modify device settings or configurations.

    hashtag
    After Connection

    Once connected, Nightfall will periodically sync device inventory from Microsoft Intune. You can now proceed to deploy the Nightfall agent to your devices following the steps below.

    hashtag
    Step 2: Deployment Steps

    1. Log into the Intune Admin Center

      • Navigate to .

      • Go to: Home > Apps > All Apps > Add

    hashtag
    Frequently Asked Questions (FAQs)

    Do I still need to install a Nightfall agent on devices after API-based onboarding?

    Yes. API-based MDM onboarding enables Nightfall to map user email addresses to devices automatically. You still need to deploy the Nightfall agent to the devices using the steps above.

    What permissions does Nightfall need in Microsoft Intune?

    Nightfall requires least privilege read-only access to device inventory and user information via Microsoft Graph API. It does not modify device settings or configurations. The user email to device attribution is automatically managed with API-based MDM onboarding and no manual scripts are needed.

    Is OAuth-based authentication secure?

    Yes. Nightfall uses Microsoft's OAuth 2.0 authentication flow with encrypted connections. Credentials are securely stored and refreshed automatically.

    What happens if OAuth permissions are revoked?

    If OAuth permissions are revoked:

    • Device syncing will stop. New devices added or removed will not be reflected in Nightfall during that time.

    • Nightfall will surface an error in the console.

    • You can re-authenticate without reconfiguring policies by reconnecting from Settings → MDM Profile.

    Can I disconnect or change my MDM connection later?

    Yes. Contact Nightfall Support to disconnect or update your MDM connection from Settings → MDM Profile.

    What device types are supported with Intune?

    Microsoft Intune supports both Windows and macOS devices. Nightfall will sync inventory for both device types when connected via API-based onboarding.

    Who should I contact if onboarding fails?

    If you encounter issues:

    • Verify you have admin permissions in Microsoft Intune

    • Check the error message in the Nightfall console

    • Ensure you approved all requested OAuth permissions

    Platform: “macOS”
  • Drop or select NightfallAI_Profile_with_Browser_Extensions.mobileconfig.

  • Click Save & continue.

  • Step 2.1 - Create & Configure the Software Package
    1. Navigate to: https://app.rippling.com/hardware/softwarearrow-up-right

    2. Click Upload Software on the right of the page.

      • Name: “Nightfall Endpoint DLP Agent <version>”

        • <version> is the version of the package your received from Nightfall.

      • Operating System: “macOS”

      • Category: “My Uploads” (Default)

      • Description: “Nightfall Endpoint DLP Agent”.

      • Upload Installer File: drop or select the provided nightfall-ai-agent-signed.pkg file.

      • Install-check script: provided in your package as mdm_pre_install_check_script.sh

      • Pre-install script: provided in your package as mdm_pre_installation_script.sh

      • Click Submit.

      • Click Add on the newly created Software Item.

      • Click Finished Selecting.

    hashtag
    Step 2.2 - Deploy the Nightfall Endpoint DLP Agent

    1. Search or scroll to the newly added Software Item matching the name you used in "Step 2.1".

    2. Click Edit. NOTE: If the Software Item was just recently created it may take a few minutes to leave from the "Pending" status.

    3. Select all employees or specific target devices.

    4. Click Save.

    The Nightfall Endpoint DLP Agent will now deploy to all selected target devices. This may take up to 72 hours and is dependent on the endpoint devices being turned on, connected, and pre-requisite profiles deployed.

    Grants macOS Privacy Permissions required by Nightfall:

    • Full Disk Access (FDA)

    • System Events/Automation Permissions

    • Application Control Permissions

  • Configures the payloads for browser + system integration

  • Prevents users from tampering with the security controls

  • https://app.rippling.com/it/hardware/configurations?section=macosarrow-up-right
    https://app.rippling.com/it/hardware/configurations?section=everything-elsearrow-up-right
    Configure Alerts at the Integration Level
    Select both process and click Quit, the agent will restart instantly.

    Vivaldi

    Firefox
  • Arc

  • Brave

  • Vivaldi

  • Perplexity Comet

  • ChatGPT Atlas

  • Windows - The following browsers are supported on Windows:

    1. Chrome

    2. Edge

    3. Firefox

    4. Arc

    5. Brave

    6. Vivaldi

    7. Not supported on Windows:

      1. ChatGPT Atlas (not available on Windows)

      2. Perplexity Comet (Windows version does not allow installation of browser extensions)

  • https://app.nightfall.ai/endpointarrow-up-right
    https://app.nightfall.ai/endpointarrow-up-right
    Install Nightfall AI Agent for MAC OS
    (Optional) Click Add Header to add headers.
  • Click Save.

  • The response to the test Webhooks is 200 status code if successful.

    An example of Webhook request is as follows.

    This is part of alert event consumption and can be ignored.

    (Optional) Add comments to be added in the JIRA ticket.
  • Click Save changes.

  • this document
    this documentarrow-up-right
    this documentarrow-up-right
    arrow-up-right
    Atlassian Marketplacearrow-up-right
    herearrow-up-right
    sudo ./mdm_pre_installation_script.sh
    mdm_nightfall_ai_agent_uninstall.sh
    {
      "service": "nightfall",
      "test": true,
      "timestamp": "2024-03-07T23:18:39Z"
    }
    circle-info

    All the domains must be separated by a comma. The file must have a .txt extension.

    Once you upload the file, the list of domains present in the file are displayed as follows.

    circle-info

    Important

    When you add a domain, the sub domain is not included automatically. For instance, if you add abcd.com, docs.abcd.com is not included. To include subdomains, you must enter the full URL containing the subdomain. If you have multiple subdomains, you can use the asterisk wildcard (*) and enter the domain as *.abcd.com

    1. (Optional) To add more Domains to the Collection, you can either click + Add Domain and enter the domain manually, or click Upload txt and upload another text file containing domains.

    2. (Optional) Click the delete icon to remove a domain from the Collection.

    3. Click Save Changes.

    Advanced Settings
    Creating Policy
    Remediation for MAC OS Policies
    Remediation for Windows OS Policies

    Download the .msi installer file for the Nightfall Agent.

  • Note the API Key and Company ID in the command line provided by Nightfall.

  • Select Microsoft Intune from the list of supported MDM providers
  • Click Microsoft Intune Login

  • You will be redirected to Microsoft's login page

  • Authenticate with your Microsoft admin account

  • Review and approve the requested permissions:

    • Read device information

    • Read user profiles

    • Access basic organization information

  • Click Accept to grant permissions

  • Select App Type

    • Under App type, choose: Line-of-business app

  • Add App Package

    • In the App package file section, click Select app package file.

    • Upload the NightfallAgent.msi file.

  • Configure App Information

    • Fill in the Name, Description, and other fields as desired.

    • Click Next.

  • Specify Install Command Line

    • In the Command-line arguments field, enter:

  • Assign the App

    • Assign the app to the appropriate device groups or users.

    • Click Next and complete the wizard.

  • Monitor Deployment

    • Go to Monitor > App Install Status to confirm successful deployment.

  • Verify Installation on a target/test machine

    1. Once installation shows as successfull by Intune, check if the agent is running:

      1. Open Task Manager (Ctrl + Shift + Esc).

      2. Look for the Nightfall Agent & NightfallUI processes under the Processes tab.

    2. Confirm the Nightfall agent is configured to your Nightfall tenant

      1. On the windows machine:

        1. Double-click the Nightfall agent icon in the status bar.

  • Contact Nightfall Support for assistance
    https://app.nightfall.ai/endpointarrow-up-right
    https://app.nightfall.aiarrow-up-right
    Microsoft Intune Admin Centerarrow-up-right
    Collectionarrow-up-right
    Advanced Settings

    Scope

    When there is a high volume of exfiltration (basically download) in your organization, the scoping capability enables you to reduce the noise from low risk events so that you can zero in on genuine exfiltration events and resolve them.

    Exfiltration (Download monitoring) can be scoped to:

    • Location: All or a specific set of drives

      • This allows you create flexible policies to monitor all or specific high-risk locations. This is a required scope for all policies.

    • User or User Group (Actor): Any or a specific set of users or user groups

      • This allows you to create custom policies for specific high-risk individuals or user groups. As such, you can create policies to monitor download activity by a disgruntled employee or departing employees. This can be set in combination to other scoping capabilities.

    • Permissions: Public, Organization or Restricted

      • This allows you to tailor your policies to drives or files with specific access restrictions. This can be set in combination to other scoping capabilities.

    • Detection rules: Any or a specific set of sensitive data protection detection rules

      • You can reuse any of detection rules you've already created or create new ones. This helps focus your detection on files which have associated sensitive data violations identified by your sensitive data scanning product. This can be set in combination to other scoping capabilities.

    The Scope stage consists of two main sections.

    • Drive Selection: This section allows you to include various files and drives for monitoring. In this section, you can select the different types of drives to be monitored.

    • Add Filters: This section allows you to scrutinize your policy scope at more granular levels. While the Drive selection section allows you to select the whole drive to be monitored, this section provides you more granular level filters. You can select specific files within the selected drives for monitoring.

    hashtag
    Configuring the Drive Selection Section

    The Drive Selection section allows you to select various drives for monitoring. You can select either User Drives or Shared Drives to be monitored by Nightfall for exfiltration.

    hashtag
    Select Drives

    This section allows you to select various drives in your Google Drive to be monitored. There are two options in this section. You can either choose to scan the User drives, Shared drives, or both.

    • User Drives: The User Drives is the personal drive of the user. The files in this drive are visible only to the owner of the file and other users to whom the owner has granted access. User Drive is commonly known as My Drive in Google Drive. To monitor a User Drive, you must select the User drives check box as shown in the following image.

    circle-check

    IMPORTANT

    If you choose to monitor the User drives, all the User drives in your Google domain are selected for monitoring. You do not have the option to choose specific User drives for monitoring.

    • Shared Drives: Shared drives are common storage locations accessed by all the users in your Workspace. To select this option, you must select the Shared drives check box.

    circle-check

    IMPORTANT

    If you choose to monitor the Shared Drives, you can select whether to monitor all the Shared drives or only specific shared drives. Nightfall provides the following options.

    • If you select the All Drives

    The following image displays the scenarios when you select the Shared Drives check box.

    If you select the All Drives, except for option, you must also select the shared drives which must be excluded from monitoring.

    Similarly, if you select the Specific Drive(s) option, you must also select the specific shared drives which must be monitored.

    hashtag
    Configuring Add Filter Section

    The filters section provides you the flexibility to include and exclude users at a granular level.

    For instance, in the previous section, irrespective of whether you selected Shared Drive, User Drive, or specific User Drives, you ended up selecting one or a set of Drives for monitoring.

    Once you select the Drives to monitor, in this section, you can overlay additional filters to further scope your monitoring. Nightfall provides the following additional filters:

    hashtag
    Internal Users

    • Specific User(s): Choose this option to monitor one or a specific set of internal users. Once you choose this option, Nightfall populates the list of users from the synced IdPs in . You must select the required users.

    • All Users, except for: Choose this option to exclude specific individuals from your monitoring policy. Once you choose this option, Nightfall populates the list of users from the synced IdPs in . You must select the required users.

    circle-exclamation

    Note

    If you have not configured the feature, the users list is populated from the . As a result, you can see the Google Drive icon before the user name. However, if you have set up Directory sync, the users list is fetched from the IdP used for the configuration. In the above image, the users list is populated from the Microsoft Azure IdP and hence you can see the Azure icon before the users’ names.

    circle-info

    Important

    For exclusions, Nightfall only checks the file ownership. For inclusions, Nightfall checks both file ownership and shared access. This rule is applicable to all the filters.

    hashtag
    External Users

    • Specific User(s): Choose this option to monitor one or a specific set of external users. Once you choose this option, you must manually enter the email ID(s) of the external users and hit the enter key.

    • All Users, except for: Choose this option to exclude specific external users, from being monitored. Once you choose this option, you must manually enter the email ID(s) of the external users and hit the enter key.

    hashtag
    Internal Groups

    • Specific Group(s): Choose this option to monitor one specific or a set of internal groups. Once you choose this option, Nightfall populates the list of internal groups from the synced IdPs in . You must select at least one group.

    • All Groups, except for: Choose this option to exclude one specific, or a set of, internal groups from being monitored. Once you choose this option, Nightfall populates the list of internal groups from the synced IdPs in . You must select the required users.

    hashtag
    External Groups

    • Specific Group(s): Choose this option if you have external user groups defined in your IdP and would like to monitor one specific or a set of external groups. Once you choose this option, you must select at least one external user group to monitor then hit the enter key.

    • All Groups, except for: Choose this option if you have external user groups defined in your IdP and would like to exclude one or more external groups from being monitored. Once you choose this option, you must select at least one external user group to monitor then hit the enter key.

    hashtag
    Permission

    Before understanding the Permission filters, we must understand Google's General Access feature.

    hashtag
    General Access

    The general access feature in Google Workspace consists of three types of access, which are as follows.

    • Restricted: Files with this permission can only be accessed by users who have been granted access.

    • Target Audience: Files with this permission can be accessed by the users of the selected target audience group. There is a default target audience that gets created when the Google workspace is provisioned. This target audience has the same name as provisioned in the Google Workspace and includes all members of the organization. You can refer to this to learn more about the target audiences.

    • Anyone with the Link: Files with this permission can be accessed by any user who has the file link.

    Nightfall also provides inclusion and exclusion of files in policy scope that resembles the General Access sharing principle in Google Workspace. The Nightfall General Access permission options are as follows.

    • Restricted: Choose this option to scope monitoring to files with restricted access.

    • Shared with target audiences: Choose this option to scope monitoring to files shared with target audiences within your Google Workspace environment.

    • Anyone with the link: Choose this option to scope monitoring to files shared with anyone with a link.

    hashtag
    Detection Rules

    The consist of a single or multiple detectors. You can use this filter to either include all the detection rules or include only specific detection rules. Note that upon a download event, Nightfall will check if the downloaded file has been previously scanned, and results matched at least one of the selected detection rules (i.e. The file is not rescanned upon download).

    • All: If you select this option, all the detection rules are included.

    • Specific Detection Rule(s): If you select this option, you must also select the required detection rules. Nightfall scans your files only for the selected detection rules.

    hashtag
    Labels

    A Label is a metadata that you can create to help users organize, find, and apply policy to files in Google Drive. To learn more about Google Drive Labels, refer to this .

    circle-exclamation

    Before utilizing filters for Labels, you must as per instructions and create labels in your Google Drive.

    You can choose one of the following options.

    • Specific Label(s): You must choose this option to monitor only those files that contain the selected Labels. Once you choose this option, you must select the Labels. Nightfall only monitors those files that have the selected labels.

    • All Labels, except for: You must choose this option to exclude the monitoring of files that contain the selected Labels. Once you choose this option, you must select the Labels. Nightfall does not monitor the files that contain the selected labels.

    Configuring Integration Alerts

    Nightfall Exfiltration prevention for Salesforce allows you to configure alerts at the policy level and also at the integration level. Alerts can be sent in Salesforce by using the following alert channels.

    • Slack

    • Email

    • Webhook

    • Jira Tickets

    When you configure alert settings at the integration level, the alert settings apply to all the policies, created for the Salesforce integration. However, when you configure alert settings specifically for a policy, which is created in the Salesforce integration, the alert settings are applicable only for that specific policy.

    This document explains how to configure alerts at the integration level. To learn about how to configure alerts at the policy level, read .

    hashtag
    Prerequisites

    • To use Slack as an alert platform, you must first perform the required Slack configurations. You can refer to to learn more about how to configure Slack as an Alert platform.

    • To use Webhook as an alert platform, you must first perform the required Webhook configurations. You can refer to to learn more about how to configure Webhook as an Alert platform.

    • To use JIRA as an alert platform, you must have the DLP for the JIRA app installed from the . You can read more about the DLP for JIRA integration .

    hashtag
    Configure Alerts at the Integration Level

    You can configure alerts at the integration level once you have installed the Nightfall for Salesforce integration.

    To configure alerts at the integration level:

    1. Navigate to the Salesforce integration

    2. Scroll down to the Alerting section.

    3. You can configure one or multiple alert channels.

    hashtag
    Configuring Slack as an Alert Channel

    1. To configure Slack as an alert channel, click + Slack channel.

    1. In the Slack alert channel field, enter the name of the Slack channel in which you wish to receive the alerts.

    2. Click Save.

    A confirmation pop-up box is displayed to confirm if the Slack channel (entered in the second step) must be used only for Salesforce integration or all the Nightfall integrations.

    1. Select No, only integration level to use the Slack channel only for Salesforce, or select Yes, please to use the selected Slack channel for all the Nightfall integrations.

    hashtag
    Configuring Email as an Alert Channel

    1. Click + Email.

    1. Enter the Email ID of the recipient who should receive the notifications.

    2. Click Save.

    A confirmation pop-up box is displayed to confirm if the Email ID (entered in the second step) must be used only for Salesforce integration or all the Nightfall integrations.

    1. Select No, only integration level to use the Slack channel only for Salesforce, or select Yes, please to use the selected Slack channel for all the Nightfall integrations.

    hashtag
    Configuring Webhook as an Alert Channel

    1. Click + Webhook.

    2. Enter the Webhook URL.

    3. Click Test. If the test result is not successful, check the Webhook URL.

    circle-info

    When you configure alerts to a Webhook, Nightfall AI sends occasional posts to:

    • To validate that the Webhook is properly configured before the policy is saved.

    • Periodically thereafter to ensure that the Webhook is still valid.

    hashtag
    Configuring JIRA as an Alert Channel

    1. Click + Jira Ticket.

    2. Select a JIRA project from the Jira Project drop-down menu.

    3. Select an issue type from the Issue Type drop-down menu.

    A confirmation pop-up box is displayed to confirm if the JIRA settings configured for the Salesforce integration must be applied to all the other Nightfall integrations too.

    1. Select No, only integration level to use the configurations only for Salesforce, or select Yes, please to use the selected JIRA configurations for all the Nightfall integrations.

    hashtag
    Configure End-User Notification

    When a Violation occurs, Nightfall sends a notification to the end-user whose actions triggered the violation. While notifying the end-user, Nightfall also sends a text message. You can draft the text message to be sent to the end-user. This message applies to all the policies. Click Save changes once done.

    Nightfall macOS Agent Deployment: Iru (Kandji) MDM

    This document explains the process of installing Nightfall AI agent using the Kandji MDM.

    circle-info

    The Kandji MDM has now been rebranded as Iru.

    hashtag
    Prerequisites

    Nightfall macOS Agent Deployment: JAMF MDM

    This document explains the process of installing the Nightfall AI agent using JAMF.

    The JAMF installation consists of the following steps.

    API_KEY=your_api_key_here COMPANY_ID=your_company_id_here
    
    ⚠️ Important:
    - Do NOT include msiexec /i NightfallAgent.msi — This is handled automatically.
    - Do NOT wrap the values in double quotes.
    
    ✅ Correct Example: API_KEY=ufapuhaefaw COMPANY_ID=qohuifpqrwf
    The displayed UUID should match your Nightfall tenant UUID located under https://app.nightfall.ai/settings/arrow-up-right
  • On the Nightfall console:

    1. The newly configured device should be listed under https://app.nightfall.ai/endpointarrow-up-right.

  • option, all the Shared drives in your Google Workspace are selected for monitoring.
  • If you select the All Drives, except for option, you can exclude some shared drives from being monitored.

  • If you select the Specific Shared Drives option, you get the option to choose specific Shared drives for monitoring.

  • Directory Syncarrow-up-right
    Directory Syncarrow-up-right
    Directory Syncarrow-up-right
    Google Drive integration setuparrow-up-right
    Directory Syncarrow-up-right
    Directory Syncarrow-up-right
    Google documentarrow-up-right
    Nightfall Detection Rulesarrow-up-right
    Google documentarrow-up-right
    enable Google Drive Labelsarrow-up-right
    Internal Users
    External Users
    Internal Groups
    External Groups
    Permission
    Detection Rules
    Labels
    (Optional) Click Add Header to add headers.
  • Click Save.

  • The response to the test Webhooks is 200 status code if successful.

    An example of Webhook request is as follows.

    This is part of alert event consumption and can be ignored.

    (Optional) Add comments to be added in the JIRA ticket.
  • Click Save changes.

  • this documentarrow-up-right
    this documentarrow-up-right
    this documentarrow-up-right
    arrow-up-right
    Atlassian Marketplacearrow-up-right
    herearrow-up-right
    {
      "service": "nightfall",
      "test": true,
      "timestamp": "2024-03-07T23:18:39Z"
    }

    You are a Systems Administrator in Nightfall

  • You have administrator access to Kandji

  • The Kandji APN is set.

  • The target macOS devices are onboarded.

  • On your Nightfall console, navigate to https://app.nightfall.ai/endpointarrow-up-right and click the Download Package button on the top right corner of the page. Click Download Package for macOS and unpack the contents of the downloaded file.

  • circle-info

    To install the Nightfall agent in stealth mode (without notifying the end-user), see Install Nightfall AI Agent for MAC OS.

    mdm_pre_installation_script.sh

    The script is used by MDMs to ensure that a macOS machine is in a clean state before installing the Nightfall Agent. It wipes any existing Nightfall installation and prepares a clean environment for a new install, including:

    • Loading API keys

    • Rebuilding folders

    • Resetting launch daemons

    NightfallAI_Profile_with_Browser_Extension.mobileconfig

    This profile is designed to pre-authorize and enable what the Nightfall Endpoint Agent requires on a macOS machine without needing user prompts.

    • Silently installs/enables the Nightfall browser extension

    • Allows the extension to run without prompts

    • Authorizes required permissions (content inspection, file uploads, scanning)

    hashtag
    Connect Iru (Kandji) to Nightfall (API-based MDM Onboarding)

    This step enables automated mapping of user profiles to devices without requiring manual scripts.

    API-based MDM onboarding allows Nightfall to automatically map the user email attribute to specific devices by syncing device inventory from your Iru (Kandji) instance.

    hashtag
    What You'll Need from Iru (Kandji)

    To connect Iru (Kandji) to Nightfall, you'll need:

    • Iru (Kandji) Organization API URL (for example: yourcompany.api.kandji.io)

    • API Token with read access to device inventory

    hashtag
    Creating API Token in Iru (Kandji)

    1. Log in to your Iru (Kandji) instance

    2. Navigate to Settings > Access > API Token

    3. Click Generate New Token

    4. Configure the following:

      • Name: Nightfall Integration

      • Permissions: Select Read for:

        • Devices

    5. Click Generate Token

    6. Copy the API Token - you'll need this in the next step and it will only be shown once

    circle-info

    Important: Store the API token securely. It will not be displayed again after you close the dialog.

    hashtag
    Finding Your Iru (Kandji) Organization API URL

    Your Kandji Organization API URL follows this format: yourcompany.api.kandji.io

    Where yourcompany is your organization's subdomain in Kandji.

    You can find this in your Kandji admin panel:

    1. Log in to Kandji

    2. Look at your browser URL (e.g., https://yourcompany.kandji.io)

    3. Your API URL is: yourcompany.api.kandji.io

    hashtag
    Connecting Iru (Kandji) to Nightfall

    1. Log in to the Nightfall Console at https://app.nightfall.aiarrow-up-right

    2. Navigate to Settings → MDM Profile

    3. Click Add MDM

    4. Select Kandji from the list of supported MDM providers

    5. Enter the following information:

      • Kandji Organization API URL: Your Kandji API URL (e.g., yourcompany.api.kandji.io)

      • API Token: The API Token you created in Kandji

    6. Click Connect

    Nightfall will validate the credentials and begin syncing device information automatically.

    Important: This API-based connection enables Nightfall to automatically map user email addresses to devices. You do not need to deploy any additional scripts for user-to-device mapping when using this method.

    hashtag
    After Connection

    Once connected, Nightfall will periodically sync device inventory from Kandji. You can now proceed to deploy the Nightfall agent to your devices following the steps below.

    hashtag
    Create a Blueprint

    1. Navigate to https://<your-company-name>.kandji.io/blueprintsarrow-up-right

    2. Click New Blueprint on the top right corner.

    3. Click New Blueprint on the pop up menu.

    4. Enter a name for the blueprint in the Blueprint name field.

    5. Enter a description for the blueprint in the Blueprint description field.

    6. Click Create Blueprint.

    hashtag
    Create Custom Profiles

    In this section, we create a custom profile for each of the profiles provided in the Nightfall endpoint payload and assign them to the blueprint you have created in the previous section.

    1. In the downloaded folder, locate the README.md under /Profiles to learn about the various MDM profiles available.

      1. Choose the NightfallAI_Profile_with_Browser_Extensions.mobileconfig.

    2. Navigate to https://<your-company-name>.kandji.io/libraryarrow-up-right.

      a. Click Add new.

    b. Select Custom Profile and click Add & Configure on the pop-up window.

    c. Add Title, Select Blueprint, and finally drag and drop the .mobileconfig file.

    d. Click Save.

    hashtag
    Create a Custom App

    In this section, we will create a custom app item for Nightfall Endpoint Agent.

    1. Navigate to https://<your-company-name>.kandji.io/libraryarrow-up-right.

    2. Click Add New.

    1. Click Custom App

    2. Click Add & Configure on the pop-up window.

    a. Add Title, Select the Blueprint you previously created.

    b. Select the Audit and enforce option.

    c. Paste the content of mdm_kandji_audit_script into the Audit Script text box.

    d. Choose the Installer Package option.

    e. Add Preinstall Script & Upload the installer package.

    I. Paste the content of mdm_pre_installation_script into the Pre-install Script text box.

    II. Upload the installer package

    i. Drag and drop or click to upload the provided nightfall-ai-agent_v*.*.*.pkg file

    1. Save the change and wait for the changes to get deployed on the node machine.

    hashtag
    Frequently Asked Questions (FAQs)

    Do I still need to install a Nightfall agent on devices after API-based onboarding?

    Yes. API-based MDM onboarding enables Nightfall to map user email addresses to devices automatically. You still need to deploy the Nightfall agent to the devices using the steps above.

    What permissions does Nightfall need in Kandji?

    Nightfall requires least privilege access to device inventory. It does not modify device settings or configurations. The user email to device attribution is automatically managed with API-based MDM onboarding and no manual scripts are needed.

    What happens if API credentials expire or are revoked?

    If credentials expire or are revoked:

    • Device syncing will stop. New devices added or removed will not be reflected in Nightfall during that time.

    • Nightfall will surface an error in the console.

    • You can re-authenticate or update credentials without reconfiguring policies.

    Can I disconnect or change my MDM connection later?

    Yes. Contact Nightfall Support to disconnect or update your MDM connection from Settings → MDM Profile.

    Who should I contact if onboarding fails?

    If you encounter issues:

    • Verify API credentials and permissions in Kandji

    • Check the error message in the Nightfall console

    • Contact Nightfall Support for assistance

    Upload and Add the Pre-Installation Check Scriptarrow-up-right

  • Upload and Add the Pre-Installation Scriptarrow-up-right

  • Upload the Nightfall App Packagearrow-up-right

  • Create a Policy and Add scripts and packagearrow-up-right

  • hashtag
    Prerequisites

    • You are a Systems Administrator in Nightfall

    • You have administrator access to JAMF Pro

    • Target macOS devices are onboarded.

    • On your Nightfall console, navigate to and click the Download Package button on the top right corner of the page. Click Download Package for macOS and unpack the contents of the downloaded file.

    circle-info

    To install the Nightfall agent in stealth mode (without notifing the end-user), see Install Nightfall AI Agent for MAC OS.

    mdm_pre_installation_script.sh

    The script is used by MDMs to ensure that a macOS machine is in a clean state before installing the Nightfall Agent. It wipes any existing Nightfall installation and prepares a clean environment for a new install, including:

    • Loading API keys

    • Rebuilding folders

    • Resetting launch daemons

    NightfallAI_Profile_with_Browser_Extension.mobileconfig

    This profile is designed to pre-authorize and enable what the Nightfall Endpoint Agent requires on a macOS machine without needing user prompts.

    • Silently installs/enables the Nightfall browser extension

    • Allows the extension to run without prompts

    • Authorizes required permissions (content inspection, file uploads, scanning)

    1

    hashtag
    Step 1 - Connect JAMF Pro to Nightfall (API-based MDM Onboarding)

    This step enables automated mapping of user profiles to devices without requiring manual scripts.

    API-based MDM onboarding allows Nightfall to automatically map the user email attribute to specific devices by syncing device inventory from your JAMF Pro instance.

    hashtag
    What You'll Need from JAMF Pro

    To connect JAMF Pro to Nightfall, you'll need:

    • Jamf Pro URL (for example: https://yourcompany.jamfcloud.com)

    • Client ID

    • Client Secret

    The Jamf Pro API client must have permissions to read device and computer inventory.

    hashtag
    Creating API Credentials in JAMF Pro

    1. Log in to your JAMF Pro instance

    2. Navigate to Settings > System > API Roles and Clients

      1. Under the API Roles tab, click the + New button.

    hashtag
    Connecting JAMF Pro to Nightfall

    1. Log in to the Nightfall Console at

    2. Navigate to Settings → MDM Profile

    3. Click Add MDM

    Nightfall will validate the credentials and begin syncing device information automatically.

    Important: This API-based connection enables Nightfall to automatically map user email addresses to devices. You do not need to deploy any additional scripts for user-to-device mapping when using this method.

    hashtag
    After Connection

    Once connected, Nightfall will periodically sync device inventory from JAMF Pro. You can now proceed to deploy the Nightfall agent to your devices following the steps below.

    2

    hashtag
    Step 2 - Upload The Nightfall MDM Profile of your choice to Jamf Pro

    1. In the downloaded folder, locate the README.md under /Profiles to learn about the various MDM profiles available.

    3

    hashtag
    Step 3 - Upload and Add Pre-Installation Check Script

    This script checks if the required profiles are installed and that the endpoint agent is at the desired version.

    4

    hashtag
    Step 4 - Upload and Add the Pre-Installation Script

    This script configures the target machine and prepares it to connect to your Nightfall instance once the package is deployed.

    5

    hashtag
    Step 5 - Upload the Nightfall App Package

    1. Navigate to Settings > Computer management > Packages

    6

    hashtag
    Step 6 - Create a Policy and Add scripts and package

    1. Navigate to Computers > Policies.

    hashtag
    Frequently Asked Questions (FAQs)

    Do I still need to install a Nightfall agent on devices after API-based onboarding?

    Yes. API-based MDM onboarding enables Nightfall to map user email addresses to devices automatically. You still need to deploy the Nightfall agent to the devices using the steps above.

    What permissions does Nightfall need in JAMF Pro?

    Nightfall requires least privilege access to device inventory. It does not modify device settings or configurations. The user email to device attribution is automatically managed with API-based MDM onboarding and no manual scripts are needed.

    What happens if API credentials expire or are revoked?

    If credentials expire or are revoked:

    • Device syncing will stop. New devices added or removed will not be reflected in Nightfall during that time.

    • Nightfall will surface an error in the console.

    • You can re-authenticate or update credentials without reconfiguring policies.

    Can I disconnect or change my MDM connection later?

    Yes. Contact Nightfall Support to disconnect or update your MDM connection from Settings → MDM Profile.

    Who should I contact if onboarding fails?

    If you encounter issues:

    • Verify API credentials and permissions in JAMF Pro

    • Check the error message in the Nightfall console

    • Contact Nightfall Support for assistance

    Connect JAMF Pro to Nightfall (API-based MDM Onboarding)
    Upload Device Profiles to Jamf Proarrow-up-right

    Nightfall Windows Agent Deployment: MSI

    This guide explains multiple ways to deploy the Nightfall Agent (NightfallAgent.msi) with the required API_KEY and COMPANY_ID parameters.

    We cover:

    • PowerShell scripts (local, network share, download from URL)

    • Deployment through Group Policy (GPO)

    hashtag
    Assumptions

    • You have the MSI installer (NightfallAgent.msi) provided by Nightfall.

    • Installation requires two properties:

      • API_KEY="YOUR-API-KEY"

    hashtag
    PowerShell: Local MSI (already copied to the machine)

    Use this if you or your RMM tool place the .msi directly on the machine before running the script.

    hashtag
    PowerShell: Install from a Network Share

    Use this if you keep the MSI on a file server. Make sure Domain Computers or the target machines have read access to the share.

    ⚠️ Use UNC paths (\\server\share\...) — mapped drives won’t work for GPO Startup scripts.

    hashtag
    PowerShell: Download MSI from a URL

    Use this if you host the MSI on an internal HTTPS server or CDN.

    hashtag
    GPO Deployment via Startup Script

    Recommended for domain-joined Windows machines. Use a Startup Script because the built-in “Software Installation” GPO cannot pass custom properties like API_KEY.

    Steps:

    1. Place the script (e.g., Install-NightfallAgent-FromShare.ps1) in

      \\<domain>\SYSVOL\<domain>\scripts\Nightfall\

    2. Ensure Domain Computers have read access.

    3. In Group Policy Management:

    hashtag
    GPO Software Installation with MST (Advanced)

    If you have an MST transform that embeds API_KEY and COMPANY_ID, you can deploy the MSI via:

    Computer Configuration → Policies → Software Settings → Software installation.

    • Add the MSI via UNC path.

    • Open its Properties → Modifications → Add your .mst.

    Without an MST, use GPO via Startup Script instead. One-liner for Testing

    hashtag
    One-liner for Testing

    Run manually on a single machine (PowerShell elevated):

    hashtag
    Verification After Install

    • Check for expected services:

    • Confirm presence of the Nightfall AI icon in the system tray (this may take a few seconds).

      • Double click the icon

      • You should see a connected status as seen in the image above.

    hashtag
    Uninstalling The Nightfall AI Agent

    Nightfall Windows Agent Deployment: JumpCloud MDM

    Instructions on how to install the Nightfall agent on Microsoft Windows using the JumpCloud MDM.

    hashtag
    Prerequisites

    Before beginning the install, make sure you have the following:

    • A JumpCloud Admin / MDM environment ready, and the JumpCloud Agent already configured or in process of being configured for your Windows devices.

    Configure the following:

    • Display Name: Nightfall API Role

    • Privileges: Grant access to:

      • Read Computer Inventory Collection

      • Read Mobile Device Inventory Collection

      • Read Computers

  • Click Save

  • Next, navigate to the API Clients tab and click the + New button.

    1. Configured the following:

      • Display Name: Nightfall API Client

        • API roles: Select the newly created role.

        • Enable/disable API Client: Enable the API client.

    2. Click Save

    3. Copy the Client ID and Client Secret. You will need these in the next step.

  • Select Jamf Pro from the list of supported MDM providers
  • Enter the following information:

    • Jamf Pro URL: Your JAMF instance URL (e.g., https://yourcompany.jamfcloud.com)

    • Client ID: The Client ID you created in JAMF Pro

    • Client Secret: The Client Secret you created in JAMF Pro

  • Click Connect

  • Choose NightfallAI_Profile_with_Browser_Extensions.mobileconfig.

  • Log in to your Jamf Pro account.

  • Navigate to Computers > Configuration Profiles.

  • Click the Upload button.

  • Click the Upload button and upload NightfallAI_Profile_with_Browser_Extensions.mobileconfig.

  • In the Scope tab, add the target devices or device groups to which this profile should be deployed.

  • Click Save.

  • Once assigned, profiles will be automatically deployed as part of the next Jamf inventory cycle.

    triangle-exclamation

    The MDM profile has to be deployed on target machines prior to deploying additional payload. In Jamf, you can enforce this requirement through the creation of a Smart Group in which you can set the presence of the profile created above as a pre-requisite for any other payload targeting the group.

    Unpack the zip file provided and locate the mdm_pre_install_check_script.sh file under the .\\mdm_scripts\\ folder
  • On Jamf Pro, navigate to Settings > Computer management > Scripts

  • Click the + New button.

  • Enter a display name for the script (e.g., "Nightfall AI Pre-Installation Check").

  • Click on the Script tab.

  • Paste the contents of mdm_pre_install_check_script.sh into the script editor.

  • Click Save.

  • Locate the mdm_pre_installation_script.sh file under the .\\mdm_scripts\\ folder
  • On Jamf Pro, navigate to Settings > Computer management > Scripts

  • Click the New button.

  • Enter a display name for the script (e.g., "Nightfall AI Pre-Installation Script").

  • Click on the Script tab.

  • Paste the contents of mdm_pre_installation_script.sh into the script editor.

  • Click Save.

  • Click the + New button.

  • Enter a display name for the package (e.g., "Nightfall AI Agent").

  • Click the Choose File button and upload nightfall-ai-agent-signed.pkg.

  • Click Save.

  • Click the + New button.

  • Enter a display name for the policy (e.g., "Deploy Nightfall AI").

  • From the General tab, configure the Trigger and Execution Frequency as needed.

  • Click Package from the left pane & click on configure

  • Add Nightfall AI Agent package

  • Click on Scripts from the left pane & click on configure

  • Add Pre-Install Check Script and Pre-Install Script. Ensure the Priority is Before and the sequence is [ The scripts must be run once & in sequence to prepare the machine for the package install. ] -

    1. Pre-Install Check Script

    2. Pre-Install Script

  • Click on Scope and determine the Target, Limitations, and Exclusions per need.

  • Click Save.

  • Grants macOS Privacy Permissions required by Nightfall:

    • Full Disk Access (FDA)

    • System Events/Automation Permissions

    • Application Control Permissions

  • Configures the payloads for browser + system integration

  • Prevents users from tampering with the security controls

  • https://app.nightfall.ai/endpointarrow-up-right
    https://app.nightfall.aiarrow-up-right

    Device Details

  • Users

  • Grants macOS Privacy Permissions required by Nightfall:

    • Full Disk Access (FDA)

    • System Events/Automation Permissions

    • Application Control Permissions

  • Configures the payloads for browser + system integration

  • Prevents users from tampering with the security controls

  • COMPANY_ID="YOUR_SECRET_VALUE"
  • Installation is silent (/qn /norestart) and requires administrator rights.

  • Logging is enabled with /l*v for troubleshooting.

  • Go to Computer Configuration → Policies → Windows Settings → Scripts (Startup/Shutdown).

  • Add a Startup Script.

    • Script name: powershell.exe

    • Script parameters: -ExecutionPolicy Bypass -File "\\SYSVOL<domain>\scripts\Nightfall\Install-NightfallAgent-FromShare.ps1"

  • Apply the GPO to the desired OU.

  • Run gpupdate /force or reboot a target machine.

  • One-liner script for testing
    Uninstall with or without the .msi present.
    # Install-NightfallAgent-Local.ps1
    
    $msiPath   = "C:\Temp\NightfallAgent.msi"
    $apiKey    = "REPLACE_WITH_API_KEY"
    $companyId = "REPLACE_WITH_COMPANY_ID"
    
    $logDir = "C:\Windows\Temp\Nightfall"
    $logFile = Join-Path $logDir "NightfallAgent_Install.log"
    
    New-Item -ItemType Directory -Path $logDir -Force | Out-Null
    
    if (Test-Path $msiPath) {
        Write-Output "MSI found at $msiPath. Starting install..."
        $args = "/i `"$msiPath`" API_KEY=`"$apiKey`" COMPANY_ID=`"$companyId`" /qn /norestart /l*v `"$logFile`""
        $proc = Start-Process "msiexec.exe" -ArgumentList $args -Wait -PassThru -NoNewWindow
        if ($proc.ExitCode -eq 0) {
            Write-Output "Nightfall agent installed successfully."
        } else {
            Write-Output "Installer returned exit code $($proc.ExitCode). Check log: $logFile"
            exit $proc.ExitCode
        }
    } else {
        Write-Output "MSI not found at $msiPath. Skipping install."
        exit 2
    }
    # Install-NightfallAgent-FromShare.ps1
    
    $sourceMsi = "\\fileserver\software\Nightfall\NightfallAgent.msi"
    $localMsi  = "C:\Temp\NightfallAgent.msi"
    $apiKey    = "YOUR_API_KEY_HERE"
    $companyId = "YOUR_SECRET_VALUE"
    
    $logDir = "C:\Windows\Temp\Nightfall"
    $logFile = Join-Path $logDir "NightfallAgent_Install.log"
    
    New-Item -ItemType Directory -Path $logDir -Force | Out-Null
    New-Item -ItemType Directory -Path (Split-Path $localMsi) -Force | Out-Null
    
    Write-Output "Copying MSI from $sourceMsi to $localMsi..."
    Copy-Item -Path $sourceMsi -Destination $localMsi -Force -ErrorAction Stop
    
    if (Test-Path $localMsi) {
        Write-Output "Copy complete. Starting install..."
        $args = "/i `"$localMsi`" API_KEY=`"$apiKey`" COMPANY_ID=`"$companyId`" /qn /norestart /l*v `"$logFile`""
        $proc = Start-Process "msiexec.exe" -ArgumentList $args -Wait -PassThru -NoNewWindow
        if ($proc.ExitCode -eq 0) {
            Write-Output "Nightfall agent installed successfully."
        } else {
            Write-Output "Installer returned exit code $($proc.ExitCode). Check log: $logFile"
            exit $proc.ExitCode
        }
    } else {
        Write-Output "MSI copy failed. Check share permissions and path."
        exit 3
    }
    # Install-NightfallAgent-FromUrl.ps1
    # Purpose: Download the Nightfall MSI from a URL, validate it looks like a real MSI, then install silently.
    # Notes:
    #   - Run elevated (admin). Works as a GPO Startup script.
    
    # --- EDIT THESE VALUES ---
    $downloadUrl = "https://example.com/NightfallAgent.msi"  # <-- Replace with your direct MSI URL
    $localMsi    = "C:\Temp\NightfallAgent.msi"
    $apiKey      = "<API_KEY>"        # <-- Replace
    $companyId   = "<COMPANY_ID>"     # <-- Replace
    # --------------------------
    
    $ErrorActionPreference = "Stop"
    
    # Paths for logging
    $logDir  = "C:\Windows\Temp\Nightfall"
    $logFile = Join-Path $logDir "NightfallAgent_Install.log"
    
    # Ensure folders exist
    New-Item -ItemType Directory -Path (Split-Path $localMsi) -Force | Out-Null
    New-Item -ItemType Directory -Path $logDir -Force | Out-Null
    
    # Helper: quick MSI signature + size sanity check
    function Test-IsMsi {
        param([string]$Path)
        if (-not (Test-Path $Path)) { return $false }
        $len = (Get-Item $Path).Length
        if ($len -lt 1MB) { return $false } # tiny files are likely HTML/error pages
    
        # MSI is a CFBF (OLE) container: header D0 CF 11 E0 A1 B1 1A E1
        $fs = [System.IO.File]::Open($Path, 'Open', 'Read', 'ReadWrite')
        try {
            $buf = New-Object byte[] 8
            [void]$fs.Read($buf, 0, 8)
            $hex = ($buf | ForEach-Object { $_.ToString("X2") }) -join " "
            return ($hex -eq "D0 CF 11 E0 A1 B1 1A E1")
        } finally {
            $fs.Close()
        }
    }
    
    Write-Output "Downloading MSI from $downloadUrl ..."
    try {
        # Use HttpClient for robust redirects + streaming
        Add-Type -AssemblyName System.Net.Http
        $handler = New-Object System.Net.Http.HttpClientHandler
        $handler.AllowAutoRedirect = $true
        $handler.AutomaticDecompression = [System.Net.DecompressionMethods]::GZip -bor `
                                          [System.Net.DecompressionMethods]::Deflate -bor `
                                          [System.Net.DecompressionMethods]::Brotli
        $client = New-Object System.Net.Http.HttpClient($handler)
        $client.Timeout = [TimeSpan]::FromMinutes(10)
        $client.DefaultRequestHeaders.UserAgent.ParseAdd("Nightfall-Agent-Installer/1.0")
    
        $response = $client.GetAsync($downloadUrl, [System.Net.Http.HttpCompletionOption]::ResponseHeadersRead).GetAwaiter().GetResult()
        if (-not $response.IsSuccessStatusCode) {
            throw "HTTP $([int]$response.StatusCode) $($response.ReasonPhrase)"
        }
    
        $stream = $response.Content.ReadAsStreamAsync().GetAwaiter().GetResult()
        $tmp = "$localMsi.download"
        $fs = [System.IO.File]::Open($tmp, [System.IO.FileMode]::Create, [System.IO.FileAccess]::Write, [System.IO.FileShare]::None)
        try {
            $buffer = New-Object byte[] (1024*256) # 256 KB chunks
            while (($read = $stream.Read($buffer, 0, $buffer.Length)) -gt 0) {
                $fs.Write($buffer, 0, $read)
            }
        } finally {
            $fs.Dispose()
            $stream.Dispose()
            $client.Dispose()
            $handler.Dispose()
        }
    
        if (Test-Path $localMsi) { Remove-Item $localMsi -Force }
        Move-Item $tmp $localMsi -Force
    
    } catch {
        Write-Error "Download failed: $($_.Exception.Message)"
        exit 100
    }
    
    # Validate the download looks like a real MSI
    if (-not (Test-IsMsi -Path $localMsi)) {
        $size = (Get-Item $localMsi).Length
        Write-Error "Downloaded file does not look like a valid MSI (size=$size bytes). The URL may be a landing page or error."
        exit 101
    }
    
    # Remove MOTW just in case
    try { Unblock-File -Path $localMsi -ErrorAction SilentlyContinue } catch {}
    
    # Install silently with logging
    Write-Output "MSI validated. Installing Nightfall Agent..."
    $args = "/i `"$localMsi`" API_KEY=`"$apiKey`" COMPANY_ID=`"$companyId`" /qn /norestart /l*v `"$logFile`""
    $proc = Start-Process "msiexec.exe" -ArgumentList $args -Wait -PassThru -NoNewWindow
    
    switch ($proc.ExitCode) {
        0     { Write-Output "Nightfall Agent installed successfully."; exit 0 }
        1603  { Write-Error "Fatal error during installation (1603). See log: $logFile"; exit 1603 }
        1618  { Write-Error "Another installation is already in progress (1618)."; exit 1618 }
        1620  { Write-Error "Package could not be opened (1620). File may be invalid. See log: $logFile"; exit 1620 }
        default { Write-Error "Installer returned exit code $($proc.ExitCode). See log: $logFile"; exit $proc.ExitCode }
    }
    $msiPath="C:\Temp\NightfallAgent.msi"; Start-Process msiexec.exe -ArgumentList "/i `"$msiPath`" API_KEY=`"YOUR_API_KEY_HERE`" COMPANY_ID=`"YOUR_SECRET_VALUE`" /qn /norestart /l*v `"`"C:\Windows\Temp\Nightfall\NightfallAgent_Install.log`"`"" -Wait
    Get-Service Nightfall*
    $ProductName = "NightfallAI Agent"
    
    # Function to retrieve installed products matching product name
    function Get-MatchingProducts($name) {
        Write-Host "Searching for products matching: '$name'..."
        Get-WmiObject -Class Win32_Product -ErrorAction SilentlyContinue |
            Where-Object { $_.Name -like "*$name*" }
    }
    
    # Function to uninstall a product by ProductCode
    function Uninstall-Product($product) {
        $name = $product.Name
        $productCode = $product.IdentifyingNumber
    
        if ($productCode) {
            Write-Host "Uninstalling '$name' (ProductCode: $productCode)..." -ForegroundColor Green
            Start-Process "msiexec.exe" -ArgumentList "/x $productCode /qn" -Wait -NoNewWindow
            Write-Host "Uninstalled: $name" -ForegroundColor Green
        } else {
            Write-Warning "Skipping ${name}: missing ProductCode."
        }
    }
    
    # Try finding the initial product
    $products = Get-MatchingProducts -name $ProductName
    
    # If not found, try old NightfallAI Agent name 'Agent'
    if (-not $products -or $products.Count -eq 0) {
        Write-Warning "No installed products found matching: '$ProductName'"
        Write-Host "Trying to search for old NightfallAgent name : 'Agent'" -ForegroundColor Yellow
        $products = Get-MatchingProducts -name "Agent"
    }
    
    # Final check before uninstall
    if (-not $products -or $products.Count -eq 0) {
        Write-Host "No matching products found for either '${ProductName}' or 'Agent'."
        exit 1
    }
    
    foreach ($product in $products) {
        Uninstall-Product -product $product
    }
    

    The Nightfall Windows Agent (MSI) and associated parameters (API_KEY / COMPANY_ID) as from the Nightfall Endpointarrow-up-right page → Download Packages.

  • Internal device group or OU targeting plan within JumpCloud (for example: Windows corporate laptops, desktops, etc).

  • Communication to end-users (if needed) and any documentation of maintenance windows or reboots.

  • Valid credentials / admin rights on target Windows devices (or ability via MDM / script to install silently).


  • hashtag
    Deploy the Nightfall Agent via JumpCloud

    Use JumpCloud’s Commands/Policies feature to deploy the Nightfall Agent silently to the target Windows device group:

    1. In JumpCloud Admin Portal: Device Management → Commands → Commands tab → click + Command (or use Policies if available)

      • Type: Windows

      • Check "Windows PowerShell"

      • Command: Copy/paste in the command shown below.

        • Replace the File Destination ($msi value) as needed or leave as-is.

        • Replace the API_KEY and COMPANY_ID with what is in the Nightfall console.

      • Command Name: (e.g., “Install Nightfall Agent Windows”)

    2. Under Files > click + File > upload the NightfallAgent.msi

    3. Copy the File Destination where the MSI would be copied onto the enrolled devices by jumpcloud mdm.

    4. Choose a Device Group

      1. Navigate to the Device Groups tab.

      2. Check the group to use for deployment.

    5. Click "Save".

    6. Click "Run Now".​


    hashtag
    Post-Installation Verification

    After installation, verify that the Nightfall Agent is functioning correctly:

    • In JumpCloud, Device Management → Devices, check that the device remains active and that there are no policy conflicts or errors.

    • In the Nightfall Console → Integrations → Manage (macOS or Windows) → confirm the device is in the “Connected” state.

    • On the Windows machine, check Programs & Features to confirm “Nightfall Agent” appears.

    • In Services (services.msc), verify the Nightfall service is installed and running.

    • Confirm that the NightfallUI app is shown on the taskbar and that the Version, Company UUID, and Device ID are correct.

    • Conduct a simple test of exfiltration detection (per your internal policy) to ensure the agent is monitoring as expected.​


    hashtag
    Troubleshooting & Best Practices

    • Ensure that the MSI installation parameters (API_KEY, COMPANY_ID) are correct and correspond to your Nightfall account.

    • If installation fails silently, re-run the installation with log flags and check the install log file:

    • If devices have pending reboots or other software installations, consider staging installation to avoid conflicts.

    • Because you’re installing via JumpCloud, ensure the device’s JumpCloud Agent is up-to-date and reporting properly before deploying Nightfall.

    • For stealth or minimal-disruption deployment (if desired), schedule installs during off-hours and consider using silent /qn /norestart. The Nightfall Windows guide supports silent installs.

    • Document versioning of Nightfall Agent: if you need to upgrade later, consider how you’ll script uninstall + reinstall or patch. The MSI guide covers uninstall.

    • Monitor JumpCloud’s device compliance and policy execution logs to ensure the command executed successfully.


    hashtag
    Uninstall via JumpCloud

    1. In JumpCloud Admin Portal: Device Management → Commands → + Command

      • Type: Windows

      • Check "Windows PowerShell"

      • Command: Copy/paste in the command shown below:

      • Command Name: (e.g., “Uninstall NightfallAI Agent Windows”)

      1. Choose a Device Group

        1. Navigate to the Device Groups tab.

        2. Check the group to use for deployment.

    2. Run whenever needed.


    hashtag
    Appendix / Reference Links

    • Nightfall Windows Agent MSI Deployment Guide – Nightfall Help Center: Install Nightfall AI Agent for Windows OSarrow-up-right

    • JumpCloud Windows Agent Installation Walk-through – JumpCloud Support: JumpCloud Agent Windows Installation Walkthrougharrow-up-right

    • JumpCloud Commands / Remote Application Install guide: Install Applications Remotely via JumpCloudarrow-up-right

    Frequently Asked Questions (FAQs)

    hashtag
    Is User Session Check enabled by default?

    No. It must be explicitly enabled in endpoint exfiltration policies.

    hashtag
    Why is the Account Type field empty in some events?

    Session differentiation only applies to supported domains and actions. If unavailable, the field remains empty.

    hashtag
    Does this work on the same domain (e.g., Google Drive → Google Drive)?

    Yes. Differentiation is based on account session, not just domain.

    hashtag
    Can I block only personal account usage but allow corporate usage?

    Yes. Use Domain in with Corporate Domains and enable User Session Check.

    hashtag
    How is the Corporate Domains collection auto-populated and from where are these default domains collected?

    Nightfall automatically populates the Corporate Domains collection by analyzing user email addresses and email alias domains from all connected identity providers (IdPs), including Okta, Entra ID, and Google Directory. Any domain or alias domain associated with users in these directory services is treated as a corporate domain.

    The initial population happens when the Nightfall endpoint agent is first enabled (on the first provisioned OS, macOS or Windows). At that time, Nightfall fetches all user email and alias domains from the connected identity providers and populates the Corporate Domains collection.

    After the initial population, the collection is periodically refreshed (hourly) to capture any newly discovered domains or updates from the connected identity providers.

    hashtag
    Do all supported browsers have the same security coverage?

    Yes. All supported browsers provide identical protection across file uploads, clipboard actions, and personal vs. business enforcement.

    hashtag
    Is Safari supported?

    Safari is supported but Nightfall has not yet enabled Safari extension distribution. As a result, customers cannot currently deploy a publicly available Nightfall plugin on Safari but can install a private package.

    hashtag
    Why is Perplexity Comet not supported on Windows?

    Perplexity Comet’s Windows version prevents third-party browser extension installation, which blocks Nightfall deployment.

    hashtag
    Why isn’t ChatGPT Atlas supported on Windows?

    ChatGPT Atlas is not available on Windows at this time.

    hashtag
    Are AI browsers treated differently from traditional browsers?

    The below capabilities are not support on Perplexity Comet and OpenAI/ChatGPT Atlas.

    ChatGPT Atlas

    • Personal vs. Business, menu + paste blocking are not supported; File upload monitoring and blocking is supported

    • Sidebar assistant: Cannot monitor activity in the sidebar assistant

    Perplexity Comet

    • File upload monitoring and blocking is supported

    • Nightfall browser plugin cannot track activity until a URL is loaded

    • Paste-then-navigate scenario: If users paste content in the initial attempt before URL changes, Nightfall cannot track it

    hashtag
    Are there any feature limitations on Arc, Brave, or Vivaldi?

    No. Arc, Brave, and Vivaldi receive full feature parity with Chrome.

    hashtag
    Can customers use any browsers across their organization?

    Yes. Nightfall policies apply consistently across all supported browsers and operating systems.

    hashtag
    What is the detailed browser support on macoS and Windows?

    Below is a concise summary of Nightfall functionality across each supported browser and operating system.

    Google Chrome

    • macOS & Windows: Fully supported

    • Capabilities: File uploads, clipboard copy/paste, and personal vs. business detection

    • Notes: Full feature parity across both operating systems

    Microsoft Edge

    • macOS & Windows: Fully supported

    • Capabilities: File upload protection, clipboard monitoring, and personal vs. business enforcement

    • Notes: Equivalent security coverage to Chrome

    Firefox

    • macOS & Windows: Fully supported

    • Capabilities: Full data exfiltration protection including file uploads, clipboard actions, and personal vs. business detection

    • Notes: No functional differences across OS

    Arc

    • macOS & Windows: Fully supported

    • Capabilities: File uploads, clipboard protection, and personal vs. business detection

    • Notes: Full feature parity with Chrome

    Brave

    • macOS & Windows: Fully supported

    • Capabilities: Complete exfiltration protection including file uploads, clipboard actions, and personal vs. business detection

    • Notes: No feature gaps compared to Chrome

    Vivaldi

    • macOS & Windows: Fully supported

    • Capabilities: Full coverage for file uploads, clipboard monitoring, and personal vs. business enforcement

    • Notes: Consistent functionality across OS

    Perplexity Comet

    • macOS: Supported

    • Windows: Not supported

    • Capabilities (macOS): Exfiltration protection including file uploads, clipboard actions.

    ChatGPT Atlas

    • macOS: Supported

    • Windows: Not available

    • Capabilities (macOS): File uploads, clipboard monitoring

    Safari

    • macOS: Not currently supported for deployment

    • Windows: Not supported

    • Notes: Safari extension distribution is not yet available

    While configuring the Scope section, if I use the Filter and add my Slack domain. Now, if I download a file from the Slack app will Nightfall monitor this download?

    Yes. Nightfall monitors the downloads even from the Slack app.

    What happens if I don’t configure any removable media filters?

    If no Device Type, Vendor, or Serial Number filters are configured, the policy applies to all removable media by default. This is equivalent to selecting Monitor all for every device filter.

    How do include and exclude filters work together?

    Nightfall evaluates device filters using the following precedence:

    1. Include rules are evaluated first

    2. Exclude rules always override include rules

    3. If no include filters are set, the policy defaults to include all

    This ensures that exclusions (for example, approved corporate devices) are always respected.

    What if I select a specific vendor and a specific serial number in the removable media filters?

    Both conditions must match for the policy to apply:

    • The device must belong to the selected vendor

    • The device’s serial number must match the specified serial number

    If either condition does not match, the policy is not triggered.

    What happens if a removable media device matches an included vendor but is explicitly excluded by serial number?

    The device will not trigger the policy. Serial number exclusions always take precedence, even if the vendor or device type is included.

    What if the device does not report a serial number?

    If a removable device does not expose a serial number:

    • Vendor and Device Type filters are still evaluated

    • Serial number–based include or exclude rules will not match

    In these cases, enforcement behavior is determined by the remaining configured filters.

    Can I allow only a small number of approved USB devices?

    Yes. Configure:

    • Action: To removable media

    • Serial Number: Specific serial numbers

    • Enforcement: Block

    Only the listed devices will be allowed. All other removable media will be blocked.

    Can I block unknown USB drives but allow corporate-issued ones?

    Yes. You can either:

    • Exclude approved vendors, or

    • Exclude approved serial numbers

    All other removable devices will remain in scope for enforcement.

    Does Nightfall continuously support new removable media vendors?

    Yes. Nightfall supports ~1,200 removable media vendors out of the box, and vendor recognition is continuously updated as new devices are observed in the wild.

    Customers do not need to manually onboard new vendors to receive baseline coverage.

    Is enforcement applied if no sensitive data is detected?

    Removable media policies are only enforced when sensitive content is detected according to your configured detection rules. If no sensitive data is found, the file transfer is allowed. You can also block usage of removable media based on a data lineage policy without any content scanning enabled.

    Can I both monitor and block removable media activity?

    Yes. Policies can be configured to block transfers while still logging events for audit and investigation purposes.

    Which operating systems are supported?

    Endpoint Exfiltration Prevention for removable media is supported on:

    • Windows endpoints

    • macOS endpoints

    Behavior may vary slightly based on OS-level device reporting, but enforcement logic remains consistent.

    Does Nightfall inspect or scan my source code?

    No. Git Push Monitoring does not inspect source code, commits, diffs, file names, or repository contents. Nightfall evaluates only metadata associated with the Git push action, such as the destination URL, repository name, user, and device. To scan secrets or any other PII, PCI, PHI or file classifiers in GitHub, you can use Nightfall’s detection and response policies.

    Is any code copied, stored, or transmitted to Nightfall?

    No. Nightfall does not collect or store source code. Only high-level metadata required to identify the Git push event is processed.

    Does Nightfall block Git pushes?

    No. Git Push Monitoring is a monitor-only control. Git operations always complete successfully. When a policy violation occurs, Nightfall generates an event but does not interrupt developer workflows.

    What Git commands are supported?

    Nightfall detects Git push activity regardless of how the push is initiated. The following commands are supported and validated through testing:

    • git push

    • git push origin <branch>

    • git push --set-upstream origin <branch>

    • git push -u origin <branch>

    Pushes triggered indirectly (for example, by scripts or wrappers that ultimately invoke git push) are also detected.

    Are both HTTPS and SSH Git pushes supported?

    Yes. Git Push Monitoring supports:

    • HTTPS-based Git remotes (e.g., https://github.com/org/repo.git)

    • SSH-based Git remotes (e.g., [email protected]:org/repo.git)

    The destination domain is extracted and evaluated consistently across both protocols.

    Are IDE-based Git actions supported?

    Yes. Git pushes initiated from popular IDEs and Git clients are supported, including:

    • VS Code Git integration

    • JetBrains IDEs (IntelliJ, PyCharm, WebStorm, etc.)

    • GitHub Desktop

    • Sourcetree

    As long as the IDE ultimately invokes a Git push operation on a managed endpoint, Nightfall detects the activity.

    Are terminal / CLI Git pushes supported?

    Yes. Git pushes executed directly from:

    • macOS Terminal

    • iTerm

    • Windows Git Bash / PowerShell (where supported by the endpoint agent)

    are fully supported.

    How does Nightfall handle multiple Git remotes?

    If a repository has multiple remotes configured (for example, origin and personal), Nightfall evaluates the specific remote used during the push.

    Example:

    • git push origin main → evaluated against origin destination

    • git push personal main → evaluated against personal destination

    Events accurately reflect the remote and destination URL used.

    What happens with new, empty, or scratch repositories?

    Nightfall detects Git pushes to:

    • Newly created repositories

    • Empty repositories

    • Scratch or temporary repositories

    Even if the repository has no prior history, detection is based on the destination domain and repository URL.

    How are corporate GitHub and GitLab organizations supported?

    Customers can define approved Git destinations using Domain Collections, including:

    • GitHub organizations (e.g., github.com/company-org/*)

    • GitLab cloud namespaces

    Wildcard matching is supported to simplify configuration.

    What happens if a developer pushes to a personal GitHub account?

    If the destination domain or repository does not match the approved domain list:

    • The push succeeds

    • A Git Push event is generated

    • Security teams can investigate and respond

    Are unmanaged devices monitored?

    No. Git Push Monitoring requires the Nightfall endpoint agent. Git activity from unmanaged or offline devices is not detected.

    What are the supported scenarios and capabilities with git push monitoring?

    Support Matrix - The following matrix summarizes supported scenarios with git push monitoring by Nightfall:

    $args = @( 
        '/i', ""$msi"" 
        'API_KEY="<API_KEY>"' 
        'COMPANY_ID="<COMPANY_ID>"' 
        'INSTALL_NF_DRIVER=1'
        '/qn'
    
        '/L*V’,'C:\\Windows\\Temp\\NightfallAgent-install.log’
    )
    From the
    page > click Download Package > copy the API_KEY and COMPANY_ID from the Windows command.
    Click "Save".
    Setting the path of the file upload
    Nightfall Endpointarrow-up-right
    # Uninstall "NightfallAI Agent" silently via MSI ProductCode, with full logging.
    # Works for both 64-bit and 32-bit (WOW6432Node) installs.
    
    $TargetDisplayName = 'NightfallAI Agent'
    $UninstallHives = @(
      'HKLM:\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall',
      'HKLM:\\SOFTWARE\\WOW6432Node\\Microsoft\\Windows\\CurrentVersion\\Uninstall'
    )
    
    Write-Host "Searching for '$TargetDisplayName' in uninstall registry..." -ForegroundColor Cyan
    
    $found = $null
    foreach ($hive in $UninstallHives) {
      if (-not (Test-Path $hive)) { continue }
      foreach ($sub in Get-ChildItem $hive -ErrorAction SilentlyContinue) {
        try {
          $p = Get-ItemProperty $sub.PSPath -ErrorAction SilentlyContinue
          if ($p.DisplayName -eq $TargetDisplayName) {
            $found = [pscustomobject]@{
              KeyName         = $sub.PSChildName
              KeyPath         = $sub.PSPath
              DisplayName     = $p.DisplayName
              UninstallString = $p.UninstallString
            }
            break
          }
        } catch { }
      }
      if ($found) { break }
    }
    
    if (-not $found) {
      Write-Host "Not installed: $TargetDisplayName — nothing to do." -ForegroundColor Yellow
      exit 0
    }
    
    Write-Host "Found:" -ForegroundColor Green
    Write-Host "  Key: $($found.KeyPath)"
    Write-Host "  UninstallString: $($found.UninstallString)"
    
    # Try to extract ProductCode (GUID) from key name or UninstallString
    $guid = $null
    if ($found.KeyName -match '^\\{[0-9A-Fa-f-]{36}\\}$') { $guid = $found.KeyName }
    elseif ($found.UninstallString -match '\\{[0-9A-Fa-f]{8}(-[0-9A-Fa-f]{4}){3}-[0-9A-Fa-f]{12}\\}') { $guid = $matches[0] }
    
    $LogPath = 'C:\\Windows\\Temp\\NightfallAgent-uninstall.log'
    
    if ($guid) {
      Write-Host "Using ProductCode $guid for silent uninstall via msiexec..."
      $args = @('/x', $guid, '/qn', '/norestart', '/L*V', $LogPath)
      $proc = Start-Process -FilePath msiexec.exe -ArgumentList $args -Wait -PassThru -NoNewWindow
      $code = $proc.ExitCode
      Write-Host "msiexec exit code: $code"
      if (Test-Path $LogPath) { Write-Host "MSI log: $LogPath" }
      exit $code
    }
    else {
      # Fallback: run the UninstallString directly (best effort).
      # If it's msiexec without silent flags, try to add /qn /norestart.
      $cmd = $found.UninstallString
      if ([string]::IsNullOrWhiteSpace($cmd)) {
        Write-Error "UninstallString missing — cannot continue."
        exit 1
      }
    
      if ($cmd -match 'msiexec(\\.exe)?\\s+/I\\s*(\\{[^\\}]+\\})') {
        # Convert /I to /x for remove, add silent + log
        $guid2 = $matches[2]
        Write-Host "Converting msiexec /I to silent remove for $guid2"
        $args = @('/x', $guid2, '/qn', '/norestart', '/L*V', $LogPath)
        $proc = Start-Process -FilePath msiexec.exe -ArgumentList $args -Wait -PassThru -NoNewWindow
        $code = $proc.ExitCode
        Write-Host "msiexec exit code: $code"
        if (Test-Path $LogPath) { Write-Host "MSI log: $LogPath" }
        exit $code
      }
      elseif ($cmd -match 'msiexec(\\.exe)?') {
        # It's some other msiexec form; append silent flags if missing
        $aug = $cmd
        if ($aug -notmatch '/qn')       { $aug += ' /qn' }
        if ($aug -notmatch '/norestart'){ $aug += ' /norestart' }
        if ($aug -notmatch '/L\\*V')     { $aug += " /L*V `"$LogPath`"" }
    
        Write-Host "Running: $aug"
        $proc = Start-Process -FilePath 'cmd.exe' -ArgumentList '/c', $aug -Wait -PassThru -NoNewWindow
        $code = $proc.ExitCode
        Write-Host "msiexec exit code: $code"
        if (Test-Path $LogPath) { Write-Host "MSI log: $LogPath" }
        exit $code
      }
      else {
        # Non-MSI uninstaller (unlikely for your MSI). Launch as-is.
        Write-Host "Non-MSI uninstall string; executing as-is."
        $proc = Start-Process -FilePath 'cmd.exe' -ArgumentList '/c', $cmd -Wait -PassThru -NoNewWindow
        $code = $proc.ExitCode
        Write-Host "Uninstaller exit code: $code"
        exit $code
      }
    }
    $msi = 'C:\\Windows\\Temp\\NightfallAgent.msi'
    $args = @(
        '/i', "`"$msi`""
        'API_KEY="<API_KEY>"'
        'COMPANY_ID="<COMPANY_ID>"'
        'INSTALL_NF_DRIVER=1'
        '/qn'
    )
    
    Start-Process msiexec.exe -ArgumentList $args -Wait -NoNewWindow
    Menu + Paste scenarios: Not supported when you open and paste in a new tab; Cannot monitor content on new tabs (chrome://newtabarrow-up-right)
  • Sidebar: Cannot monitor sidebar activity

  • Notes: Windows version blocks third-party extension installation
    Notes: Personal vs. business detection is not currently supported
  • git push <remote> <branch>

  • git push --force / git push -f

  • git push --tags

  • ✅

    Tag Pushes

    ✅

    Approved Domain Allowlist

    ✅

    Domain Not-In Enforcement

    ✅

    Managed Endpoints

    ✅

    Unmanaged Endpoints

    ❌

    Push Blocking

    ❌

    Category

    Supported

    Git Push (CLI)

    ✅

    Git Push (IDE-integrated)

    ✅

    HTTPS Git Remotes

    ✅

    SSH Git Remotes

    ✅

    Multiple Git Remotes

    ✅

    New / Empty Repositories

    ✅

    Force Push (--force)

    Exfiltration Events

    Learn the details available on the Nightfall Exfiltration Events page

    The Nightfall Exfiltration page displays various details of the Exfiltration Events. An Exfiltration Event is automatically created in Nightfall when an Exfiltration policy is violated. The Event displays useful information like the integration on which the exfiltration occurred (Google Drive, Salesforce, macOS/Windows Endpoint), the name of the policy violated, the details of the asset responsible for the violation, and so on.

    hashtag
    Exfiltration Event List View

    You can navigate to the Exfiltration Event page by clicking Exfiltration Prevention button from the left menu.

    Once you land on the Exfiltration Events page, all the Exfiltration Events are listed. This view can be called as the Event list view. When you click an Event on the Event list view, the details of only the selected Event is displayed. We can call it the Event Detail view.

    circle-info

    Some of the Event features are common to both Exfiltration and Data Detection and Response. In such cases, we will provide a link to the respective section in Data Detection and Response.

    The Event list view contains a table which displays details of the Events. You can to learn more about the details displayed in the Event list view.

    hashtag
    Filtering Data

    You can filter the data on the list view by date or by integrations. To filter the data by integrations, you must execute the following steps.

    1. Navigate to Exfiltration Prevention from the left menu.Steps 2-6 help you filter the events to only view the alerts generated by Windows OS.

    2. Click Filter.

    3. Click + Add Filter.

    You can also use the date filter to view historic Exfiltration events. To learn more about how to use the historic time filter, .

    hashtag
    Search Events

    Nightfall provides a powerful search bar to search specific Exfiltration events. Nightfall provides you various search operators to perform your search. You must use the following syntax to search data.

    For example, to search events that are in active state, you must use the State search operator with the following syntax.

    The various Exfiltration search operators provided by Nightfall are as follows.

    hashtag
    General Search Operators

    Search Operator Name
    Description

    hashtag
    Integration Operators

    Integration
    Operator Name
    Description

    To learn more about how to search special characters, refer to . Nightfall allows you to share and download the Event data. The Share button creates a link to the current view with all the filters applied. When you click this link, the Events page opens with all the filters applied.

    Trigger

    Once you zero in on the policy to the required devices and originating domains, you must now define the trigger actions that can be termed as exfiltration events.

    Nightfall provides you with three types of triggers that you can set as exfiltration events.

    • Browser Uploads: In this section, if an asset is uploaded through a browser to an online portal (for example, a social media website), you can define such events as exfiltration events.

    • Cloud Syncing: In this section, if an asset is uploaded to an online cloud store application (for example, Google Drive), you can define such events as exfiltration events.

    Select Integration.
  • Select the check box required integration(s).

  • Click Apply.

  • last_actioned_by

    Search for the user who last took an action on the event.

    notes

    Search the notes entered in an Event.

    policy_id

    Search the unique policy ID.

    policy_name

    Search the policy name.

    resource_content_type

    Search the resource type of the file that was exfiltrated. Resource type refers to the file format and can be PDF, .doc, d.ocx, and so on.

    resource_id

    Search the resource ID. This unique identifier is assigned to resources by their integration (Google Drive, Salesforce)

    resource_name

    Search the resource name (file name) that was exfiltrated.

    resource_owner_email

    Search the email of the user who owns the exfiltrated file.

    resource_owner_name

    Search the name of the user who owns the exfiltrated file.

    state

    Search the current status of the Event. This could be Active, Acknowledge, and so on.

    violation_id

    Search the unique violation ID of the event.

    violation_type

    Search the violation type

    Endpoint (Browser upload)

    endpoint.browser_upload.origin.domain

    Search the domain from which the exfiltrated file emerged.

    Endpoint (Browser upload)

    endpoint.browser_upload.origin.url

    Search the exact URL from which the exfiltrated file emerged.

    Endpoint (Browser upload)

    endpoint.browser_upload.url

    Search the URL used to upload the exfiltrated file.

    Endpoint (Clipboard Copy/Paste)

    endpoint.clipboard_copy.destination.browser_name

    Search the destination browser name to which the copied data was pasted.

    Endpoint (Clipboard Copy/Paste)

    endpoint.clipboard_copy.destination.domain

    Search the destination domain name to which the copied data was pasted.

    Endpoint (Clipboard Copy/Paste)

    endpoint.clipboard_copy.origin.browser_name

    Search the origin browser name from which the data was copied.

    Endpoint (Clipboard Copy/Paste)

    endpoint.clipboard_copy.origin.domain

    Search the origin domain name from which the data was copied.

    Endpoint (Clipboard Copy/Paste)

    endpoint.clipboard_copy.origin.url

    Search the origin URL from which the data was copied.

    Endpoint (Cloud Sync)

    endpoint.cloud_sync.account_name

    Search the name of the account to which the file was uploaded.

    Endpoint (Cloud Sync)

    endpoint.cloud_sync.account_type

    Search the account type (personal/business) of the account to which the file was uploaded.

    Endpoint (Cloud Sync)

    endpoint.cloud_sync.app

    Search the cloud storage app name (Google Drive, OneDrive) to which the file was uploaded.

    Endpoint (Cloud Sync)

    endpoint.cloud_sync.destination_file_path

    Search the destination directory in the storage app to which the file was exfiltrated.

    Endpoint (Cloud Sync)

    endpoint.cloud_sync.email

    Search the email ID of the account to which the file was uploaded.

    Endpoint (Cloud Sync)

    endpoint.cloud_sync.file_name

    Search the name of the file which was uploaded to a cloud storage app.

    Endpoint

    endpoint.device_id

    Search the endpoint device ID of the device from which the exfiltration was performed.

    Endpoint

    endpoint.machine_name

    Search the endpoint device name from which the exfiltration was performed.

    Google Drive

    gdrive.drive

    Search a drive within Google Drive. Returns all the events that were exfiltrated from the searched drive.

    Google Drive

    gdrive.file_owner

    Search a Google Drive user. Returns all the events that were owned by the searched user and were exfiltrated.

    Google Drive

    gdrive.label_name

    Search a Google Drive label. Returns all the events that contained the searched label and were exfiltrated.

    Google Drive

    gdrive.permission

    Search a Google drive permission (restricted, pubic). Returns all the events that contain the searched permission and exfiltrated.

    Google Drive

    gdrive.shared_external_email

    Search the shared Gmail external email ID.

    Google Drive

    gdrive.shared_internal_email

    Search the shared Gmail internal email ID.

    Salesforce

    salesforce.file.session_level

    Search for Salesforce session level file

    Salesforce

    salesforce.file.source_ip

    Search the IP address of the source machine that initiated the exfiltration of the file.

    Salesforce

    salesforce.report.description

    Search the description provided in Salesforce report.

    Salesforce

    salesforce.report.event_source

    Search the Salesforce report event source.

    Salesforce

    salesforce.report.operation

    Search the Salesforce report operation.

    Salesforce

    salesforce.report.scope

    Search the Salesforce report scope.

    Salesforce

    salesforce.report.session_level

    Search the Salesforce session level report.

    Salesforce

    salesforce.report.source_ip

    Search the source IP address of the Salesforce report.

    actor_Email

    Search using the Email ID of the actor whose action triggered the Event.

    actor_Name

    Search using the name of the actor (device name) from which the Event was triggered.

    event_id

    Search the unique Exfiltration event ID.

    event_type

    Search the Exfiltration event type.

    integration_name

    Search the integration name.

    last_action

    Search the last action implemented on an event. Example of action can be Acknowledge, Ignore, Resolve, and so on.

    Endpoint (Browser upload)

    endpoint.browser_upload.browser_name

    Search the Web browser that was used to upload file.

    Endpoint (Browser upload)

    endpoint.browser_upload.domain

    Search the domain name that was used to upload file.

    Endpoint (Browser upload)

    endpoint.browser_upload.file_name

    Search the name of the file.

    Endpoint (Browser upload)

    endpoint.browser_upload.origin.browser_name

    click herearrow-up-right
    refer this sectionarrow-up-right
    this sectionarrow-up-right

    Search the browser from which the exfiltrated file emerged.

    search operator name:"search term"
    State:"Active"
  • Clipboard Paste: In this section, if data is copied from a source and pasted to a destination, you can define such events as exfiltration events.

  • Git Push: Git Push Monitoring helps organizations detect when source code is pushed from managed endpoints to non‑approved Git destinations. This feature is designed to prevent accidental or intentional source‑code exfiltration. Detection is based on source and destination metadata.

  • The steps to use the above triggers are elaborated in the following sections.

    hashtag
    Browser Uploads

    Ensure that you have configured domain collections before using the browser uploads option.

    To monitor browser uploads:

    1. Select the Browser uploads to option.

    1. Select one of the following options.

    • Any Domain: If you select this option, Nightfall monitors your uploads done to any domain on the Internet.

    • Domain in: If you select this option, you must additionally also select the domain collections created in the domain collections section. Nightfall monitors the uploads done to all the domains that belong to the selected domain collections.

    Once you select a domain collection, it is displayed on the screen and greyed out from the drop-down menu. You can use the drop-down menu to select additional domain collections.

    • Domain Not in: If you select this option, you must additionally also select the domain collections created in the domain collections section. Nightfall does not monitor the uploads done to all the domains that belong to the selected domain collections.

    Once you select a domain collection from the drop-down menu, it is displayed on the screen and grayed out from the drop-down menu. You can use the drop-down menu to select additional domain collections.

    hashtag
    Cloud Sync App Uploads

    In this option, you can either choose to monitor uploads done to every cloud sync app or select specific cloud sync apps to which the uploads must be monitored.

    1. Select the Cloud Syncing option.

    2. Select one of the following options.

    • Any Storage Apps: If you select this option, Nightfall monitors the uploads done to every cloud sync storage application.

    • Specific Storage App(s): If you select this option, you must additionally select the storage apps. Nightfall monitors the uploads done to the selected storage apps.

    Once you select a cloud storage application from the drop-down menu, the selected option is displayed on the screen and grayed out from the drop-down menu. You can use the drop-down menu to select additional cloud storage apps.

    hashtag
    Clipboard Paste

    In this option, you can choose to monitor the copy/paste actions performed by end-users. If end-users copy some data and paste it to unsanctioned locations.

    Apart from text data, Nightfall can also detect non-text clipboard content, including images and screenshots. Clipboard Paste trigger uses the optical character recognition (OCR) technology in combination with Nightfall detectorsarrow-up-right to prevent the exfiltration of sensitive data present in visuals like copied screenshots, scanned documents, or copied images from web browsers.

    Use cases

    • A typical example of this trigger can be a scenario in which an end-user copies an API key and pastes it in a prompt in ChatGPT/Deepseek or any other Gen AI apps while attempting to generate a piece of code.

    • An employee attempting to capture a screenshot of dashboards, reports, or customer data from sensitive SaaS apps into unsanctioned destinations.

    To enable the Clipboard Paste trigger:

    1. Select the Paste To option.

    2. Select one of the following options.

      1. Any Domain: If you select this option, Nightfall monitors your paste actions performed on any domain on the Internet.

      2. Domain in: If you select this option, you must additionally also select the domain collections created in the section. Nightfall monitors the uploads done to all the domains that belong to the selected domain collections. The process of domain selection remains the same as demonstrated in the case of the section.

      3. Domain Not in: If you select this option, you must additionally also select the domain collections created in the section. Nightfall does not monitor the uploads done to all the domains that belong to the selected domain collections.

    Once you select a domain collection from the drop-down menu, it is displayed on the screen and grayed out from the drop-down menu. You can use the drop-down menu to select additional domain collections.

    circle-info

    If end-users attempt to paste content, once you enable the Clipboard Paste trigger, they receive an error message as shown in the following image.

    hashtag
    Removable Media

    Nightfall’s removable media controls allow you to monitor or block sensitive data exfiltration to external storage devices such as USB drives and external HDD/SSD. Policies are evaluated at the endpoint and can be scoped with device type, vendor, and serial number filters for precise enforcement.

    Out of the box, Nightfall supports ~1,200 removable media vendors, enabling immediate coverage without manual vendor onboarding.

    Nightfall detects and can block the following removable media categories:

    • USB storage devices (thumb drives, external HDD/SSD)

    These are internally represented as removable media types and can be included or excluded in the policy configuration.

    How Removable Media Policies Work

    A removable media policy is evaluated using three layers of filters:

    1. Origin - Where the content originated from

    2. Destination Removable Media Filters - Which removable devices the rule applies to

    3. Content Detection - Whether sensitive data is present

    4. Endpoint Device - Which devices are included or excluded in the policy

    If all conditions match, the configured enforcement (Monitor or Block) is applied.

    Policy configuration:

    1. Step 1 - To apply a policy to removable devices:

      • Set Action to “To removable media”

      This ensures the rule only evaluates file transfers where data is being written to an external device.

    2. Step 2 - Removable media filters

      1. Removable media filters allow you to precisely control which removable devices are included in enforcement.

        1. Device Type

          1. Monitor all – Applies to all removable media types

    Once a removable media action and device match, Nightfall evaluates the content being transferred:

    • Sensitive data types (PII, credentials, secrets, etc.), file classifiers or any other applicable detectors in the configured detection rules

    If sensitive content is detected, enforcement is applied. Each policy can be configured to:

    • Monitor – Log the event for visibility and auditing

    • Block – Prevent the transfer to removable media

    Both modes can be enabled simultaneously to provide audit visibility even when blocking.

    Common Configuration Examples

    1. Example 1: Block All USB Devices

      1. Action: To removable media

      2. Device Type: USB

      3. Vendor: Monitor all

      4. Serial Number: Monitor all

      5. Enforcement: Block

    2. Example 2: Allow Only Approved Vendors

      1. Action: To removable media

      2. Vendor: Specific vendor(s)

      3. Enforcement: Block

    3. Example 3: Allow Only Specific Devices

      1. Action: To removable media

      2. Serial Number: Specific serial numbers

    4. Example 4: Exclude Corporate USB Drives

      1. Action: To removable media

      2. Vendor: All vendors

      3. Serial Number: All serial numbers except

    For exfiltration events involving removable media, Nightfall surfaces additional asset-level metadata to help security teams understand where data was written and which physical device was involved.

    In the Asset details panel, you can expect the following removable media–specific fields:

    • Medium – Indicates the destination medium as Removable Media

    • Mount Path – The local mount location of the device on the endpoint (for example, /Volumes/My USB Device on macOS)

    • Volume Label – The human-readable label assigned to the removable device

    • Media Type – The category of removable media (for example, USB, HDD/SSD)

    • Vendor ID – The hardware vendor identifier reported by the operating system

    • Serial Number – The device’s unique serial number, when available

    These fields are available only for removable media events and enable precise investigations, device allowlisting, and policy tuning.

    All other event information - including user identity, endpoint details, timestamps, policy action, file preview, activity log and risk context, manual actions - is consistent with other Endpoint Exfiltration events and is available in the Summary and Device tabs.

    hashtag
    Git Push Monitoring

    Nightfall monitors the following signals during a Git push operation:

    • The endpoint where the push originates

    • The user performing the push

    • The Git protocol (HTTPS / SSH)

    • The remote destination URL

    • The repository name and configured remotes

    A Git Push Monitoring policy evaluates where code is being pushed, not what is being pushed. If the destination does not match your approved Git domains, Nightfall generates an exfiltration event.

    Supported Git Destinations

    Git Push Monitoring supports:

    • GitHub Cloud

    • GitLab Cloud

    • Bitbucket

    • Any Git server accessible via HTTPS or SSH

    Policy Configuration

    1. Step 1: Define Approved Git Destinations

    Customers define approved Git hosting locations using Domain Collections.

    Examples:

    • github.com/my‑company‑org/*

    • gitlab.company.com/*

    • bitbucket.org/company/*

    These domains represent where source code is allowed to be pushed.

    1. Step 2: Configure Git Push Monitoring Policy

    Policy Type: Endpoint Exfiltration Action: Git Push

    Destination Condition Options:

    • Any domain

    • Domain in approved list

    • Domain not in approved list (recommended)

    Recommended Configuration:

    This configuration alerts when developers push code outside approved repositories.

    Example Use Cases

    1. Prevent Personal GitHub Usage

      1. Approved: github.com/company‑org/*

      2. Detected: github.com/john‑doe/test‑repo

    2. Monitor Scratch or Temporary Repositories

      1. Even if the repository is newly created or unnamed, Nightfall detects the push if the destination domain is not approved.

    3. Enforce Corporate GitHub & GitLab Usage

      1. Ensure all production code stays within:

        1. Corporate GitHub organizations

    Event Details

    When a Git push violates policy, Nightfall generates an event with metadata‑only context.

    Event Summary Fields

    Field

    Description

    Event Type

    Git Push

    Repository

    Repository name

    Actor

    User performing the push

    Device

    Endpoint hostname

    Destination URL

    Git remote URL

    Git Remotes

    origin, personal, etc.

    Example Scenarios

    The following scenarios illustrate the support matrix for this capability.

    1. Push to Approved Repository

      1. Git operation succeeds

      2. No alert generated

    2. Push to Non‑Approved Repository

      1. Git operation succeeds (no blocking)

      2. Exfiltration event generated

    3. HTTPS and SSH Both Supported

      1. Detection works for both authentication methods

    4. Multiple Remotes Supported

      1. Events reflect the actual remote used for the push

    5. Unmanaged Devices

      1. No detection occurs without an endpoint agent

    Git Push Monitoring provides organizations with a simple and effective control to:

    • Detect source code exfiltration

    • Enforce approved Git destinations

    • Gain visibility into developer Git activity

    Scope

    Forensics Search

    Perform insider risk investigations and threat hunting across all detected data exfiltration events — not only policy-triggered alerts.

    Managed Endpoint with Nightfall agent
       └── git push
            ├── Action: Git Push
            ├── Source: Managed device
            └── Destination:
                 ├── Approved domain → Allowed
                 └── Non‑approved domain → Exfiltration Event generated
    Action: Git Push
    For: Domain not in <Approved Git Domains>
    Content Scanning
    Asset Origin

    Specific types – Limit enforcement to selected media types (USB, HDD/SSD)

  • All device types except – Exclude specific device types from enforcement

  • If no specific type is selected, all removable media types are included by default.

  • Vendor filtering

    1. Nightfall supports ~1,200 removable media vendors out of the box.

    2. You can configure vendor behavior as follows:

      1. Monitor all vendors (default)

      2. Specific vendor(s) – Apply the rule only to selected vendors

      3. All vendors except – Exclude specific vendors from enforcement

      4. Vendor matching is based on device metadata reported by the operating system.

      5. Example use cases:

        1. Allow corporate-approved encrypted USB vendors

        2. Block unknown or consumer-grade USB brands

  • Device Serial Number Filtering

    1. Serial number filters provide the most granular level of control.

      Options:

      1. Monitor all (default)

        • Specific serial numbers – Apply enforcement only to listed devices

        • All serial numbers except – Exclude specific devices from enforcement

          • Serial numbers are matched exactly as reported by the endpoint OS.

      2. Example use cases:

        • Allow a small set of approved devices

        • Exempt forensic or IT-issued USB drives

  • Filter precedence and evaluation logic

    1. When multiple device filters are configured, Nightfall evaluates them together using the following rules:

      1. Include rules are evaluated first

      2. Exclude rules override include rules

      3. If no include filters are specified, the rule defaults to include all

    2. Practical Implications

      1. If you select Specific vendors, only those vendors are eligible

      2. If you then exclude a serial number, that device will never trigger the policy

  • All other vendors will be blocked.

  • Enforcement: Block
  • Only listed devices will be allowed; all others blocked.

  • Enforcement: Block

  • Corporate-approved devices are excluded from enforcement.

  • Internal GitLab instances

    Risk

    Critical, High, Medium, Low

    domain collections
    domain collections
    Browser Uploads

    Investigation Workflow

  • Risk Scoring

  • Common Investigation Patterns

  • Exporting Investigation Evidence

  • Tutorials

  • FAQs

  • hashtag
    Overview

    Forensic Search provides a searchable timeline of detected data exfiltration events across your employee base. The search events include all events for all supported exfiltration vectors — not only policy-triggered alerts.

    Security teams use Forensic Search to investigate how organizational data moves to external destinations such as cloud storage platforms, SaaS applications, and external email systems.

    The interface allows analysts to search, filter, and review exfiltration events to determine:

    • which user moved data

    • which device performed the action

    • where the data was sent

    • whether sensitive data was involved

    This enables rapid investigation of insider risk incidents and potential data exfiltration activity.

    Forensic Search with Date Range and Actions filter applied.

    hashtag
    Quickstart: Investigate Potential Data Exfiltration

    Use the following steps to quickly investigate suspicious data movement.

    1. Navigate to Discovery → Forensic Search.

    2. Select the user of interest with User filter.

    3. Set the Time Range to Last 7 days.

    4. Add a Risk filter and select:

      • Critical

      • High

    5. Sort the event table by Timestamp to review the most recent events first.

    6. Scan the Destination column for external services such as:

      • personal cloud sync

      • personal accounts

    7. Click any event to open the Event Detail Panel.

    8. Review the following fields:

      • User – who performed the action

      • Asset – what file or content was transferred

    9. If suspicious activity is confirmed, include all events by deleting the Risk Filter, and click Export Events to download a CSV for documentation or further investigation.

    circle-info

    Filtering to Critical and High risk events is the fastest way to identify suspicious data transfers.

    hashtag
    Investigating Data Exfiltration with Forensic Search

    Security teams use Forensic Search to investigate how organizational data moves to external destinations and to identify potential data exfiltration activity.

    Common investigation scenarios include:

    • Investigating departing employees

    • Reviewing unusual data transfer alerts

    • Performing threat hunting for data exfiltration

    • Auditing data movement to external services

    • Identifying early adopters of Gen AI and AI Agent tools

    • Investigating suspicious cloud storage activity

    Forensic Search tool zeroing in on a suspicious cloud sync activity.

    Forensic Search allows analysts to reconstruct how data moved outside the organization by examining sequences of exfiltration events.

    Data exfiltration rarely occurs as a single action. Instead, it typically appears as a pattern of related events occurring over a short period of time.

    Security analysts often look for the following behavioral patterns when investigating potential exfiltration.

    Pattern
    Description
    Why It Matters

    Burst Uploads

    Large numbers of uploads occurring in a short time window.

    May indicate bulk data staging prior to exfiltration.

    Off-Hours Activity

    Transfers occurring late at night or on weekends.

    Unexpected activity outside normal working hours may indicate suspicious behavior.

    Multiple External Destinations

    Sequential uploads to several different services.

    May indicate attempts to bypass security controls or distribute data across multiple locations.

    Personal Cloud Storage

    Uploads to personal accounts such as Google Drive (Personal) or Dropbox (Personal).

    hashtag
    Investigation Workflow

    Most investigations follow this workflow:

    1. Identify suspicious data movement or receive an alert.

    2. Filter events by user and/or time range.

    3. Review event details and destinations.

    4. Identify patterns of data movement.

    5. Export events for investigation documentation.

    This workflow allows analysts to quickly determine whether activity represents legitimate work or potential data exfiltration.


    hashtag
    Risk Scoring

    To assist in identifying potentially risky behavior, Nightfall assigns a risk score to individual exfiltration events observed in Forensic Search. Each event receives a risk level that helps analysts prioritize investigations and quickly surface higher-risk data transfers.

    Event-level risk scoring is currently in beta and is intended to provide investigation guidance rather than definitive risk determinations. Analysts should evaluate events within the broader context of user activity and look for patterns of behavior across multiple events, rather than relying on a single event score.

    Risk Level
    Meaning

    🚨 Critical

    Immediate investigation recommended

    🔴 High

    Elevated risk signals detected

    🟡 Medium

    Moderate risk indicators

    🟢 Low

    Activity appears consistent with expected usage

    ⚪ Unknown

    Insufficient context to determine risk

    hashtag
    Risk Signals

    In the current release, event risk scores are calculated are based on two primary signals:

    1. Application Risk Level

    2. User Session Context (Corporate vs Personal Account)

    These signals help determine whether data is being transferred to a higher-risk application or outside corporate identity boundaries.

    hashtag
    Application Risk Level

    Every destination application detected in an exfiltration event inherits a baseline risk level from App Intelligence.

    App Intelligence continuously discovers and classifies the web applications employees interact with. Each application is categorized based on its function and typical data exposure risk, such as:

    • Cloud storage

    • File sharing

    • Developer tools

    • GenAI and AI Agent tools

    • Business SaaS

    Applications that enable easy external data transfer or lack strong identity controls typically carry higher baseline risk.

    circle-info

    App Intelligence provides the discovery and classification layer used for application risk scoring.

    hashtag
    User Session Context

    Risk scoring also considers whether the user is operating within a corporate identity boundary.

    When available, Nightfall determines whether a user is authenticated to a corporate account or a personal account within the destination application.

    Examples:

    Scenario
    Risk Impact

    Upload to corporate Google Drive

    Low risk

    Upload to personal Google Drive

    Critical risk

    Files uploaded or copy-pastes to a GenAI site using a corporate account

    Low risk

    Files uploaded or copy-pastes to a GenAI site using a personal account

    High risk

    Transfers to personal accounts represent a significantly higher risk of data exfiltration because the organization does not control those accounts.

    circle-info

    Session detection requires the Nightfall browser extension to be installed.


    hashtag
    Exporting Investigation Evidence

    Investigators can export results using Export Events.

    Exports include:

    • event fields

    • timestamps

    • risk scores

    Exports are commonly used for:

    • incident response documentation

    • compliance reporting

    • deeper analysis in SIEM platforms

    Exports respect active filters, allowing analysts to export specific investigation scopes.


    hashtag
    Tutorials

    hashtag
    Investigating a Departing Employee

    1. Open Forensic Search.

    2. Set the time range to Last 30 days.

    3. Filter by the employee's email.

    4. Review the timeline histogram for activity spikes.

    5. Filter to Critical and High risk events.

    6. Review destinations and file metadata.

    7. Zoom in on suspicious events by clicking on timeline.

    8. Remove Risk filter and expand date range to review surrounding behaviors.

    9. Export relevant events for documentation.


    hashtag
    Investigating Off-Hours Transfers

    1. Set the time range to Last 7 days.

    2. Review the timeline for late-night activity.

    3. Zoom into suspicious time windows.

    4. Filter by High and Critical risk events.

    5. Review upload destinations.


    hashtag
    Investigating Unusual Data Movement

    1. Filter by Upload or Cloud Sync.

    2. Filter by Critical and High risk events.

    3. Look for sequential transfers to external services.

    4. Review event details to confirm file types and destinations.

    5. Export events if escalation is required.


    hashtag
    FAQs

    hashtag
    How far back can I search events?

    Events can be searched for up to 180 days. Currently, the earliest available events begin on February 6, 2026, so searches cannot return events earlier than that date.


    hashtag
    How quickly do events appear?

    Events typically appear within 30 minutes of occurring.


    hashtag
    Can events be exported?

    Yes. Events matching current filters can be exported to CSV.


    hashtag
    Can searches be saved?

    Saved searches are planned for a future release.


    hashtag
    Who can access Forensic Search?

    Access is controlled through Nightfall role-based permissions.

    Overview
    Quickstart: Investigate Potential Data Exfiltration
    When to Use Forensic Search

    Scope

    The Scope section enables you to create an asset lineage based policy in which you can track the journey of an asset from source to destination.

    hashtag
    Key Features of Lineage Based Policies

    • Security administrators can set precise exfiltration policies to protect sensitive files that originate from high-value SaaS locations from being exfiltrated to unsanctioned destinations

    • High performance security teams can focus their energy and resources on monitoring assets from high value SaaS domains.

    • By combining content download origin to upload destination, organizations can extend their monitoring to cover any cloud application accessed through the browser, even those without direct API integration.

    • Allows security teams to monitor and prevent data exfiltration not just through direct browser uploads but also through cloud storage sync applications, providing a multi-layered defense against data leaks.

    • With lineage-based policies, organizations can proactively identify and manage risks associated with sensitive content movement, ensuring compliance with data security standards and preventing potential breaches before they occur.

    hashtag
    Configuring the Scope Page

    The Scope page consists of the following sections.

    hashtag
    Operating Systems

    This section allows you to select the operating systems to which the policy must be scoped. Nightfall supports the Microsoft's Windows and Apple's MAC operating systems. You can either choose any one of the operating system or both the operating systems, based on your organization's requirements. You must click the check box of the respective operating system to include it in the scope of the policy. All the devices that belong to the selected operating system(s) are monitored by Nightfall.

    circle-exclamation

    Kindly note that some of the advanced policy features like , , and automated actions are not yet available on Windows—but stay tuned, as we’re working to bring these capabilities soon!

    hashtag
    Devices

    By default, Nightfall monitors all the devices that belong to the selected operating system(s). However, you can choose to exclude trusted devices from being monitored. The Exclude Devices section consists of a drop-down menu. This menu lists all the devices that belong to the selected operating system(s). You can select the devices that you wish to exclude from being monitored.

    circle-info

    If you have a long list of assets, you can search for an asset by entering the device ID of the asset.

    hashtag
    Content Scanning

    The Content Scanning section allows you to scan the downloaded content for sensitive data. You can choose the that you wish to use for scanning the downloaded data. With this feature, you can monitor exfiltration attempts on sensitive data. For instance, you can monitor if any of the content uploaded to unsanctioned destinations contains regulated information like PCI, PII, PHI or organization's secrets like credentials, API keys, and so on. You can combine content scanning with and the Block features to prevent any exfiltration files containing sensitive data.

    To use this feature, you must first select the On option from the drop-down menu and then select the required Nightfall detectors.

    If a downloaded file contains sensitive data, it is reported in the exfiltration event. You can check the assets tab of an exfiltration event to view the sensitive data found. In the following image, you can see that a called Credit Card Number is violated 20 times in one of the files uploaded to through the browser.

    hashtag
    Filters

    The filters section provides you the flexibility to include and exclude users at a granular level. Once you select the operating system and the devices to be monitored, you can further drill down your scope by using filters. You can apply filters to only monitor assets downloaded from specific domains. Conversely, you can also choose to exclude the monitoring of assets downloaded from specific domains. Additionally, you can also apply filters to only monitor or exclude the monitoring of assets downloaded by specific high risk, like departing users, or function user groups, like HR, Finance or Engineering.

    circle-info

    You must configure the feature to use the and filters.

    hashtag
    Asset Origin

    The Asset Origin filter allows you to limit the scope of the policy to only those assets which originated from a specific source. To use the asset origin filter, you must click Add Filter and select Asset Origin.

    The Asset Origin filter provides the following options:

    • Any Domain: If you select this option, Nightfall monitors the assets originated (downloaded) from any domain, present in any of the .

    • Domain in: If you select this option, you must additionally also select the domain collections, created in the section. In this case, Nightfall monitors only those assets that originated from a domain, which is a part of any of the selected domain collection(s).

    Once you select a domain collection, it is displayed on the screen and greyed out from the drop-down menu. You can use the drop-down menu to select additional domain collections.

    • Domain Not in: If you select this option, you must additionally also select the domain collections, created in the section. In this case, Nightfall does not monitor those assets that originated from a domain, which is a part of any of the excluded domain collection(s).

    Once you select a domain collection, it is displayed on the screen and greyed out from the drop-down menu. You can use the drop-down menu to select additional domain collections.

    hashtag
    User Session Check

    User Session Differentiation (also referred to as User Session Check) enables Nightfall to distinguish between personal and corporate user accounts on supported SaaS applications, cloud storage platforms, and AI web apps. This capability addresses a critical data exfiltration capability by detecting and enforcing policies when sensitive data moves from corporate contexts to personal contexts, even when both occur on the same domain.

    This feature is available on macOS and Windows.

    Traditional DLP solutions struggle to differentiate who a user is logged in as on dual-use platforms like Google Drive, Microsoft 365, or AI assistants. This creates blind spots where users can bypass controls by switching to personal accounts.

    User Session Differentiation enables:

    • Prevention of shadow exfiltration via personal accounts

    • Context-aware enforcement (corporate to corporate vs. corporate to personal)

    • Clear audit trails showing account type involved in an event

    Confident blocking of high-risk transfers without disrupting legitimate workflows.

    When enabled, Nightfall:

    • Detects whether the source and/or destination account is corporate or personal

    • Applies policy logic based on session context (not just domain)

    • Captures session metadata for investigation and audit

    As an example, if an employee:

    • Downloads a file from their corporate Google Drive

    • Uploads it to their personal Google Drive

    Nightfall can detect, alert, or block this action.

    Supported Coverage

    User Session Differentiation works across 35+ supported domains, including:

    Google Workspace

    • Drive, Docs, Gmail, Calendar, Meet, Keep

    Microsoft 365

    • OneDrive, SharePoint, Teams, Outlook, Office apps

    Cloud Storage

    • Dropbox, Box, iCloud

    AI / Shadow AI Apps

    • ChatGPT, Claude.ai, Gemini, Copilot, Perplexity

    Session context is captured for:

    • Browser file uploads

    • Clipboard copy/paste actions

    How It Works

    1. Browser Extension captures session context on supported domains

    2. Directory Sync from Okta, Entra ID, Google Directory identifies corporate accounts and domains

    3. Corporate Domains collection is populated automatically with the domains from directory sync

    Corporate Domains Collection

    The Corporate Domains collection represents domains associated with corporate identities (for example, contoso.com). It is required for session differentiation.

    • Automatically populated when the endpoint agent is enabled and once the directory sync is setup

    • Happens once, based on the first OS provisioned (macOS or Windows)

    • After initial population, the collection is refreshed via an hourly job

    Note: Corporate Domains are populated immediately upon directory sync and once one or more endpoint agents are installed.

    Enabling User Session Differentiation

    Requirements

    • Endpoint agent with browser extension

    • macOS: Chrome (1.2.9.x+)

    • Windows: Chrome, Edge, Firefox (1.2.32+)

    macOS (MDM)

    • Deploy NightfallAI_Profile_with_Browser_Extensions.mobileconfig

    • Automatically installs browser extension and logs users in

    Windows

    • No additional MDM profile required

    User Session Differentiation is available in Endpoint Exfiltration policies and requires the User session check toggle to be enabled.

    Where It Appears

    The toggle is shown when:

    • Monitoring supported domains

    • Using Domain / URL-based sources or destinations

    How to Configure User Session Check

    Asset Origin (Trigger)

    1. Defines where data originates from.

    2. Supported operators:

      1. Domain in, Domain not in, Any domain

    Action (Destination)

    1. Defines where data is going (upload, paste, transfer).

    2. Supported actions include:

      1. Browser uploads to, Clipboard copy/paste

    Common Policy Use-Cases

    1. Block Corporate to Personal AI Uploads

      1. Source: Domain in → Corporate Domains

      2. Action: Browser upload to → Domain in → AI Assistants

    hashtag
    Internal Users

    • Specific User(s): You must choose this option to monitor the actions of specific internal users. Once you choose this option, Nightfall populates the list of users from the synced IdPs in . You must select the required users.

    • All Users, except for: You must select this option to exclude the monitoring of specific internal users. Once you choose this option, Nightfall populates the list of users from the synced IdPs in . You must select the required users.

    hashtag
    Internal Groups

    • Specific Group(s): You must choose this option to monitor of specific internal groups. Once you choose this option, Nightfall populates the list of internal groups from the synced IdPs in . You must select the required groups.

    • All Groups, except for: You must choose this option to exclude monitoring of specific internal groups. Once you choose this option, Nightfall populates the list of internal groups from the synced IdPs in . You must select the required groups.

    hashtag
    URL and Subpath

    Endpoint URL and subpath filtering allows administrators and security teams to precisely control which file exfiltration events are reported or blocked by Nightfall. By creating exclusions at the file, file path, or file type (extension) level, teams can reduce noise, prevent false positives, and maintain focus on genuine data risk. This section explains:

    • How URL and subpath filtering works

    • The end‑to‑end user experience

    • Supported exclusion types

    • Practical use‑cases

    This functionality is available within:

    • Exfiltration Prevention → Event Details → Assets tab

    • Integrations → Endpoint → Exclusion List

    It applies to endpoint‑level exfiltration signals such as:

    • Browser uploads

    • File transfers via removable media

    • File sync

    How it works

    1. Exfiltration Event Detected An endpoint event (for example, a Browser Upload) is detected and logged under Exfiltration Prevention. Each event includes:

    • Risk level (Low / Medium / High)

    • Actor (device and user)

    • Asset involved (file name, path, size, medium)

    1. Viewing Asset Details When an event is opened:

    • Navigate to the Assets tab

    • Select the relevant asset (e.g., Customer List.xlsx)

    The Asset Details panel displays:

    • File name

    • Full local file path (e.g., /Users/anantmahajan/Downloads/Customer List.xlsx)

    • Medium (Browser)

    1. Activating File or Path Exclusion From the Asset Details panel:

    • Click “Click to activate file & file path exclusion (macOS only)”

    A modal titled File & File Path Exclusion appears with three options:

    Exclusion Options

    1. Ignore file

    2. Excludes this exact file (specific file name + path)

    3. Ignore path

    4. Excludes all files within the selected directory and its subpaths

    Selecting an option and clicking Continue proceeds to confirmation.

    1. Confirmation Modal

    A confirmation dialog clearly states: "Future activity involving this file will not be reported. Existing events won't be affected."

    Optional setting:

    • Apply rule to all endpoints (if enabled, the exclusion applies globally rather than device‑specific)

    Click Ignore to finalize the exclusion.

    1. Exclusion Is Applied

    Once confirmed:

    • The exclusion takes effect immediately

    • Future matching events are suppressed

    • Past events remain visible for audit and investigation

    The exclusion appears under: Integrations → Endpoint → Exclusion List

    Each entry shows:

    • Excluded item (file, path, or extension)

    • Type (File Name, File Path, or Extension)

    • Time created

    • User who created the exclusion

    URL & Subpath Filtering Behavior

    URL Matching

    When a browser upload occurs, Nightfall evaluates:

    • The destination domain (e.g., drive.google.com)

    • The local file path on the endpoint

    If the local file matches an exclusion rule, the upload event is:

    • Not reported

    • Not blocked (unless another policy applies)

    Subpath Matching

    For Ignore path exclusions:

    • All files under the selected directory are excluded

    • Subdirectories are included automatically

    Example:

    • /Users/johndoe/Downloads/

    Excludes:

    • /Users/johndoe/Downloads/Customer List.xlsx

    • /Users/johndoe/Downloads/Exports/Q4/customers.csv

    Supported Exclusion Types

    Common Use‑Cases

    1. Suppressing Known Safe Files

      1. Scenario: A finance team routinely uploads a standardized customer spreadsheet to Google Drive.

      2. Solution: Ignore file: Customer List.xlsx

    Best Practices

    1. Exclusions apply only to future activity and Existing events are never retroactively modified.

    2. Path exclusions are recursive and include subpaths.

    3. Extension‑based exclusions are global and high‑impact.

    URL and subpath filtering for endpoint exclusions gives security teams fine‑grained control over exfiltration monitoring. By embedding exclusions directly into the investigation workflow, Nightfall enables fast, contextual decisions without compromising visibility into real risk.

    This approach balances strong data security with practical, low‑friction operations.

    App Intelligence

    Identify, classify, and assess risk for SaaS and AI applications used across your environment.

    hashtag
    Table of Contents

    1. Overview


    hashtag
    Overview

    App Intelligence gives your security team a complete, continuously updated view of every SaaS application and AI tool your employees are actually using — not just the ones on your approved list.

    In most organizations, employees use five to fifteen times more applications than IT formally manages. This includes AI assistants like ChatGPT and Claude, personal cloud storage, file-sharing services, and agentic AI tools that act on behalf of users. Until now, this activity has been largely invisible to security teams.

    App Intelligence changes that. Using data movement APIs provided by Apple and Microsoft, Nightfall's lightweight agent detects paste and file upload activity to automatically discover these applications, assign a risk score, categorize them by functional type, and surface early adopters — with none of the latency associated with traditional DLP tools.


    hashtag
    Key Concepts

    hashtag
    App Categories

    Nightfall classifies every detected app into one of twelve categories. Categories reflect the nature of the product and its typical data exposure potential — they form the foundation of how risk is calculated. Your team can use categories to filter, prioritize, and focus on the parts of your app landscape that matter most.

    Category
    Risk Level
    Description
    Examples

    A note on cloud productivity suites: Nightfall classifies by the actual product surface an employee uses, not the parent company brand. For example, Google Workspace Mail and Google Docs are classified as Business SaaS because their primary function is collaboration and editing. Google Drive is classified as Cloud Storage / Sync because its primary function is file storage and bulk sync. The same principle applies to Microsoft 365, AWS, and Salesforce subdomains.

    hashtag
    Risk Scoring

    Every app in App Intelligence displays one of four risk labels: Low, Medium, High, or Critical. These reflect Nightfall's assessment of how much data exposure risk the app represents in your environment.

    Label
    What It Means

    Risk is calculated in two steps. First, every app starts with a baseline risk level inherited from its category — for example, File Sharing apps start at Critical and Core Systems start at Low. Second, Nightfall adjusts the score for the specific app within that category: if an app is consumer-focused, allows anonymous access, or is less governed than its peers, the risk increases. If the app is unusually well-governed for its category — for example, enterprise-only access with mandatory SSO — the risk may decrease.


    hashtag
    Navigating the Interface

    hashtag
    The App Intelligence Page

    Access App Intelligence from the Discovery section of the left-hand navigation menu.

    The App Intelligence list view, showing 5,892 total apps discovered across the organization.

    The page is divided into two main sections:

    App Insights (Top Panel) The insights panel gives you a quick summary of what's happening across your app landscape. It shows:

    • Total Apps discovered, AI Apps in use, and Total Users observed

    • Top AI Apps by Adoption — the GenAI tools growing fastest in your environment over the last 30 days, shown as a percentage of users

    • Top Apps by Data Volume — the apps handling the most data, with user counts and data sizes

    App List (Bottom Panel) The full table of all discovered applications. Each row shows:

    Column
    Description

    hashtag
    Filtering and Search

    Use the filter bar above the app list to narrow results by:

    • Time range (e.g., Last 30 Days)

    • App Name — search by name or keyword

    • Domain — filter to a specific domain

    hashtag
    The App Details View

    Clicking any app in the list opens its detail page.

    The App Details view for Wisprflow (wisprflow.ai), an AI agent platform classified as High risk.

    The detail view includes:

    • Summary stats — total users, when first and last seen

    • App Risk panel — a plain-language explanation of why Nightfall assigned this risk level, covering category, identity boundaries, and data exposure

    • Destination List — a breakdown of every subdomain or endpoint within the app where data was sent, including per-destination user counts, data volume, and activity timestamps. This helps you understand whether a tool is being used for its core purpose or whether data is flowing to admin panels, APIs, or documentation portals.


    hashtag
    Tutorials

    hashtag
    Tutorial 1: Getting Your First Look at App Usage

    Goal: Understand which apps are active in your environment and identify where to focus first.

    Steps:

    1. Navigate to Discovery → App Intelligence in the left sidebar.

    2. Review the App Insights panel at the top of the page. Note:

      • How many Total Apps have been discovered.


    hashtag
    Tutorial 2: Reviewing a High-Risk App's Details

    Goal: Understand why an app received a high risk score and gather the information your team needs to take action.

    Steps:

    1. Filter the App List by Risk = High and sort by Users to surface the most widely adopted high-risk apps first.

    2. Click on an app to open its Detail View.

    3. Read the App Risk explanation on the right side. This gives you Nightfall's reasoning in plain language — for example, whether the tool is an AI agent that can access data on behalf of users, or whether it lacks standard enterprise governance controls.


    hashtag
    Tutorial 3: Investigating a High-Risk App and Its User Activity

    Goal: Understand the risk signals behind a specific app and determine whether action is needed.

    Steps:

    1. Identify an app of interest in the App List — for example, an AI Agents tool or a GenAI service you don't recognize.

    Wisprflow appears in the App List as an AI Agents tool with a High risk rating, 28 users, and 2.2 GB of data sent — with activity as recently as 5 hours ago.

    1. Click the app row to open its Detail View.

    2. In the App Risk panel, read Nightfall's risk explanation. For an AI Agents tool, this will typically explain that the platform is designed to build and deploy autonomous agents that can access and move data across multiple systems — and why this elevates the risk classification above the category baseline.

    3. Check Total Users and compare it to First Seen. If a large number of users adopted the tool quickly, that's a signal of fast organic growth that may have outpaced governance review.


    hashtag
    Use Case Examples

    hashtag
    Use Case 1: Discovering Shadow AI Adoption

    A security team at a mid-size technology company suspects employees are using unauthorized GenAI tools but has no visibility into which ones or how widely.

    They open App Intelligence, filter by Category = GenAI, and sort by Users. Within minutes, they can see that three GenAI tools not on the approved list have been adopted by dozens of employees. They use the details view to assess each tool's risk score and destination activity, then route the highest-risk findings to the IT governance team with the context they need to take action.


    hashtag
    Use Case 2: Identifying a New High-Risk Agentic Tool

    An insider risk analyst receives an alert about unusual data movement patterns. They open App Intelligence and sort by Last Seen to find recently active apps. They spot an AI Agents platform that was first seen a month ago but has seen a spike in data volume in the last 24 hours.

    Clicking into the app detail, they see the risk explanation highlights that the tool is designed to build autonomous agents capable of accessing data across multiple systems — and that several API-level destinations are active. The analyst notes their findings and escalates to the security team for deeper investigation.


    hashtag
    Use Case 3: Prioritizing App Review During Quarterly Governance

    An IT Policy Owner needs to audit which high-risk apps are active in the environment as part of a quarterly governance review. Rather than sifting through all discovered apps manually, they filter the App List to Risk = High or Critical, sort by Users, and work through the results.

    Using the risk scores and destination breakdowns, the owner quickly identifies which apps need immediate attention from the security team and which are low-risk tools that don't require escalation. Within a single session they have a clear picture of their app risk landscape to bring into the governance review.


    hashtag
    Use Case 4: Turning App Findings Into Exfiltration Controls

    A data security engineer reviewing App Intelligence notices a file-sharing site with Critical risk that has been used by multiple employees to send data externally. Rather than just flagging it for review, they want to act immediately.

    From the app's detail page, they click Add to Collection and add the domain to their organization's block list collection — the same list already enforced by Nightfall's exfiltration control policies. The domain is now blocked from receiving corporate data without any separate policy configuration required. For a second app — an approved cloud storage tool that was mistakenly triggering alerts — they add it to the allow list collection instead, suppressing false positives going forward.

    App Intelligence becomes the discovery layer that feeds directly into enforcement, closing the loop between visibility and protection.


    hashtag
    Use Case 5: Understanding Your GenAI Footprint Before a Compliance Review

    A CISO preparing for an upcoming compliance review needs a clear picture of all AI tools in use across the organization, including what data types are being transmitted. They use the Top AI Apps by Adoption insight to see which GenAI tools are most widely used, then filter the app list to Category = GenAI to review risk levels across the full set.

    For any GenAI tool with a High risk rating, they open the detail view to review the risk explanation and destination breakdown. This gives them the documentation they need to demonstrate that the organization has visibility into AI tool usage and the risk signals associated with each one.


    hashtag
    Frequently Asked Questions

    How often is the app data refreshed? App Intelligence data is refreshed hourly. The "Last updated" timestamp in the top right corner of the page shows when the data was last synced.


    How does Nightfall discover which apps employees are using? Nightfall uses data movement APIs provided by Apple and Microsoft to detect paste and file upload activity on enrolled devices — not network traffic or keystrokes. This lightweight approach means App Intelligence can identify which apps employees are sending data to without the performance impact or latency of traditional DLP tools. No additional configuration is required; new apps are detected automatically.


    How exactly is an app's risk score calculated? Nightfall uses a two-step process. First, every app starts with a baseline risk level inherited from its category — for example, File Sharing apps start at Critical and Core Systems start at Low. Second, Nightfall evaluates the specific app within its category: if it's consumer-focused, allows anonymous access, or is less governed than peers, the risk increases. If the app is unusually well-governed for its category — mandatory SSO, enterprise-only access — the risk may decrease. This category-based assessment is then combined with usage signals including behavioral patterns and identity boundary data to produce the final label.

    When reviewing individual events in Forensic Search, scoring goes a step further. If your organization has completed MDM integration, Nightfall can determine whether a user is sending data to a corporate or personal account at a given destination — for example, distinguishing between a managed Google Workspace account and a personal Gmail account at the same domain (mail.google.com). This account context is factored into the event-level risk score in Forensic Search, giving you a more precise signal when investigating specific user activity.


    Can I override the risk level Nightfall assigns? Not in v1. The ability to apply custom risk overrides is planned for a future release.


    Why do some apps show a high Destination Count? Destination Count reflects the number of distinct subdomains or endpoints Nightfall has observed data flowing to within a single app's domain. For many apps, destinations are specific enough to tell you something meaningful about how the app is being used.

    GitHub is a good example: each destination corresponds to a specific repository. A SecOps admin reviewing GitHub's destination list can research individual repos to determine whether employees are pushing data to a corporate repository, a public open-source project, or a personal account — a meaningful distinction when assessing data exposure risk. The same principle applies to other developer tools, cloud storage platforms, and any app where the destination encodes context about the recipient or purpose.


    Will App Intelligence block apps or take enforcement actions? App Intelligence itself is a visibility tool — it does not block apps directly. However, you can act on what you find by using the Add to Collection button in any app's detail view. This lets you add the app's domain to a domain collection, which feeds directly into Nightfall's exfiltration control policies. Adding a domain to a block list collection will prevent data from being sent to that destination; adding it to an allow list collection explicitly permits it and suppresses false positives. Automated enforcement actions beyond this are planned for a future release.


    Does App Intelligence cover desktop apps like Slack or Zoom? Not yet — but coming soon! The current release focuses on web apps and GenAI tools accessed through the browser. Coverage for native desktop applications is on the roadmap for an upcoming release.


    What should I do first if I'm new to App Intelligence? Start with the App Insights panel to understand the shape of your environment — how many apps are active, which AI tools are growing fastest, and where the most data is flowing. Then filter the App List to Risk = High or Critical, sort by Users, and work through the results. This gives you a focused view of the apps that carry the most risk and the widest reach across your organization.


    For additional help, contact Nightfall support or reach out to your Customer Success Manager.

    If both vendor and serial filters are empty, all removable media is in scope
    Filters
    User Session Check evaluates source and destination sessions
  • Policy enforcement occurs based on configuration

  • You can add more domains to this collection as needed
    Directory sync enabled (Okta, Google Directory, or Entra ID)
  • Corporate Domains collection configured

  • Browser extension deployed (via MDM or manual install)

  • Example Configurations
    1. Monitor Corporate Sources Only - Use case: Detect data originating from corporate accounts only.

      1. Source: Domain in equals Corporate Domains

      2. User session check: Enabled

    2. Exclude Corporate Sources - Use case: Focus on external or unmanaged sources.

      1. Source: Domain not in equals Corporate Domains

    Supported operators:
    1. Domain in, Domain not in, Any domain

    User session check: Enabled
  • Outcome: Blocks uploads when destination account is personal

  • Allow Corporate → Corporate, Block Corporate → Personal

    1. Source: Domain in → Corporate Domains

    2. Destination: Domain in → Supported Domains

    3. User session check: Enabled

    4. Result:

      1. Corporate → corporate transfers allowed

      2. Corporate → personal transfers blocked

  • Detect Personal Account Usage on Approved Apps

    1. Action: Browser uploads to → Domain in → Google Workspace

    2. User session check: Enabled

    3. Use case: Visibility into personal account usage on approved SaaS.

  • Broad Monitoring (Any → Personal)

    1. Source: Any domain

    2. Destination: Domain in → Supported Domains

    3. User session check: Enabled

    4. Use case: Identify any data entering personal accounts.

  • Important behavioral details and limitations

  • Destination (e.g., drive.google.com, chat.deepseek.com)
    Size
  • Ignore all files with .xlsx extension

  • Excludes all Excel files across the endpoint

  • Scope (specific device or all endpoints)

  • Outcome:
    1. Prevents repeated high‑risk alerts for a known workflow

    2. Maintains visibility into other files

  • Ignoring Automated Export Directories

    1. Scenario: An application exports reports into a fixed local directory before upload.

    2. Solution: Ignore path: /Users/*/Downloads/Exports/

    3. Outcome:

      1. Eliminates alert noise from automated processes

      2. Still monitors uploads from other locations

  • Reducing Alert Fatigue from Common File Types

    1. Scenario: Large volumes of Excel files are shared internally and trigger frequent alerts.

    2. Solution: Ignore all files with .xlsx extension

    3. Outcome:

      1. Significant noise reduction

      2. Should be used carefully due to broad scope

  • Incident‑Driven Exception Handling

    1. Scenario: An investigation confirms a flagged upload was legitimate.

    2. Solution: Create a targeted file or path exclusion directly from the event

    3. Outcome:

      1. Fast remediation

      2. No policy rewrites required

  • Use Apply to all endpoints sparingly.
  • Periodically review the Exclusion List for stale rules. Document the reason for exclusions internally when possible.

  • File

    Single file only

    Known safe document repeatedly triggering alerts

    Path

    Directory + subdirectories

    Trusted export folders or generated reports

    Extension

    All files of a type

    Suppress noisy file types like .log or .xlsx

    Nightfall detection rulesarrow-up-right
    Trigger
    Detectorarrow-up-right
    Directory Syncarrow-up-right
    domain collections
    domain collections
    domain collections
    Directory Syncarrow-up-right
    Directory Syncarrow-up-right
    Directory Syncarrow-up-right
    Directory Syncarrow-up-right
    Operating Systems
    Devices
    Content Scanning
    Content Scanning
    Filters
    Internal Users
    Internal Groups
    file-sharing sites
  • unfamiliar SaaS domains

  • Destination – where the data was sent
  • Device – which device performed the action

  • Personal accounts are outside corporate control and represent higher exfiltration risk.

    Tutorial 3: Investigating a High-Risk App and Its User Activity

    Public Web

    Low

    General consumer or informational websites not primarily designed for file transfer.

    YouTube, Wikipedia, Medium, Amazon

    Social / Messaging

    Medium

    External messaging or social platforms where users can send or post corporate data.

    WhatsApp Web, Telegram, Discord, LinkedIn, X/Twitter

    Cloud Providers / Infra

    Medium

    Cloud consoles and infrastructure administration surfaces.

    AWS Console, GCP Console, Azure Portal, Cloudflare

    GenAI

    High

    LLMs, AI assistants, and AI-powered creation tools that may ingest internal data.

    ChatGPT, Claude.ai, Gemini, Perplexity, DeepSeek

    Developer Tools

    High

    Platforms hosting source code, configuration, logs, or automation pipelines.

    GitHub, GitLab, Replit, Databricks, Netlify

    Unknown

    High

    Domains that cannot be reliably classified (e.g., raw IPs or unrecognized destinations).

    Unclassified IPs, localhost, unresolved domains

    AI Agents

    Critical

    Autonomous or semi-autonomous systems that act on behalf of users to access and move data.

    Wisprflow, Glean, n8n, Zapier Desktop Runner

    Cloud Storage / Sync

    High

    Cloud-based file storage and synchronization platforms with high exfiltration risk due to bulk file movement and multi-device sync.

    Google Drive, Dropbox, Box, iCloud, OneDrive

    File Sharing

    Critical

    Public or anonymous file-sharing services with minimal identity boundaries.

    WeTransfer, file.io, Snapdrop, Pastebin

    Data Volume

    Total data transmitted to this destination

    First Seen

    When Nightfall first detected activity to this app

    Last Seen

    Most recent observed activity

    Category — show only GenAI, Cloud Storage, etc.
  • Risk — focus on High or Critical apps

  • Add to Collection — a button that lets you add the app's domain directly to a domain collection. Domain collections are the allow lists and block lists that power Nightfall's exfiltration control policies. Adding an app here is how you translate App Intelligence findings into active data protection — for example, blocking a risky file-sharing site or explicitly allowing an approved storage tool.

    Which AI Apps have the greatest adoption (Top AI Apps by Adoption chart).

  • Which apps have the most users over the last 30 days (Top Apps by User Count, 30d).

  • In the App List, sort by Risk to bring the highest-risk apps to the top. Look for any apps labeled Critical or High that you don't recognize.

    Example showing a small tenant environment. Deepseek is flagged as Critical risk — a GenAI tool with elevated data exposure signals.

  • Sort by Last Seen to find apps with very recent activity, then cross-reference with First Seen to spot newly adopted tools your team may not be aware of.

  • Use the Category filter and select GenAI and AI Agents to see all AI tools in use. This is a fast way to understand your organization's AI footprint.

  • Review the Destination List to understand how the app is being used. Are employees accessing only the main product domain, or is data also flowing to API endpoints or admin subdomains? Higher destination counts can indicate more complex, potentially automated workflows.

  • Note the Total Users and First Seen date. If adoption is recent and growing, that context is useful when escalating to your IT or security governance team.

  • If your team decides to act on what you've found, use the Add to Collection button to add the app's domain to a domain collection. Choose a block list collection to prevent data from flowing to the app, or an allow list collection to explicitly permit it within your exfiltration control policies.

  • Review the Destination List to see exactly where data is flowing within the app's ecosystem. For example, if you see traffic to both the main product domain and an API subdomain, it suggests programmatic or automated use — not just manual browser sessions.

  • Cross-reference the Data Volume against the number of users. Disproportionately high data volume relative to user count can indicate automated workflows, bulk uploads, or exfiltration-style behavior.

  • Click Show Events on a destination row to see the individual users and corresponding events associated with that site. This is one of the most powerful features in App Intelligence — it lets you move from aggregate risk signals to the specific people and actions driving them.

  • Share your findings with your IT or security governance team, including the risk score, user count, data volume, any API-level destinations observed, and the specific user activity surfaced via Show Events.

  • Core System

    Low

    Business systems of record with strict identity controls and low exfiltration risk.

    Workday, NetSuite, SAP, Salesforce CRM

    Business SaaS

    Low

    Enterprise productivity and collaboration tools.

    Slack, Notion, Figma, Canva, Asana, Loom

    Internal Apps

    Low

    Internal or private applications, staging/QA environments, and SSO-only portals.

    🟢 Low

    Minimal concern; typically well-governed, established tools with strong identity boundaries.

    🟡 Medium

    Worth monitoring; may involve less-governed surfaces or moderate data exposure potential.

    🔴 High

    Requires attention; elevated data risk or boundary concerns detected.

    🚨 Critical

    Immediate review recommended; significant risk signals across multiple dimensions.

    App Name

    The detected application, grouped under its canonical domain

    Domain

    The primary domain associated with the app

    Destination Count

    Number of distinct subdomains or destinations observed

    Category

    App type classification

    Risk

    Nightfall's computed risk level

    Users

    Number of users or unique devices observed accessing this app

    Key Concepts
    Navigating the App Intelligence Interface
    Tutorials
    Tutorial 1: Getting Your First Look at App Usage
    Tutorial 2: Reviewing a High-Risk App's Details
    Use Case Examples
    Frequently Asked Questions

    Internal dashboards, staging portals, *.internal domains