Download our FREE whitepaper on data loss prevention best practices. Download Now

What Is User Remediation and How to Use It?

One of the most important features in Endpoint Protector 5.4.0.0 is user remediation. Learn more about how this feature works and how it can help you better protect data.

Data Loss Prevention (DLP) solutions need flexibility; otherwise, they can slow down efficiency. Actually, the no 1 myth that has persistently haunted DLP tools is their negative impact on productivity. However, not all DLP solutions are the same. When choosing one, it’s vital to pick the one that allows you to fine-tune policies. In this way, it will be easier to address your company’s particular structure and needs.

Endpoint Protector, for example, was built with flexibility in mind from the very beginning. Our cross-platform DLP solution allows multiple levels of authorization for users and departments as well as computers and devices. With our latest release, we’ve aimed to further enhance the granularity and flexibility of our enterprise-grade solution.

That’s why we’ve introduced the self user remediation feature*, which empowers users to safely override the DLP policy in order to increase productivity.

Here’s a use case:

Helen is from the accounts payable department, and she needs to print the onboarding pass for her business trip. The pass is blocked due to her passport number, and it’s Friday late evening. She will submit a user remediation request with the business trip justification, and she will manage to print the boarding pass on her own.

Why is User Remediation important in a DLP solution?

Self user remediation is especially beneficial for our large customers because it:

  • Reduces administrative overhead;
  • It gives end-users more options to justify data transfers;
  • Increases end-user accountability awareness of sensitive data transfers.

Reduces administrative overhead

User remediation helps to reduce the number of false positives. In this way, it also reduces the time your admin team spends responding to tickets and requests to bypass a policy restriction. All events related to this feature will be logged, even if the user cancels the action, and admins can see it in the Reports and Analysis section.

It gives end-users more options to justify data transfers

End-users can justify their reason for overriding a DLP policy easily, through a pop-up window. Reasons can vary; by default, the justification list includes having management approval to complete this action, and the action does not contain confidential information. End-users can provide further information that justifies their activity, and Admins can add additional custom justification reasons, such as false positives.

Increases end-user accountability and awareness of sensitive data transfers

The user remediation feature improves the end-user experience, and it also helps to educate users in the long run on your company’s security policies.

How to Enable User Remediation in Endpoint Protector DLP?

The User Remediation feature is currently available for the Content Aware Protection module. You can enable this feature from the Content Aware Protection Policies by selecting the “Block and Remediate” option.

Now, you can try User Remediation out for free by activating the trial mode. In this way, you are allowed to use this feature for 30 days.

What can you customize with User Remediation?

  • Personalize the pop-up window by displaying your logo.
  • Set the time interval (from 1 minute up to 1 hour) in which the user can remediate a previously blocked action by the Content Aware Protection policies.
  • Display a custom URL with a label in the pop-up window.

For further information about this feature, feel free to get in touch with us. If you’re an existing customer, you can contact your Account Manager directly.

*Available on Endpoint Protector’s Premium Plans.

explainer-c_learning

Download our free ebook on
Data Loss Prevention Best Practices

Helping IT Managers, IT Administrators and data security staff understand the concept and purpose of DLP and how to easily implement it.

In this article:

    Request Demo
    check mark

    Your request for Endpoint Protector was sent!
    One of our representatives will contact you shortly to schedule a demo.

    * Your privacy is important to us. Check out our Privacy Policy for more information.