Files

The Files Analytics table displays detailed information about all files within your organization. This table allows you to easily track and inspect potentially harmful files and their associated users. In addition to monitoring, you can also implement effective remediation measures against risky files, preventing potential security damage.

The Files Forensics table displays the following information for each file:

  • File Name: The name of the file

  • Size: The size of the file

  • Last Edited: The date and time that the file was most recently edited

  • Owner: The owner of the file as defined in its properties

  • Folder: The folder in the drive in which the file is stored

  • DLP: Lists the number of data violations in the file. Data violations are Data Loss Prevention (DLP) rule matches.

  • Sharing: The file sharing level. In the case of an External file, lists the external domain name; in the case of an Externally owned file, lists the external domain name, if known. See File Sharing.

  • Cloud Service: The SaaS Application with which the alert is associated (for example, Google Workspace, Microsoft 365)

Viewing File Information

You can view additional information about each file by expanding the table entry.

The expanded area displays the following elements:

  • Sharing Details: Displays information about all users with permissions on this file. Indicates whether each user is an Owner, a Reader (has read permissions), or a Writer (has read-write permissions).

  • Recent Activity: Lists recent events relating to the file (for example, Download file, Edit file).

  • Data Security: Displays detailed information about sensitive data in the file detected by the system, defined as DLP matches. See Viewing Data Security Information.

  • File Manager (): The remediation options for the file. See the following section.

  • Status bar: Located at the bottom of the expanded area, the status bar displays detailed information about the file (time stamps for file creation and modification, file ID, and the folder containing the file).

You can view files and manually perform remediation on them. For more information on file remediation and quarantine space, see File Remediation.

Viewing Data Security Information

Proofpoint CASB searches for data violations: sensitive data found in files based on rules defined in the Data Loss Prevention (DLP) page . The system searches for Detectors based on selected Dictionary terms and Smart IDs.

The DLP column in the Files Forensics table lists the number of times Detector values (DLP matches) occur in a file.

You can view details of the DLP matches in a file in the Data Security area of the expanded area in the Files Forensics table.

  1. In the Files Forensics table, click the table entry of the selected file.

    The Data Security area is located on the right side of the expanded area. Detectors found in the file are listed, along with the number of DLP matches in the file for the specified Detector. The total number of DLP matches in the Data Security area corresponds to the number of matches listed in the DLP column in the Files Forensics table.

  2. To view additional information, click a Detector name.

    A window opens displaying a snippet from the file, highlighting one of the matched DLPs. The number of snippets available for viewing corresponds to the number of DLP matches for the specified Detector. You can scroll through the snippets to view each highlighted DLP match.

  3. To close the window, click .

File Sharing

One of the key attributes of a file from a security perspective is sharing: who has ownership and read/write permissions for a file. The sharing attribute of a file, as displayed in the Files Forensics table, provides clear information about file accessibility.

Sharing levels are defined as follows:

  • Private: The file is not shared with anyone. Only the owner has read/write permissions.

  • Internal: The file is shared with one or more users within the organization.

  • All [name of organization]: The file is shared with all users in the organization.

  • External: The file is shared with one or more users outside of the organization.

  • Externally Owned: The file is owned by a user outside of the organization and shared with one or more users within the organization.

  • Public: The file can be accessed by anyone.

  • Unknown: Proofpoint CASB cannot evaluate the sharing level or determine with whom the file is being shared. (This is unusual; it occurs, for example, in Microsoft 365 if a file is owned by an application and so cannot be classified as external or internal.)

Malware Detection

Files uploaded and modified in the cloud get their hashes looked up against Proofpoint’s File Reputation System. This is a repository which includes all known malicious hashes from the Email and Cloud channels. If the hash is unknown and the file was uploaded by either an external user, or a user that had recent high risk activity, the file is submitted to Proofpoint’s sandbox for content analysis (static/dynamic).

The file hash is visible in file events: in the Analytics app->Exploration page, filter by Hash values attribute.

A link to TAP provided in the Analytics app->Exploration page allows you to view the file’s threat forensic details. From there, you can filter by Links Info Href attribute or click on the “Threat” insight (with bug icon) displayed in the activities Summary tab.

In addition, when anonymous links are created for files in the cloud, we submit those links to Proofpoint URL defense to quickly recognize malicious links (in which case the file shared is marked as malicious).

Important Information

  • Maximum file size:30MB

  • Supported Platforms

    O365 (OneDrive, SharePoint, Teams Files), Gsuite, Box

  • Supported File Extensions

    ace, arj, bat, contact, csv, dll, doc, docm, docx, dot, dotm, dotx, exe, hta, htm, html, img, iqy, iso, jar, jnlp, js, mam, mht, msi, odp, ods, odt, php, pdf, pot, potm, potx, ppa, ppam, pps, ppsm, ppsx, ppt, pptm, ps1, pptx, pub, py, reg, rtf, sh, slk, swf, vcard, vcf, vcs, vhdx, vhd, wmv, xht, xla, xlam, xlm, xls, xlsb, xlsm, xlsx, xlt, xltm, xltx, xps, xxe, zip