File Storage Protection - Office 365 SharePoint
Overview
Office 365 SharePoint empowers teamwork with dynamic and productive team sites for every project team, department, and division. Avanan adds security, privacy, and compliance to Office 365 SharePoint by scanning files shared in SharePoint for malicious content and data loss prevention (DLP) and generates actionable events on malicious content.
How it works
Avanan adds a layer of security that provides these security features for Office 365 SharePoint:
- Data Leak Prevention (DLP): Protecting uploaded files containing sensitive data
- Anti-Malware: Scanning of files for malicious content
- Remediation: Quarantine malicious files and send files containing sensitive data to the vault
Required Permissions
Avanan requires these permissions to protect Office 365 SharePoint.
Note- All these permissions are required to access your data in the Avanan portal tenant.
Permissions required from Microsoft | Functions performed by Avanan |
---|---|
Manage all access reviews | Allows the app to read, update, delete and perform actions on access reviews, reviewers, decisions, and settings in the organization without a signed-in user. |
Read and write all applications | Allows the app to create, read, update and delete applications and service principals without a signed-in user. Does not allow management of consent grants. |
Read and write contacts in all mail boxes | Allows the app to create, read, update, and delete all contacts in all mailboxes without a signed-in user. |
Read and write directory data | Allows the app to read and write data in your organization's directory, such as users, and groups, without a signed-in user. Does not allow user or group deletion. |
Read and write domains | Allows the app to read and write all domain properties without a signed-in user. Also allows the app to add, verify and remove domains. |
Read and write files in all site connections | Allows the app to read, create, update and delete all files in all site collections without a signed-in user. |
Read and write all groups | Allows the app to create groups, read all group properties and memberships, update group properties and memberships, and delete groups. Also allows the app to read and write group calendar and conversations. All of these operations can be performed by the app without a signed-in user. |
Read and write all user mailbox settings | Allows the app to create, read, update, and delete user's mailbox settings without a signed-in user. Does not include permission to send mail. |
Read and write mail in all mailboxes | Allows the app to create, read, update, and delete mail in all mailboxes without a signed-in user. Does not include permission to send mail. |
Send mail as any user | Allows the app to send mail as any user without a signed-in user. |
Read all usage reports | Allows an app to read all service usage reports without a signed-in user. Services that provide usage reports include Office 365 and Azure Active Directory. |
Read and update your organization’s security events | Allows the app to read your organization’s security events without a signed-in user. Also allows the app to update editable properties in security events. |
Read and write items in all site collections | Allows the app to create, read, update, and delete documents and list items in all site collections without a signed-in user. |
Read and write all users' full profiles | Allows the app to read and update user profiles without a signed-in user. |
Sign in and read user profile | Allows users to sign in to the app, and allows the app to read the profile of signed-in users. It also allows the app to read basic company information of signed-in users. |
Activating Office 365 SharePoint
Important - To activate Office 365 SharePoint, make sure you have these:
- You are a user with Microsoft Global Administrator permissions, or you have the credentials of such a user.
- You have the minimum supported SaaS license. See Minimum Requirements.
To activate Office 365 SharePoint:
- Navigate to Security Settings > SaaS Applications and click Start for Office 365 SharePoint.
- Click Start in the pop-up screen that appears.
- In the Microsoft Sign in window that opens, sign in with your Microsoft administrator credentials.
Note - Microsoft performs the authentication, and Check Point does not provide these credentials. - In the authorization screen from Microsoft, click Accept to grant necessary permissions to Avanan.
For the list of permissions requested from Microsoft, see SharePoint required permissions.
The Office 365 SharePoint SaaS is enabled, and monitoring begins immediately.
Deactivating Office 365 SharePoint
To deactivate Office 365 SharePoint:
- Navigate to Security Settings > SaaS Applications.
- Click Stop for Office 365 SharePoint.
Office 365 SharePoint Security Settings
Customizing Quarantine and Vault
Administrators can customize the quarantine and vault folders (folder names, quarantine/vault messages, etc.)
Quarantine folder
The quarantine folder is used to quarantine malware-infected files from SharePoint. The infected files of all the users will be quarantined to a single predefined quarantine folder.
Notes:
- Quarantine folder is created with the configured name on the root directory of the root site of the organization. End-users will not have access to this folder.
- Only Microsoft stores these quarantined files.
Vault folder
A vault folder is used to remediate DLP detections related to SharePoint files. It is a non-shared folder that is created for every SharePoint user.
If a file contains sensitive information that does not comply with your organization's data-sharing policies, it is removed and placed in the vault folder.
Note - Vault folder is created with the configured folder name in the root directory of each user’s drive. The user can access the file from the vault but cannot share it with others.
To customize the quarantine and vault folders:
- Navigate to Security Settings > SaaS Applications.
- Click Configure for Office 365 SharePoint.
- Under Quarantine, enter the required quarantine folder name.
- Under Vault, enter the required vault name.
- Click Save.
Configuring Office 365 SharePoint Policy
Malware Policy
By default, the Office 365 SharePoint malware policy scans the uploaded files for malicious content.
Supported Actions
Office 365 SharePoint malware policy supports these actions:
- Quarantine of malware-infected files.
- Alert owner: Sends an email notification to the user who uploaded a file that contains malicious content.
- Alert admin(s): Sends an email notification to the admin(s) about the malicious files.
Configuring Malware Policy
To configure Malware policy:
- Click Policy on the left panel of the Avanan portal.
- Click Add a New Policy Rule.
- From the Choose SaaS drop-down list, select Office 365 SharePoint.
- From the Choose Security drop-down list, select Malware and click Next.
- Select the desired protection mode (Detect and Remediate or Detect).If required, you can change the Rule Name.
- Choose the Scope for the policy.
- To apply the policy to specific users or groups, select the users and groups and click Add to Selected.
- To apply the policy to all users and groups in your organization, enable All Users and Groups checkbox.
- To exclude specific users or groups from the policy, select the users/groups and click Add to Excluded.
- Under Blades, select the threat detection blades required for the policy.
Note - To select all the blades available for malware detection, enable All running threat detection blades checkbox. - Under Suspected malware workflow (Attachment) in Workflows, select the workflow required for the policy.
- Quarantine. User is not alerted (admin can restore)
- Do nothing
Note - The Workflows are available only when Detect and Remediate protection mode is enabled.
-
To quarantine malware-infected files, enable the Quarantine drive files checkbox.
Note - This option will be available only in Detect and Remediate protection mode. - Configure Alerts for the policy.
- To send email alerts to the file owner of malware, enable the Alert file owner of malware checkbox.
- To send email alerts to admins, enable the Alert admin(s) checkbox.
Notes:
- Even when the alerts are enabled here in the policy, the administrator only receives email alerts for security events when Receive Alerts role is enabled in the Specific Service Role.
- To customize the email alert templates, click on the gear icon to the right of the alert.
- Click Save and Apply.
DLP Policy
By default, the DLP policy scans the uploaded files to SharePoint for potentially leaked information, such as credit card number and Social Security Number (SSN).
Supported Actions
Office 365 SharePoint DLP policy supports these actions:
- Send files with sensitive data to the vault.
- Alert owner: Sends an email notification to the user who uploaded a file that contains sensitive information.
- Alert admin(s): Sends an email notification to the admin(s) about the files that contain sensitive information.
Configuring DLP Policy
To configure DLP policy:
- Click Policy on the left panel of the Avanan portal.
- Click Add a New Policy Rule.
- From the Choose SaaS drop-down list, select Office 365 SharePoint.
- From the Choose Security drop-down list, select DLP and click Next.
- Select the desired protection mode (Detect and Remediate or Detect).
If required, you can change the Rule Name. - Choose Scope for the policy.
- To apply the policy to specific users or groups, select the users and groups and click Add to Selected.
- To apply the policy to all users and groups in your organization, enable All Users and Groups checkbox.
- To exclude specific users or groups from the policy, select the users/groups and click Add to Excluded.
- Under DLP Criteria, select the DLP categories required for the policy.
For more details about the DLP rules and categories, see DLP Built-in Rules and Categories. - Select the sensitivity level required for the policy.
- Very high (hit count > 0)
- High (hit count > 2)
- Medium (hit count > 5)
- Low (hit count > 10)
- Very Low (hit count > 20)
- To exclude DLP policy for the messages and files shared only with the internal users, enable the Skip Internal items checkbox.
- Configure Actions for the policy.
- To send a detected file with sensitive data to its owner’s vault, enable the Send files with sensitive data to vault checkbox.
Note - This option will be available only in Detect and Remediate protection mode. - To send email alerts to admins about DLP, enable the Alert admin(s) checkbox.
- To send email alerts to the file owner about DLP, enable the Alert file owner(s) checkbox.
- To quarantine drive files, enable the Quarantine drive files checkbox.
Notes:
- For a policy, you can only enable Send file with sensitive data to vault or Quarantine drive files.
- Even when the alerts are enabled here in the policy, the administrator only receives email alerts for security events when Receive Alerts role is enabled in the Specific Service Role.
- To customize the email alert templates, click on the gear icon to the right of the alert.
- To send a detected file with sensitive data to its owner’s vault, enable the Send files with sensitive data to vault checkbox.
- Click Save and Apply.
Viewing Office 365 SharePoint Security Events
Avanan records the SharePoint detections as security events. The event type depends on the type of policy that created the event. You can handle the security events in different ways, whether they are detected/prevented automatically or discovered by the administrators after not being prevented.
The Events screen shows a detailed view of all the security events.
Note - For files marked as malware by Microsoft, scan results are unavailable, and access to these files is prevented by Microsoft.