What file types are supported by DLP engine?

What is Data Loss Prevention (DLP)?

The purpose of Data Loss Prevention (DLP) is to detect potential data breaches or the theft of data by detecting and blocking sensitive data. The data can be at rest (on a device) or in motion (a file being sent somewhere). Usually sensitive data are data items like social security numbers or credit card numbers, but also might be company confidential or sensitive documents.

What is the strength of OPSWAT's DLP Solution?

Where OPSWAT shines in its ability to handle a huge number of file types. DLP is also a great add-on technology if you are already using OPSWAT's MetaDefender solutions. If you are already doing multi-scanning or vulnerability assessment you can easily add data loss prevention to your pre-existing MetaDefender deployments.

Meta Data Check (Only):

For the following file types, OPSWAT only checks the metadata in the file. Most of these file types in this category are media or image files, where the metadata is embedded in the file property, and might be for example the time when the image was taken, the model of the camera used to create the image, the location where the photo was taken, etc.. One example of this type of metadata is EXIF data. Sensitive information cannot be detected if it is part of the image, for example, if a photograph of a whiteboard was taken that has writing on it that was sensitive.

  • Adobe Photoshop images (*.psd)

  • ASF media files (*.asf)

  • JPEG (*.jpg)

  • MP3 (*.mp3)

  • TIFF (*.tif)

  • WMA media files (*.wma)

  • WMV video files (*.wmv)

File Conversion and Parse:

With these types of files, OPSWAT can detect any type of confidential information in the text portion of the file to include metadata areas of the file. Conceptually, think of the file as being converted into a text file and all of the text in the file being parsed and searched for sensitive data items. So for example, all the text elements of an Excel file would be converted into text and then the text would be searched.

  • Ansi Text (*.txt)

  • ASCII Text

  • CSV (Comma-separated values) (*.csv)

  • EML (emails saved by Outlook Express) (*.eml)

  • Eudora MBX message files (*.mbx)

  • HTML (*.htm, *.html)

  • iCalendar (*.ics)

  • MSG (emails saved by Outlook), including attachments (*.msg)

  • Microsoft Access 95, 97, 2000, 2003, 2007, 2010, 2013, and 2016 MDB (*.mdb, *.accdb)

  • Microsoft Excel for Mac 2.2, 3, 4, 5, 98, 2001, X, 2004, 2008, 2011

  • Microsoft Excel for Windows 2, 3, 4, 5

  • Microsoft Excel 95, 97, 2000, XP, 2003, 2007, 2010, 2013, 2016 (*.xls)

  • Microsoft Excel Office Open XML 2007, 2010, 2013, and 2016 (*.xlsx)

  • Microsoft PowerPoint 3, 4, 95, 97, 98, 2000, 2001, 2002, 2003, 2004, 2007, 2008, 2010, 2011, 2013, 2016 (*.ppt)

  • Microsoft PowerPoint Office Open XML 2007, 2010, 2013, and 2016 (*.pptx)

  • Microsoft Rich Text Format (*.rtf)

  • Microsoft Word for DOS 1, 2, 3, 4, 5, 6 (*.doc)

  • Microsoft Word for Mac 1, 3, 4, 5, 6, 98, 2001, X, 2004, 2008, 2011

  • Microsoft Word for Windows 1, 2, 6 (*.doc)

  • Microsoft Word 95, 97, 98, 2000, 2002, 2003, 2007, 2010, 2013, 2016 (*.doc)

  • Microsoft Word 2003 XML (*.xml)

  • Microsoft Word Office Open XML 2007, 2010, 2013, 2016 (*.docx)

  • OpenOffice/LibreOffice versions 1, 2, 3, 4, and 5 documents, spreadsheets, and presentations (*.sxc, *.sxd, *.sxi, *.sxw, *.sxg, *.stc, *.sti, *.stw, *.stm, *.odt, *.ott, *.odg, *.otg, *.odp, *.otp, *.ods, *.ots, *.odf) (includes OASIS Open Document Format for Office Applications)

  • PDF files (*.pdf), note: Encrypted PDF files cannot be indexed, unless the PDF file can be opened without a password and the PDF file permissions allow for text extraction.

  • PDF Portfolio files (*.pdf), including embedded non-PDF documents.

  • Unicode (UCS16, Mac or Windows byte order, or UTF-8)

  • XML (*.xml)

This article applies to MetaDefender Core v4
This article was last updated on 2019-06-28
AG