User guide
Reconnex Corporation
4
Release 7.0.0.4
Use Cases
The standard policies shipped with iGuard contain rules that automatically capture many of the
incidents generated by direct searches, but you can use one of our sample use cases to deal with
some common scenarios quickly.
Find encrypted traffic
Insiders attempting to conceal illegal activity or steal your intellectual property routinely use encryption. This
use case will help you identify the sources and destinations of encrypted traffic on your network.
Find covert email
Users who deliberately bypass your corporate mail server may be involved in activities they don't want you to
know about. This use case can help you identify unknown or unsecure email services on your network that
you may not have been aware of because non-standard ports were used.
Find confidential documents
Whether accidental or unintentional, confidential documents are often found exposed on corporate
networks. This use case helps you identify how confidential documents are being used and by whom.
Find FTP traffic containing source code
Employees who are leaving the company sometimes feel they have a right to the code they have created.
This use case will help you identify who is sending what source code out of the company using FTP.
Get statistics on web sites visited
Even though users are routinely allowed to use the Internet to complete their job duties, knowing their
activities may help you to adjust corporate security posture or policies. This use case will show you who is
visiting what domains on the Internet.
Identify disgruntled employees
Unhappy insiders can do a lot of damage to your business operations if they are not found and stopped. This
use case will identify users who have participated in email or instant messaging conversations using words
that could indicate discontent.
Investigate a user's online activity
If you suspect unethical or illegal activity, you must take action to protect company assets. This use case will
allow you to examine that activity.
Find data leaked in the past
This process can keep you have having to wade through reams of data to support legal action by allowing you
to examine what content has left the organization.
Find traffic to gambling or adult-oriented web sites
Easy access to the Internet may be too tempting for those who seek distraction from their job duties. This use
will help you identify who may be using corporate network assets for gambling or pornography.
Find transmission of financial information
Even the most dedicated and hardworking employees may not realize the implications of failing to protect
such documents. This use case will help you to see who is sharing your financial information, and with whom.