InDefend DLP Agent Prerequisites

InDefend DLP Agent Prerequisites

Minimum Configuration:

  • CPU: Intel Core i3/i5 (6th gen or higher) or Core i7/i9 (6th gen or higher for laptops)
  • RAM: 8 GB or more
  • Hard Disk: SSD with 10 GB free space
  • OS: Windows 7 SP2, 8.1, 10, 11 (64-bit) Build version 22H2 or above
  • CPU: Intel Core i3/i5 (8th gen or higher) or Core i7/i9
  • RAM: 8 GB DDR4 or higher
  • Hard Disk: SSD with 10 GB free space
  • OS: Windows 7 SP2, 8.1, 10 (64-bit), 11 (64-bit) Build version 22H2 or above

Other Requirements:

  • Administrative access needed.
  • Antivirus exceptions as per Annexure I.
  • Recommended to Block QUIC Protocol as per Annexure IV

Linux DLP Agent

Minimum Configuration:

  • CPU: Intel Core i3/i5 (6th gen or higher) or Core i7/i9
  • RAM: 8 GB DDR3 or higher
  • Hard Disk: SSD with 10 GB free space
  • OS: Ubuntu 18.04, 20.04, 22.04 LTS; Boss 8.0
  • CPU: Intel Core i3/i5 (8th gen or higher) or Core i7/i9
  • RAM: 8 GB DDR4 or higher
  • Hard Disk: SSD with 10 GB free space
  • OS: Ubuntu 18.04, 20.04, 22.04 LTS; Boss 8.0

Other Requirements:

  • IPv6 support, ROOT privileges, Internet connectivity.
  • Antivirus exceptions as per Annexure II.

Mac DLP Agent

Minimum Configuration:

  • CPU: Intel Core i5 (6th gen or higher) or Apple M1/M2
  • RAM: 8 GB or more
  • Hard Disk: SSD with 10 GB free space
  • OS: macOS Big Sur, Monterey, Ventura
  • CPU: Intel Core i3/i5 (8th gen or higher) or Apple M1/M2
  • RAM: 8 GB DDR4 or higher
  • Hard Disk: SSD with 10 GB free space
  • OS: macOS Big Sur (11.x), Monterey (12.x), Ventura (13.x)

Other Requirements:

  • IPv6 support, ROOT privileges, Internet connectivity.
  • Antivirus exceptions as per Annexure III.

Server DLP Agent (SAM)

Windows SAM Agent:

  • Minimum Configuration: Intel Core i5/Xeon, 8 GB RAM, SSD with 25 GB space
  • Recommended Configuration: Intel Core i5/Xeon (3 GHz), 16 GB RAM, SSD with 25 GB space
  • OS: Windows Server 2012 R2, 2016, 2019
  • Other: Administrative access, Antivirus exceptions as per Annexure I.

Linux SAM Agent:

  • Minimum Configuration: Intel Xeon, 8 GB RAM, SSD with 25 GB space
  • Recommended Configuration: Intel Xeon (3 GHz), 16 GB RAM, SSD with 25 GB space
  • OS: Ubuntu 18.04, 20.04; RHEL 7.x, 8.x
  • Other: IPv6 support, ROOT privileges, Internet connectivity, Antivirus exceptions as per Annexure II.

 ANNEXURE – I

Antivirus Exceptions for Windows Agent

Antivirus Exceptions to be added for Windows OS

Folders to be Excluded:

  1. C:\Program Files\lpagntsys\service (exclude subfolders)
  2. C:\Program Files\lpagntsys\sec (exclude subfolders)
  3. C:\Program Files\lpagntsys\enc (exclude subfolders)
  4. C:\Program Files\lpagntsys\svchk
  5. C:\Program Files\lpagntsys\uninstall
  6. C:\Program Files\lpagntsys\update
  7. C:\Program Files\lpagntsys\utility\lib

Executable Files to be Excluded:

  1. C:\Program Files\lpagntsys\service\adxregistrator.exe
  2. C:\Program Files\lpagntsys\service\insutil.exe
  3. C:\Program Files\lpagntsys\service\lpBInt.exe
  4. C:\Program Files\lpagntsys\service\lpCP.exe
  5. C:\Program Files\lpagntsys\service\lpdpin.exe
  6. C:\Program Files\lpagntsys\service\lpInt.exe
  7. C:\Program Files\lpagntsys\service\lpSvc.exe
  8. C:\Program Files\lpagntsys\service\lpunins000.exe
  9. C:\Program Files\lpagntsys\enc\inDEnc.exe
  10. C:\Program Files\lpagntsys\enc\indenc.ind.exe
  11. C:\Program Files\lpagntsys\svchk\lpSC.exe
  12. C:\Program Files\lpagntsys\uninstall\unins000.exe
  13. C:\Program Files\lpagntsys\update\lpUpdt.exe
  14. C:\Program Files\lpagntsys\utility\lib\certutil.exe

Trusted Applications:

  1. C:\Program Files\lpagntsys\service\insutil.exe
  2. C:\Program Files\lpagntsys\service\lpBInt.exe
  3. C:\Program Files\lpagntsys\service\lpCP.exe
  4. C:\Program Files\lpagntsys\service\lpdpin.exe
  5. C:\Program Files\lpagntsys\service\lpInt.exe
  6. C:\Program Files\lpagntsys\service\lpSvc.exe
  7. C:\Program Files\lpagntsys\service\lpunins000.exe
  8. C:\Program Files\lpagntsys\enc\inDEnc.exe
  9. C:\Program Files\lpagntsys\enc\indenc.ind.exe
  10. C:\Program Files\lpagntsys\svchk\lpSC.exe
  11. C:\Program Files\lpagntsys\uninstall\unins000.exe
  12. C:\Program Files\lpagntsys\update\lpUpdt.exe
  13. C:\Program Files\lpagntsys\utility\lib\certutil.exe

This list provides clear and concise entries for adding exceptions to your antivirus software, ensuring these specific files and folders are not scanned or blocked. Adjust paths as necessary to match your actual installation locations.


ANNEXURE – II

Antivirus Exceptions for Linux Agent

Add the following folders to the exclusion list:

  • /var/log/inDefendBusinessClientEndLogger/
  • /var/lib/.lpagnt/
  • /var/lib/.lpagnt/.logs/
  • /var/lib/.lpagnt/.services/

Add the following processes to the exclusion list:

  • /var/lib/.lpagnt/.services/lpsvc
  • /var/lib/.lpagnt/.services/lpsc
  • /var/lib/.lpagnt/.services/lpspg
  • /var/lib/.lpagnt/.services/lpupdtr
  • /var/lib/.lpagnt/.services/lpint

In rare scenarios with antivirus capable of web protection, turn off Web Threat Protection and Mail Threat Protection.


ANNEXURE – III

Antivirus Exceptions for Mac OS Agent

Add the following folders to the exclusion list:

  • /var/log/inDefendBusinessClientEndLogger/
  • /var/lib/.lpagnt/
  • /var/lib/.lpagnt/.logs/
  • /var/lib/.lpagnt/.services/

Add the following processes to the exclusion list:

  • /var/lib/.lpagnt/.services/lpsvc
  • /var/lib/.lpagnt/.services/lplogger
  • /var/lib/.lpagnt/.services/lpspg
  • /var/lib/.lpagnt/.services/lpupdtr
  • /var/lib/.lpagnt/.services/lpint

Turn off Web & Mail Protection.


ANNEXURE – IV

Disable QUIC Protocol through Windows Firewall  / Third Party Firewalls

To disable QUIC Protocol through windows firewall, we need to create an outbound rule in windows firewall as given below: (Similar rule should be created on third party firewalls)

Create Outbound Rule in Windows Firewall via Command Prompt:

1.Open cmd with run as administrator.

2.Run command

netsh advfirewall firewall add rule name= "QUIC_BLOCK" dir=out action=block protocol=UDP remoteport=80,443


3.Verify the rule in Windows Firewall->Advanced Settings->Windows Firewall with Advanced Security->Outbound Rules


NOTE: please check the steps with vendor support for disabling QUIC Protocols on third party Firewalls

For more information please contact support@dataguardnxt.com