{"id":1055,"date":"2026-04-03T11:17:36","date_gmt":"2026-04-03T03:17:36","guid":{"rendered":"https:\/\/www.nsecsoft.com\/en\/?p=1055"},"modified":"2026-04-08T16:39:52","modified_gmt":"2026-04-08T08:39:52","slug":"leaktrack-audit","status":"publish","type":"post","link":"https:\/\/www.nsecsoft.com\/en\/course\/leaktrack-audit.html","title":{"rendered":"How to Audit and Monitor Employees&#8217; Outbound File Transfers"},"content":{"rendered":"<p><!-- obsidian --><\/p>\n<p>Employees sending files out through chat tools, browsers, mailboxes, network disks, mobile media, etc. is the most common risk scenario in enterprise data security management and the one that most requires continuous traceability. By enabling <strong>Leak Tracking<\/strong> in <strong>File Security<\/strong> through Ping32, administrators can not only grasp &#8220;who sent what files at what time and through what channels&#8221;, but can also further combine screenshots, alerts, backups and sensitive content analysis when necessary to form a more complete audit link.<\/p>\n<p>From the perspective of implementation strategy, it is recommended to stably enable <strong>Leak Tracking<\/strong> as a basic capability first, and then gradually add enhancements such as <strong>Leak Backup<\/strong>, <strong>Sensitive Content Analysis<\/strong>, and Browser-Based Leak Channel Analysis based on the security requirements of the enterprise. This can not only establish the outbound traceability capability as soon as possible, but also avoid overlaying too many strategies at once in the early stage and increasing debugging costs.<\/p>\n<h4 data-heading=\"1. Enable &quot;Leak Tracking&quot; to monitor and audit outbound files\"><strong>Enable &#8220;Leak Tracking&#8221; to monitor and audit outbound files<\/strong><\/h4>\n<p>If the current main goal of the enterprise is to establish outbound traceability capabilities, it is recommended to complete the configuration in this section first. Once completed, administrators can view audit records of employee outbound files in <strong>Leak Tracking<\/strong> and decide whether to continue enabling backups, sensitive content identification, or more granular risk treatment based on the actual risk level.<\/p>\n<p>1. Click <strong>Data Security<\/strong> \u2192 <strong>Policy<\/strong> on the Ping32 Management Console to enter the data security policy settings page.<\/p>\n<p>2. In the data security policy settings page, click <strong>File Security<\/strong> and turn on <strong>Leak Tracking<\/strong> to monitor and audit files sent by employees.<\/p>\n<p>3. Click <strong>Parameter Settings<\/strong> \u2192 <strong>General Settings<\/strong> and configure the following options as needed:<\/p>\n<ul>\n<li>Check <strong>Take screenshots when leaks are discovered<\/strong>:<\/li>\n<li>Set the number of screenshots and the interval between screenshots<\/li>\n<li>Realize automatic screenshot auditing when employees send files out<\/li>\n<li>Check <strong>Alert when a leak is discovered<\/strong>:<\/li>\n<li>Pop-up alert to console administrator<\/li>\n<li>Can be configured to trigger when multiple files are sent out in a short period of time<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1056\" src=\"https:\/\/www.nsecsoft.com\/en\/wp-content\/uploads\/2026\/04\/3-leaktrack-audit-1.png\" alt=\"\" width=\"1095\" height=\"685\" \/><\/p>\n<p>4. After the policy setting is completed, confirm the policy application endpoint.<\/p>\n<p>5. After confirming the policy application endpoint, click <strong>Apply<\/strong> to start monitoring and auditing files sent by employees.<\/p>\n<p>6. After the policy is issued, click <strong>Data Security<\/strong> \u2192 <strong>Leak Tracking<\/strong> to view the relevant audit records of files sent by employees.<\/p>\n<p>After completing the above configuration, it is recommended to simulate an outgoing action on the test endpoint, such as sending a test file through WeChat, browser or email, and then return to <strong>Data Security<\/strong> \u2192 <strong>Leak Tracking<\/strong> to check whether the corresponding record has been generated. When verifying, you can focus on the endpoint name, outgoing route, file name, timestamp, and whether there are screenshots or alarm information to confirm that the audit link is complete and available.<\/p>\n<h4 data-heading=\"2. Back up leaked files (optional)\"><strong>Back up leaked files (optional)<\/strong><\/h4>\n<p>If the enterprise not only wants to know that &#8220;outbound files have occurred&#8221;, but also wants to be able to directly retrieve the original outbound files for verification afterwards, it is recommended to further configure <strong>leak backup<\/strong>. This capability is particularly suitable for high-value positions, key project groups, or compliance scenarios where original evidence needs to be retained.<\/p>\n<p>1. In the Ping32 Management Console, click <strong>Data Security<\/strong> \u2192 <strong>Policy<\/strong> \u2192 <strong>Select the corresponding policy<\/strong> \u2192 <strong>File Security<\/strong> \u2192 <strong>Leak Tracking<\/strong> \u2192 <strong>Parameter Settings<\/strong><\/p>\n<p>2. Click <strong>Leak Backup<\/strong> \u2192 <strong>Add<\/strong> to configure the backup of leaked files when a leak is triggered:<\/p>\n<p>3. Configure backup settings in the pop-up window, with descriptions of configuration items.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1057\" src=\"https:\/\/www.nsecsoft.com\/en\/wp-content\/uploads\/2026\/04\/3-leaktrack-audit-2.png\" alt=\"\" width=\"1095\" height=\"685\" \/><\/p>\n<p>Outsourcing channels<\/p>\n<ul>\n<li>The default is <strong>All ways<\/strong>, that is, files sent out through any means will be backed up.<\/li>\n<li>Can be configured to <strong>specify leakage channels<\/strong> and support setting <strong>custom programs<\/strong><\/li>\n<\/ul>\n<p>rule<\/p>\n<ul>\n<li>Default is <strong>All files<\/strong><\/li>\n<li>Can be configured as compound rules, supporting:<\/li>\n<li>Specify <strong>file type<\/strong><\/li>\n<li>Specify <strong>file size<\/strong> range<\/li>\n<\/ul>\n<p>operate<\/p>\n<ul>\n<li>The default operation is <strong>Backup<\/strong>. If you want to set the specified program not to perform file backup, select No backup.<\/li>\n<li>Network path<\/li>\n<li>The default operation is <strong>No backup<\/strong>. If you want to set up backup of network drive files, select Backup<\/li>\n<li>Remark<\/li>\n<li>Fill in the remark information of this entry (to distinguish it from other entries)<\/li>\n<\/ul>\n<p>When planning <strong>Leakage Backup<\/strong>, it is recommended not to simply back up all outbound behaviors indiscriminately, but rather to make refined configurations based on <strong>outbound channels<\/strong>, <strong>rules<\/strong> and key positions. This can not only reduce the storage pressure caused by invalid backups, but also help administrators quickly focus on high-risk files that really need to be retained.<\/p>\n<h4 data-heading=\"3. Analyze whether the document contains sensitive content (optional)\"><strong>Analyze whether the document contains sensitive content (optional)<\/strong><\/h4>\n<p>For companies with a large number of outbound documents and high costs of manual screening one by one, <strong>Sensitive Content Analysis<\/strong> can further improve audit efficiency. Administrators can use <strong>data classification<\/strong> to identify whether files contain specific sensitive words, sensitive fields, or business classification content, thereby upgrading outbound auditing from &#8220;seeing outbound content&#8221; to &#8220;identifying outbound content risks.&#8221;<\/p>\n<p>1. In the Ping32 Management Console, click <strong>Data Security<\/strong> \u2192 <strong>Policy<\/strong> \u2192 <strong>Select the corresponding policy<\/strong> \u2192 <strong>File Security<\/strong> \u2192 <strong>Leak Tracking<\/strong> \u2192 <strong>Parameter Settings<\/strong><\/p>\n<p>2. Click <strong>Sensitive Content Analysis<\/strong> and check <strong>Sensitive Content<\/strong> to enable sensitive content analysis. Support<\/p>\n<ul>\n<li>Intelligent analysis<br \/>\nThis mode will analyze based on conditions such as system resource usage and whether it is idle.<\/li>\n<li>Real-time analysis<br \/>\nIn this mode, the file content will be analyzed in real time.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1058\" src=\"https:\/\/www.nsecsoft.com\/en\/wp-content\/uploads\/2026\/04\/3-leaktrack-audit-3.png\" alt=\"\" width=\"1095\" height=\"685\" \/><\/p>\n<p>3. Select the sensitive words to be analyzed from the data categories below<\/p>\n<p>Optional configuration:<\/p>\n<ul>\n<li>Only audit records containing sensitive content<\/li>\n<li>Instantly back up files containing sensitive content<\/li>\n<\/ul>\n<p>If an enterprise wants to reduce the audit interference caused by ordinary files, it can first enable &#8220;Audit only records containing sensitive content&#8221;; if it also wants to retain the original evidence when sensitive content is hit, it can also check &#8220;Immediately back up files containing sensitive content&#8221;. This type of combination configuration is more suitable for high-risk data governance scenarios.<\/p>\n<h4 data-heading=\"4. Enable browser leakage channel analysis (optional)\"><strong>Enable browser leakage channel analysis (optional)<\/strong><\/h4>\n<p>Ping32 leak tracking supports domain name analysis for browser leak behaviors, allowing for more refined processing of leak behaviors.<\/p>\n<p data-heading=\"1. Enable \u201cAI Pro Service\u201d\"><strong>Enable \u201cAI Pro Service\u201d<\/strong><\/p>\n<p>Click <strong>System Settings<\/strong> \u2192 <strong>Advanced Settings<\/strong> in the Ping32 Management Console.Start <strong>AI Pro service.<\/strong>Click <strong>Apply<\/strong><\/p>\n<p data-heading=\"2. Enable the &quot;intelligent analysis of leakage applications&quot; strategy\"><strong>Enable the &#8220;intelligent analysis of leakage applications&#8221; strategy<\/strong><\/p>\n<p>1. Enable the <strong>Leak Tracking<\/strong> policy<\/p>\n<p>2. Click <strong>Other<\/strong> on the leak tracking policy setting interface<\/p>\n<p>3. Open the <strong>Smart Leak Analysis Application<\/strong><\/p>\n<p>4. Click <strong>OK<\/strong> \u2192 Click <strong>Apply<\/strong><\/p>\n<p data-heading=\"3. Check the effect\"><strong>Check the effect<\/strong><\/p>\n<p>After the policy is issued, click <strong>Data Security<\/strong> \u2192 <strong>Leakage Tracking<\/strong> to view the audit records.Example: When the endpoint logs in to QQ mailbox through a browser to send files, the leakage channel will be displayed as <strong>QQ mailbox<\/strong> instead of only the browser (such as Edge).In the detailed information of the leakage channel, you can view:<\/p>\n<ul>\n<li>Leak software: such as Edge browser<\/li>\n<li>Leakage method: such as QQ mailbox<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1059\" src=\"https:\/\/www.nsecsoft.com\/en\/wp-content\/uploads\/2026\/04\/3-leaktrack-audit-4.png\" alt=\"\" width=\"1095\" height=\"685\" \/><\/p>\n<p>Through the above method, the leakage path can be more refined and help managers accurately understand how users leak secrets.<\/p>\n<h4 data-heading=\"5. Implementation suggestions and common ideas\"><strong>Implementation suggestions and common ideas<\/strong><\/h4>\n<ul>\n<li>If an enterprise has just started to build an outsourced audit system, it is recommended to enable <strong>Leak Tracking<\/strong> first, and then gradually enable <strong>Leak Backup<\/strong> and <strong>Sensitive Content Analysis<\/strong> after confirming that the audit records are stably generated.<\/li>\n<li>For high-risk positions, it is recommended to enable <strong>Screenshot when a leak is discovered<\/strong> and <strong>Alarm when a leak is discovered<\/strong> at the same time to improve the efficiency of incident discovery and the completeness of the review.<\/li>\n<li>For browser outgoing scenarios, it is recommended to combine <strong>AI Pro Service<\/strong> and <strong>Intelligent Analysis Leakage Application<\/strong> to avoid recording only staying at the browser process level without specific outgoing method information.<\/li>\n<li>Before the outbound audit strategy is officially distributed on a large scale, it is recommended to conduct verification on different outbound channels to ensure that the audit, backup, alarm and sensitive content identification results are consistent with expectations.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Employees sending files out through chat tools, browser [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[69],"class_list":["post-1055","post","type-post","status-publish","format-standard","hentry","category-course","tag-kb-type-guide"],"_links":{"self":[{"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/posts\/1055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/comments?post=1055"}],"version-history":[{"count":2,"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/posts\/1055\/revisions"}],"predecessor-version":[{"id":1137,"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/posts\/1055\/revisions\/1137"}],"wp:attachment":[{"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/media?parent=1055"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/categories?post=1055"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nsecsoft.com\/en\/wp-json\/wp\/v2\/tags?post=1055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}