WebexOne demo day
- 1 Overview
- 2 Real-Time DLP
- 2.1 Real-time DLP - Files: Files containing sensitive information are blocked in real time before reaching the destination user.
- 2.2 DLP - Safe Content: Inappropriate images are blocked
- 2.3 DLP - Anti-harassment: Bad words in files and messages are blocked
- 2.4 View auditing and links to eDiscovery
- 2.5 Review DLP settings and DLP rules
- 3 eDiscovery
- 4 Governance
- 5 Space Management
- 6 Ethical Wall- communication controls
- 7 BusinessGPT
Overview
During the training session, you will get to experience the following high-level capabilities of SphereShield for Webex.
Real-time DLP- Block files before reaching destination
eDiscovery- User-friendly archive, search, view and export Webex communication (also on prem)
Governance- Policies controlling space creation, moderation
Space management- Advance search and manage all of your Org spaces
Retention - Flexible retention policies based on parameters such as user, group members, tags, space name
Ethical Wall- Flexible policies based on users, groups, or domains for internal and external communication.
BusinessGPT - ChatGPT-Like capabilities across all company data including Webex.
Please follow the instructions below to try the product.
You will have access to 3 users: Bob, Alice and Jim. Each user will come with an accompanying number, depending on which demo environment you are using. For example Bob1 & Alice1 & Jim1, Bob2 & Alice2 & Jim2 etc… In the instructions below, all these users are referred to as Bob(x), Alice(x) and Jim(x) .
Before starting the demo, please browse https://webexone.agatcloud.com and sign in with aperez@cb414.dc-01.com. Please ask your Cisco coordinator for the password.
IMPORTANT: Please do not change any settings in the Portal. Everything has been pre-configured.
Real-Time DLP
For the purpose of this demo, files are blocked in-line in real time and messages are deleted in near real time using API’s. AGAT can also block messages in-line using a proxy. For more information speak to sales@agatsoftware.com.
Real-time DLP - Files: Files containing sensitive information are blocked in real time before reaching the destination user.
Use Bob(x) to send a file containing a credit card number to Jim(x) - File location: C:\Agat\CC.docx
See that the file is blocked in real time before reaching the destination user.
Go to the DLP auditing and verify that you can see the record of the incident. Verify that you get a notification from the compliance admin as an IM message.
DLP - Safe Content: Inappropriate images are blocked
Inappropriate images are violent or adult in nature. Spoof, medical and racy images can also be blocked.
Use Bob(x) to send an image to Jim(x) - File location: C:\Agat\injury.jpg
See that the image is blocked in real time before reaching the destination user.
Go to the DLP auditing and verify that you can see the record of the incident. In addition, verify that you get a notification from the compliance admin as an IM message.
DLP - Anti-harassment: Bad words in files and messages are blocked
Use Bob(x) to send a file containing bad words to Jim(x) - File location: C:\Agat\profanity.docx
See that the file is blocked in real time before reaching the destination user.
Go to the DLP auditing and verify that you can see the record of the incident. In addition, verify that you get a notification from the compliance admin as an IM message.
View auditing and links to eDiscovery
For each scenario above, you will be able to see the audit log in the DLP auditing page here.
Each row represents a unique DLP incident.
You can open each incident to see more information. Each audit log also contains a link (Conversation Id) that will take you to the conversation in the eDiscovery page where you can see the conversation in its full context.
Review DLP settings and DLP rules
You can see the DLP pre-configured policies here
The first section contains predefined rules that you enable according to need. For this demo we have enabled the “Credit card number” rule.
The second section contains Custom Rules. These are rules that can be added using Regex. For this demo, we have used custom rules to block bad words.
If you click on ‘Edit’ next to the policy you can see the list of words that are blocked. Please do not make any changes
The third section contains the policies to block inappropriate images. Images can be blocked utilizing 5 filters - Adult, Spoof, Medical, Violence, Racy.
Additional DLP Settings can be found here
eDiscovery
Navigate to eDiscovery
Each row represents a space, direct room or meeting.
Click on any row and see the details and communication on the right-hand side
eDiscovery- Search specific content of a specific user
Select the ‘Advanced search’ button to search based on several different parameters.
You can search for specific participants and even for specific text. The results include communication from Spaces, Direct Rooms and Meetings (based on transcript).
For example you can search for the text “private” and see results from chats and meetings.
Governance
Governance - Block Space creation
There is a governance policy configured that controls who can create Spaces.
You can see the settings here
Use Bob[x] to create a space. See that the space gets deleted after a few seconds. You can see the incident audit log here.
Governance - Flexible retention policies
There are also flexible retention policies that can be configured. For example, retention based on Users, AD Groups, Scope (Internal and External) and Room ID. You can see the retention policy settings here
Retention policies can also be configured per space in Space Management page
We have configured the retention period for the Webex One Demo space as one minute.
Use Bob[x] to send a message in the Webex One Demo space. See that the message is deleted after 1 minute.
Space Management
Space management: Manage all Org Spaces
To start managing your Webex Spaces navigate to the Space Management page
You can see a list of rooms as well as the room members
You can also search your rooms based on many parameters
Search Spaces using advanced search to find all Spaces that have not been active for X days.
Ethical Wall- communication controls
For each scenario below, you will be able to see the audit log in the Ethical Wall auditing page here
See that a notification also comes from the SphereShield Agent in the Chat.
Ethical Wall policies can be configured using Azure AD groups, UPN’s and domains. We have configured Ethical Wall policies based on the users and groups bellow.
Users | Azure AD Group |
---|---|
Bob(x) | Researchers |
Alice(x) | Investors |
Jim(x) | HR |
Ethical Wall- Block file sharing between specific users/groups
There is an Ethical Wall policy blocking Researchers AD group (Bob[x]) from sending files to Investors AD group (Alice[x]). This policy allows sending files to other groups (Jim[x])
Use Bob[x] to send a file located in File location: C:\Agat\SS.pdf to Alice[x] - see that the file is blocked.
Use Bob[x] to send the same file to Jim[x] - see that the file is not blocked.
Ethical Wall- Flexible communication control with an external domain: Bob is able to send agatdemo.com a file but other users are not able to send files to agatdemo.com.
Ethical Wall also allows for flexible control over external communication. We have configured a policy that allows the Researcher group to communicate with an external domain - agatdemo.com
Use Bob[x] (Researcher) to send a file to bob@agatdemo.com - See that the message goes through.
Use Alice[x] (Investor) to send a file to bob@agatdemo.com - See that the message is blocked.
Review Ethical Wall policies and settings
You can see the preconfigured Ethical Wall Policies, for both two-participant conversation (direct rooms) and multi-participant conversation (Spaces) here
Please do not change the Ethical Wall Policies
You can view the policies in more detail as follows -
Click EDIT next to the policy - Please do not save changes to the Ethical Wall Policies
You can then see the Policy Conditions that define who the policy applies to
You can also see the Policy rules that have been configured
Additional Ethical Wall Settings can be found here
BusinessGPT
AGAT has released the first Beta version of BusinessGPT.
You can see more here: https://agatsoftware.ai/businessgpt/
There are 2 modules:
BusinessGPT Pro
Designed to quickly allow you to create a public chatbot from data that is public such as documents and websites. The Light edition is a cost-effective solution for improving the customer experience for support and sales in addition to internal usage of data that has no restrictions.
BusinessGPT Enterprise
Designed to be used internally by analyzing all your company data and for improving employee productivity. It can analyze many data sources such as managed documents, chats, meetings, and emails. The Enterprise edition will show the user answers based on data they have permission to view.
Analyzing Webex Data
You can ask questions and get answers from many data sources including Webex.
If you are using the Webex desktop app you can access BusinessGPT for Webex by clicking on the icon in the bottom left hand corner of the app. If you are connected with the Web App you can access BusinessGPT for Webex here : https://bgd4.agatdemo.com/SharedDataSources/WebexMeeting/Azure
You will need to sign in with your user (Bob(x)) and grant permissions to the app.
Once you have accessed the BusinessGPT portal you will see a few demo meetings that took place.
Select a meeting and click on the Chatbot button.
This will take you to the chatbot page for that meeting.
You can then ask questions about the meeting.
For example, compliance officers may want to ask -
“Was anything discussed that could be considered a compliance violation?”
A manager may ask -
“What was the meeting about?“
BusinessGPT can be used to analyze data from multiple company data sources. In coming versions, you will be able to configure predefined questions. All data will be scanned to address these questions, sending alerts automatically as needed.
For further enquiries please email us: sales@agatsoftware.com