Aakash..
Did you add the git.exe command to the Agent > Global Application monitoring section?
Try to add "git.exe" that and make sure to check the right boxes.
Make sure you register the Binary Name and Original Filename as "git\.exe".
You may want to create 2 different ones.
Then play with the check boxes, make sure to use FTP, HTTP, Copy to Network Share and Application File Access (read or open).
------------------------------
Good Luck. - RP
PLEASE MARKED SOLVED WHEN POSSIBLE
------------------------------
Original Message:
Sent: Jun 05, 2018 01:47 PM
From: Unknown User
Subject: Command line uploads to Github
I am trying to create controls around unauthorized upload of PII data to personal Github accounts. I am looking at two different usecases, the first one deals with uploading the file/code via the Github website and the second one deals with committing it via the Windows commandline. I have figured out a way to deal with the first usecase but couldnt figure out a way to deal with the second.
In short, if any user uses these commands:
git add .
git remote add origin https://github.com/username/repository.git
git commit -m "commit message"
git push -u origin master
It should trigger a violation in the Endpoint section of DLP.