Data Loss Prevention (DLP) solutions are often viewed as the cornerstone of safeguarding sensitive information, but their effectiveness depends heavily on the scope of what they can monitor. Network attached storage (NAS) and emerging technologies like USB over IP introduce blind spots that traditional endpoint DLP agents struggle to cover. Because these systems operate over network channels rather than local drives or physical ports, they can quietly bypass the rules and restrictions organizations rely on to prevent exfiltration. Understanding how NAS and USB over IP interact with DLP, and why they evade detection, is critical for building a layered defense strategy that closes these gaps before attackers exploit them.
A NAS device is a network attached storage system that sits on your company’s internal network. While it provides convenience and centralization, it can also become a blind spot for endpoint-based DLP systems.
Many DLP agents, like Microsoft Purview Endpoint DLP, are designed to track activity on local drives or synced cloud storage. But when a user copies sensitive files directly from a NAS share to a USB drive, that transfer may bypass detection entirely. Microsoft engineers confirm there’s no native inspection of NAS to USB transfers unless the files first hit a local drive 1.
Endpoint DLP tools monitor activities on endpoints. They catch file operations like copy, paste, and print on recognized drives. But network shares, including those on NAS, are treated differently. The DLP agent simply does not “see” what’s happening over the network 1.
Exfiltration via NAS is just one example of a more general category: using trusted storage or protocols that DLP software ignores. Other tactics include encrypted or compressed transfers, or using alternate protocols to hide traffic from scrutiny 2,3.
USB over IP enables remote USB device connections as if physically plugged in locally. Think remote dongles, scanners, or even flash drives shared over the network.
Since the USB device is accessed over TCP/IP, not a physical port, the DLP endpoint agent treats the traffic as network communication, neither “removable media” nor local or synced storage 1. That means typical USB-blocking rules won’t apply.
USB over IP often uses proprietary encapsulation protocols and encryption. This makes content invisible to DLP unless the system inspects deep into network traffic, capabilities many endpoint DLP tools don’t possess 2,4.
USB over IP opens a new path for data exfiltration. A user could mount a remote USB drive and copy confidential files directly from a NAS, or even a local drive, without tripping USB restrictions, since it’s all happening “over the network.”
Shared Characteristic: Treated as Network Traffic
Shared Characteristic: Encrypted or Encapsulated Data
Shared Characteristic: Unmonitored Channels
NAS and USB over IP both represent data exfiltration vectors that can dodge traditional DLP protections. The common thread is that data flows via network channels, bypassing local policy enforcement attached to removable media or local files.
To secure these gaps:
By combining endpoint controls, network visibility, and storage security, you significantly reduce the risk of sensitive data silently slipping out of your organization.
When we think about data breaches, we often picture hackers breaking through firewalls or phishing…
The race to adopt post quantum cryptography (PQC) is one of the most important security…
Insider threats are one of the hardest problems in cybersecurity. Even with strong access controls,…
Insider threats have quietly become the most persistent and costly cybersecurity risk facing organizations today.…
When the Malta tax office mistakenly sent sensitive company details to around 7000 recipients, the…
Insider threats are one of the most persistent risks facing organizations today. Whether malicious, negligent,…
This website uses cookies.