Add CAP for File Exfiltration Control in Jira & Confluence Apps on macOS

What is a one sentence summary of your feature request?

We request the addition of Content Aware Protection (CAP) to track and control file exfiltration in Jira and Confluence applications on macOS

Please describe your idea in detail. What is your problem, why do you feel this idea is the best solution, etc.

Currently, Endpoint Protector does not support Content Aware Protection (CAP) for tracking or controlling file exfiltration within Jira and Confluence applications on macOS. This creates a critical security gap where users can download or transfer sensitive files through the applications without detection or enforcement.

Unlike browser-based access, users working in Jira or Confluence via application environments on macOS can interact with and exfiltrate files without triggering CAP policies. In high-security or compliance-driven environments, this limitation poses a significant data leakage risk.

We propose the addition of macOS CAP functionality specifically designed to monitor and control file activities within Jira and Confluence apps, including:

  • Monitoring file downloads and uploads performed within the applications

  • Triggering real-time alerts for file transfer or export attempts

  • Enabling policy-based control to block or allow file movement based on content

How do you currently solve the challenges you have by not having this feature?

Currently, there is no way within Endpoint Protector to monitor or control file exfiltration from Jira or Confluence applications on macOS. This creates a critical gap in our data protection strategy.

I think it should be support for other OS (Windows, Linux) as well as macOS.

1 Like

Hello,

Thank you for sharing this idea!

We recognize the value in monitoring Jira and Confluence applications for file exfiltration and agree that it is a worthwhile addition. Presently, we’re working on refining our list of monitored exit points to deliver an optimal user experience and safeguard against data breaches.
As a result, these two applications have been added to our development list and will be integrated into the product. As a temporary solution until then, we suggest continuing to use browser-based access for these if possible, to maintain the ability to monitor and control file transfers.

However, please keep in mind that we cannot provide a specific timeline for their implementation right now, but as soon as we will have this scheduled, updates will be shared.

Wishing you a nice day!

All the best,
Simona