Hi again,
I am still trying to get DLP to programmatically give me the recipients of an SMTP email incident. Here is how I plan on doing it (open to suggestions if there is a better way):
1. Lookup plugin gets the recipients as a lookup parameter and outputs them to a custom attribute
2. Flex Response plugin gets the value of that custom attribute and performs operations on those recipients
I have followed the 14.6 DLP Administrator Guide on how to implement a Python 2.6 lookup plugin; here is the plugin configuration:
Script Command: C:\Python26\python.exe
Arguments: -u,C:\SymantecDLP\Protect\plugins\lookup.py
All boxes such as "enable stdin/out" are unchecked. I have also tried putting quotes and double quotes around the script command and arguments but that didn't work.
The error message received is:
Aug 14, 2017 10:17:16 AM (SEVERE) Thread: 259 [com.vontu.lookup.script.ExecLauncher.launch] Failed to execute script.
com.vontu.lookup.script.ScriptLookupException: Cannot run program "C:\Python26\python.exe": CreateProcess error=2, The system cannot find the file specified
at com.vontu.lookup.script.ExecCommand.execute(ExecCommand.java:104)
at com.vontu.lookup.script.ExecLauncher.launch(ExecLauncher.java:137)
at com.vontu.lookup.script.ScriptLookup.invokeScript(ScriptLookup.java:116)
at com.vontu.lookup.script.ScriptLookup.lookupAttributeValues(ScriptLookup.java:71)
at com.vontu.enforce.workflow.attributes.CustomAttributeLookup$1.call(CustomAttributeLookup.java:441)
at edu.oswego.cs.dl.util.concurrent.FutureResult$1.run(FutureResult.java:75)
at com.vontu.util.concurrent.TimedCallablePool$Worker.run(TimedCallablePool.java:414)
The python.exe file is definitely present, and the "protect" user has read/execute permissions on all of the directories and files in the two file paths above. If I open a command line as the "protect user" and enter the command "C:\Python26\python.exe C:\SymantecDLP\Protect\plugins\lookup.py" or "python C:\SymantecDLP\Protect\plugins\lookup.py" the script will execute without issue, but when the plugin is called on an incident, suddenly Python cannot be found. Python is in the "protect" user's path variable.
Any ideas?
Much appreciated