Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Suspicious User Activity
Predefined Policies and Classifiers | Data Security Solutions | Version 7.8.x
*
Detects data that is sent at an unusual time. You define what is considered an unusual time in the script classifier, Unusual Hours. Each rule in this policy target a different type of data, such as Office or archive files.
Example: If you define working days in the classifier as Monday-Friday and unusual hours as 9pm-5am, then data sent on Saturday, Sunday, or during the working week between 9 p.m. and 5 a.m. triggers this policy.
*
*
*
*
*
Policy for the detection of database files. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
A policy for detecting email messages that are being sent from one's corporate email address to his or her personal email address. The rules for this policy are:
*
*
*
*
Policy for detection of content suspected to be manipulated to avoid detection.This may cause false positives. The rules for this policy are:
*
*
*
*
*
*
*
*
Detects content suspected to be a password in clear text. The rules for this policy are:
*
*
*
*
Policy for detecting email messages that are being sent from one's corporate email address to his or her personal email address. The rule for this policy is also called:
*
*
Detects when unencrypted binary files of unknown formats are being sent repeatedly over a period of time. (Websense-supported file types do not trigger this policy.)
For example: If 20 unencrypted files of an unknown format are sent during 1 hour, this policy is triggered. Thresholds are set in the Wide or Default rule.
*
*
*
*
*
Policy for detection of suspicious behavior of users by measuring the rate and type of transactions over time. This may cause false positives. The rules for this policy are:
*
*
*

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Copyright 2016 Forcepoint LLC. All rights reserved.