Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Predefined Policies and Classifiers > Data Loss Prevention policies > Content Protection > Company Confidential and Intellectual Property (IP)
Company Confidential and Intellectual Property (IP)
Predefined Policies and Classifiers | Data Security Solutions | Version 7.8.x
The following predefined policies are available for the detection of company confidential or intellectual property data:
*
Policy for detection of sensitive text in the header or footer of a document. The rules for this policy are:
*
*
*
*
The policy detect secret or confidential documents by identifying "confidential" terms in English or Arabic, such as "Confidential" or "سري ", in the Header or the Footer of Office documents. The rule for this policy is:
*
*
Policy for detection of keywords in metadata. The rules of the policy use script classifiers that you can modify to insert keywords. The rules include:
*
*
*
Policy for detection of project document in traffic. This may cause false positives. The rule for this policy is:
*
*
Policy for detection of Information suspected to be related to mergers and acquisitions. The rules for this policy are:
*
*
*
Policies for detection of sensitive data in the Oil and Gas industry and, in particular, information pertaining to oil prospecting and drilling.
*
Detect leakage of sensitive data in the Oil and Gas industry and, in particular, information pertaining to oil prospecting and drilling. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy for promoting protection of sensitive information pertaining smart power grids and supervisory control and data acquisition (SCADA) systems. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Policies for detection of sensitive data in the Media industry.
*
Policy for detection of movie and TV scripts dissemination. The rule for this policy is:
*
*
Policies for detection of source codes and software design documents.
*
Policy for detection of software design documents in traffic. The rules for this policy are:
*
*
Policy for detection of software source code. The rule for this policy is:
*
*
*
*
*
*
*
*
*
Policy for detection of integrated circuits design source code in SPICE (Simulation Program with Integrated Circuits Emphasis). This may cause false positives. the rules for this policy are:
*
*
*
Policy for detection of SQL and Oracle Queries and Database. This may cause false positives. the rules for this policy are:
*
*
*
*
Policy for detection of Verilog source code dissemination. This policy is comprised of 2 rules, each covering a different aspect of the detected texts. In order to achieve complete coverage, all rules must be selected. This may cause false positives. The rules for this policy are:
*
*
*
Policy for detection of source code dissemination in VHDL, used mainly for hardware design. This may cause false positives. The rule for this policy is:
*
*
Policy for detection of Visual Basic source code. This may produce a false positive. The rules for this policy are:
*
*
*
*
Policies for detection of sensitive data in the Telecom industry.
*
Policy for detection of Call Detail Records (CDRs) in traffic. The rule for this policy is:
*
*
*
Policy for detection of serial (IMEI) numbers of cell phones. The International Mobile Equipment Identity (IMEI) is a number unique to every GSM and UMTS and iDEN mobile phone as well as some satellite phones. It is usually found printed on the phone underneath the battery. The rule for this policy is:
*
*
*
*
Policy for detection of location coordinates. The rule for this policy is:
*
*
*
Policy for detection of business and technical drawing file types. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy for detection of network security documents and network diagrams. This policy detects network diagrams by searching for IP addresses, MAC addresses and various terms common to such documents. In order to achieve complete coverage, first 2 rules and one of the MAC address rules must be selected. The rules for this policy are:
*
*
*
*
*
*
Policy for detection of patents and patent applications. The rule for this policy is:
*
*
Policy for detection of documents of prime strategic value, such as business and marketing plans. The rule for this policy is:
*
*
*
*
Policy to identify Microsoft license keys. The policy helps mitigate software piracy and unauthorized usage of corporate assets. The rule for this policy is:
*

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Predefined Policies and Classifiers > Data Loss Prevention policies > Content Protection > Company Confidential and Intellectual Property (IP)
Copyright 2016 Forcepoint LLC. All rights reserved.