Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Mobile DLP attribute properties
Administrator Help | Forcepoint DLP | Version 8.4.x
The table below lists the mobile DLP attributes and their configurable properties:
 
Available actions: quarantine (default), permit.
*
Wide is highly sensitive and errs on the restrictive side. To avoid leaking sensitive data, it is more likely to produce a false positive (unintended match) than a false negative (content that is not detected).
*
Default balances the number of false positives and false negatives.
*
Narrow is the least restrictive. It is more likely to let content through than to produce an unintended match.
Available actions: quarantine (default), permit.
For example, after adding a file named confidential.docx, when a user attaches a file with that name to an email message, the system detects it and takes the configured action.
Available actions: quarantine (default), permit
Click Add to specify the types of files that should be monitored when attached to an email message, for example Microsoft Excel files.
Available actions: quarantine (default), permit.
Click Add to define key phrases or regular expression (regex) patterns that should be monitored. Regex patterns are used to identify alphanumeric strings of a certain format.
Available actions: quarantine (default), permit.
You cannot add or delete terms from predefined dictionaries, but you can exclude terms from detection, if needed. Do this on the Main > Content Classifiers > Patterns & Phrases page. Select the dictionary to edit, then enter the phrases to exclude.
Available actions: quarantine (default), permit.
Available actions: quarantine (default), permit.
Defining mobile DLP trusted users
Administrator Help | Forcepoint DLP | Version 8.4.x
Trusted users are those that the organization does not want monitored. Forcepoint DLP does not analyze email sent to mobile devices for trusted users.
If you have users that should not receive mobile DLP policy enforcement:
1.
Select Enable trusted users.
2.
Click Edit.
3.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Copyright 2017 Forcepoint. All rights reserved.