Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Creating Discovery Policies
Creating Discovery Policies
 
Administrator Help | Forcepoint DLP | Version 8.7.x
Related topics:
Discovery is the act of determining where sensitive content is located in an organization. A discovery policy might, for example:
*
*
Discovery finds data at rest in the network and identifies the endpoint machines that represent the greatest risk.
To monitor what is done with records found by a discovery policy, or stop them from leaving the building, create a network or endpoint policy.
Performing discovery is comprised of 2 basic steps:
1.
2.
Discovery policies are structurally the same as data loss prevention policies. Both are made up of rules, exceptions, content classifiers, and resources. Rather than specifying destination channels to scan such as FTP, SMTP, and printers, however, discovery tasks describe where and when to perform the discovery, including specific network and endpoint computers to scan.
On networks, you can perform file system, database, or email discovery.
File Discovery includes the ability to scan:
*
*
*
*
Database Discovery scans the organization's database servers and detects confidential information that is defined as policy breaches in tables.
Email Discovery includes the ability to scan:
*
*
Endpoint Discovery includes the exact devices to scan.
Discovery policies are different from data loss prevention policies in other subtle ways, as well. For example:
*
*

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Creating Discovery Policies
Copyright 2020 Forcepoint. All rights reserved.