|
User directory entries are users or groups that may be a source or destination of sensitive data. These entries are imported from your user directory.
|
|
Custom user directory groups are derived from custom LDAP queries, and may also send or receive sensitive data.
|
|
Custom users are not included in the user directory, but may be a source or destination of sensitive data.
|
|
Custom computers are not included in the user directory, but may be a source or destination of sensitive data.
|
|
Networks may be a source or destination of sensitive data.
|
|
Business Units may be a source or destination of sensitive data.
|
|
Domains may be a source or destination of sensitive data.
|
|
URL categories may be a source or destination of sensitive data.
|
1.
|
Click the Add button at the top of the page.
|
1.
|
Click the name of the application in the Application Name column.
|
2.
|
Add or edit information as needed, and then click OK. The changes are applied.
|
In DLP Cloud Proxy Status column
|
|
|||
|
Endpoint Devices may be the source or destination of sensitive data.
|
|
Endpoint Applications may be a source or destination of sensitive data on endpoint machines.
|
|
Endpoint Application Groups may be a source or destination of sensitive data on endpoint machines.
|
|
Endpoint Printers may be a source or destination of sensitive data.
|
Note that Networks is not an available source for endpoint channels, even if they are defined in the system as a resource. This is not a bug.
|
|
Action Plans define the action to take when a breach is discovered.
|
|
Remediation scripts define the external script to run when a breach is discovered. (Not available with all subscriptions.)
|
|
Notifications can be sent to a specific person or email alias when a breach is discovered.
|