Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Indicators of Compromise
Predefined Policies and Classifiers | Forcepoint DLP | 8.7.1
*
Policy for detecting .REG files (Windows Registry files). The rule for this policy is:
*
*
Policy for detecting records of SQL table data extracted from a database. The rules for this policy are:
*
*
*
*
Policy for detection of encrypted PGP files, password-protected files of known formats, like Microsoft Word and ZIP, and unknown encrypted files. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Searches for outbound password files, such as SAM database and UNIX/Linux password files. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
Policy for detecting private keys or file formats that contain them. The rule for this policy is:
*
*
*
*
*
*
*
*
*
*
*
*
Identifies traffic that is thought to be malware "phoning home" or attempting to steal information. Detection is based on the analysis of traffic patterns from known infected machines. Applies only when Forcepoint Web Security is installed. Rules in this policy include:
*
*
*
Policy for the detection of a suspected malicious content dissemination such as: encrypted or manipulated information, passwords files, credit card tracks, suspected applications and dubious content such as information about the network, software license keys, and database files. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Copyright 2020 Forcepoint. All rights reserved.