Go to the table of contents Go to the previous page You are at the end of the document View or print as PDF
Data Theft
The cloud service includes the following data theft policies. The rules for these policies are:
*
Searches for outbound passwords in plain text.
*
*
*
*
Searches for outbound transactions comprising common encrypted file formats. The rule for this policy is:
*
*
Policy for detection of encrypted files of unknown format. The rule in this policy is:
*
*
Searches for suspicious outbound transactions, such as those containing information about the network, credit card magnetic tracks, and database files. Rules in this policy include:
*
*
*
*
Identifies traffic that is thought to be malware "phoning home" or attempting to steal information. Detection is based on the analysis of traffic patterns from known infected machines. Rules in this policy include:
*
*
*
Searches for outbound password files, such as a SAM database and UNIX / Linux passwords files. Rules in this policy include:
*
*
*
*
*
*
 

Go to the table of contents Go to the previous page You are at the end of the document View or print as PDF
Copyright 2024 Forcepoint. All rights reserved.