Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Suspicious User Activity
Predefined Policies and Classifiers | Data Security Solutions | Version 7.8.x
*
Policy for the detection of database files. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Copyright 2016 Forcepoint LLC. All rights reserved.