![]() |
![]() |
![]() |
![]() |
Configuring Endpoint Deployment > Selecting endpoint destination channels to monitor
|
1.
|
Select Main > Policy Management > DLP Policies.
|
2.
|
Click Manage Policies.
|
![]() |
Click a policy and select Add > Rule
|
4.
|
Go to the Destination section for the rule.
|
![]() |
Email - Select Endpoint Email to monitor outbound or internal email messages sent to the destinations you specify. By default this option covers all endpoint destinations. To select particular destinations, click Edit and select the destinations to watch.
|
For endpoint email to be analyzed, you must specify one or more internal email domains. Navigating to Settings > General > Endpoint and then click the Email Domains tab. If no domain is listed, endpoint email is not analyzed.
|
![]() |
Web - Select Endpoint HTTP/HTTPS from the Channels drop-down list to monitor endpoint devices such as laptops, and protect them from posting sensitive data to the Web. You can monitor traffic when endpoints are not connected to the network.
|
![]() |
Endpoint printing - Select this option to monitor data being sent from an endpoint machine to a local or network printer. The system supports drivers that print to a physical device, not those that print to file or PDF.
|
![]() |
Endpoint application - You can monitor or prevent sensitive data from being copied and pasted from an application such as Microsoft Word or a Web browser. This is desirable, because endpoint clients are often disconnected from the corporate network and can pose a security risk.
|
![]() |
Endpoint removable media - You can monitor or prevent sensitive data from being transferred to removable media. In the action plan, you define whether to block it, permit it, ask users to confirm their action, encrypt it with a profile key configured by administrators, or encrypt it with a password supplied by endpoint users. Here, define the devices to analyze.
|
![]() |
Endpoint LAN - Users commonly take their laptops home and then copy data through a LAN connection to a network drive or share on another computer. They also commonly take data from a shared folder (at work) to copy onto their laptop. With TRITON AP-DATA:
|
![]() |
![]() |
![]() |
![]() |
Configuring Endpoint Deployment > Selecting endpoint destination channels to monitor
|