Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Configuring attributes
Administrator Help | TRITON AP-DATA | Version 8.3.x
Select one or more email attributes to include in the policy. For each, highlight the attribute and click Enabled in the right pane. Define properties in the right pane as well.
When the system detects a match for an attribute, it triggers the policy.
If you want to send notifications when there is a violation of a particular attribute setting, select the Send Notification check box. You can configure who receives the notifications by clicking the name of the notification, "Mobile policy violation." Click this option to define the mail server, email subject, and message body, as well as other required properties.
By default, policy owners receive notifications.
For each attribute, indicate how severe a breach would be (low, medium, or high severity), and what action should be taken if a breach is detected. The default severity levels and available actions are shown below for each attribute. Actions are described in Adding a new action plan.
 
Available actions: quarantine (default), permit.
*
Wide is highly sensitive and errs on the restrictive side. To avoid leaking sensitive data, it is more likely to produce a false positive (unintended match) than a false negative (content that is not detected).
*
Default balances the number of false positives and false negatives.
*
Narrow is the least restrictive. It is more likely to let content through than to produce an unintended match.
Available actions: quarantine (default), permit.
For example, add the file named confidential.docx. When that file is attached to an email message, the system detects it and either permits or quarantines the message.
Available actions: quarantine (default), permit
Click Add to specify the types of files that should be monitored when attached to an email message, for example Microsoft Excel files.
Available actions: quarantine (default), permit.
Click Add to define key phrases or regular expression (RegEx) patterns that should be monitored. RegEx patterns are used to identify alphanumeric strings of a certain format.
Available actions: quarantine (default), permit.
You cannot add or delete terms from predefined dictionaries, but you can exclude them from detection if you are getting unintended matches. Select Main > Content Classifiers > Patterns & Phrases, select the dictionary to edit, then enter the phrases to exclude.
Available actions: quarantine (default), permit.
Available actions: quarantine (default), permit.
Enable trusted users
Trusted users are those who you feel you don't need to monitor. Trusted users do not get analyzed by the system.
If you have users that you do not want enforced:
1.
Select Enable trusted users.
2.
Click Edit.
3.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Copyright 2016 Forcepoint LLC. All rights reserved.