Technical Library
|
Support
Defining Resources
Defining Resources
Administrator Help | TRITON AP-DATA | Version 8.3.x
Related topics:
User directory entries
Custom user directory groups
Custom users
Custom computers
Networks
Domains
URL categories
Business Units
Endpoint Devices
Endpoint Applications
Endpoint Application Groups
Endpoint Printers
Remediation scripts
Action Plans
Notifications
In your policy, you can define the sources of and destinations for the data you want to protect. Depending on your subscription, you can also define the endpoint device or application that may be used, and the remediation action to take when a violation is discovered (such as block or notify). In TRITON AP-DATA, these are known as
resources
.
Important
You do not have to define resources unless you want to tailor your policies for a small group. If you do not define resources, your policies and rules apply to all users, computers, networks, devices, etc. in your organization.
To define resources, click
Main > Policy Management > Resources
.
Resource
Description
Sources and Destinations
User directory entries
Users or groups that may be a source or destination of sensitive data. These entries are imported from your user directory.
Custom user directory groups
Groups who may send or receive sensitive data besides the standard groups in your user directory. These groups are derived from custom LDAP queries.
Custom users
Users not in your user directory who may be a source or destination of sensitive data.
Custom computers
Computers not in your user directory that may be a source or destination of sensitive data.
Networks
Networks that may be a source or destination of sensitive data.
Business Units
Business units that may be a source or destination of sensitive data.
Domains
Domains that may be a source or destination of sensitive data.
URL categories
URL categories that may be a source or destination of sensitive data.
Endpoint Devices
*
Endpoint devices that may be the source or destination of sensitive data.
Endpoint Applications
*
Applications that may be a source or destination of your sensitive data on endpoint machines.
Endpoint Application Groups
*
Application groups that may be a source or destination of sensitive data on endpoint machines.
Endpoint Printers
*
Printers that may be a source or destination of sensitive data.
Remediation
Action Plans
The action to take when a breach is discovered.
Remediation scripts
*
The external script to run when a breach is discovered.
Notifications
The notification message to send when a breach is discovered, the person to send it to, and the format.
*Not included with TRITON AP-WEB. Requires a TRITON AP-ENDPOINT DLP subscription.
Defining Resources
Copyright 2016 Forcepoint LLC. All rights reserved.