Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Top sources and destinations
Administrator Help | TRITON AP-DATA | Version 8.3.x
These tables list the sources or destinations (users, addresses, email messages) that most frequently violated policies, causing the incidents listed here. These are the users whose transactions were most frequently blocked or quarantined by TRITON AP-DATA due to breach of policy or those who were most frequently meant to receive unauthorized information.
1.
Select Main > Reporting > Data Loss Prevention.
2.
3.
Click Run to generate the report.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Copyright 2016 Forcepoint LLC. All rights reserved.