Go to the previous page Go to the next page View or print as PDF
Indicators of Compromise
Predefined Policies and Classifiers | TRITON AP-DATA | Version 8.3.x
*
Policy for the detection of a suspected malicious content dissemination such as: encrypted or manipulated information, passwords files, credit card tracks, suspected applications and dubious content such as information about the network, software license keys, and database files. The rules for this policy are:
*
*
*
*
*
*
*
*
*
Policy for detection of data concealment applications. The rule for this policy is:
*

Go to the previous page Go to the next page View or print as PDF
Copyright 2016 Forcepoint LLC. All rights reserved.