Go to the previous page Go to the next page View or print as PDF
Suspicious User Activity
Predefined Policies and Classifiers | TRITON AP-DATA | Version 8.3.x
*
Detects data that is sent at an unusual time. You define what is considered an unusual time in the script classifier, Unusual Hours. Each rule in this policy target a different type of data, such as Office or archive files.
Example: If you define working days in the classifier as Monday-Friday and unusual hours as 9pm-5am, then data sent on Saturday, Sunday, or during the working week between 9 p.m. and 5 a.m. triggers this policy.
*
*
*
*
*
*
Policy for the detection of database files. The rules for this policy are:
*
*
Database File: dBase format
*
Database File: Filemaker format
*
Database File: Lotus Notes NSF format
*
Database File: MORE format
*
Database File: Microsoft Access format
*
*
Database File: Microsoft Works for DOS format
*
Database File: Microsoft Works for Mac format
*
Database File: Microsoft Works for Windows format
*
Database File: Paradox format
*
*
Policy for detecting deep web URLs that appear in analyzed content such as textual documents or email messages and end with the pseudo-top-level domains .onion and .i2p. The deep web is a portion of World Wide Web content that is not indexed by standard search engines and that is intentionally hidden from the regular Internet, accessible only with special software, such as Tor. Such URLs are used for anonymous defamation, unauthorized leaks of sensitive information and copyright infringement, distribution of illegal sexual content, selling controlled substances, money laundering, bank fraud, credit card fraud and identity theft, among other things. The rules for this policy are:
*
*
*
*
A policy for detecting email messages that are being sent from one's corporate email address to his or her personal email address. The rules for this policy are:
*
*
*
*
Policy for detection of content suspected to be manipulated to avoid detection.This may cause false positives. The rules for this policy are:
*
*
*
*
*
*
*
*
Detects content suspected to be a password in clear text. The rules for this policy are:
*
*
*
*
Policy for detecting email messages that are being sent from one's corporate email address to his or her personal email address. The rule for this policy is also called:
*
*
*
*
*
*
*
*
*
*
Detects when unencrypted binary files of unknown formats are being sent repeatedly over a period of time. (Forcepoint-supported file types do not trigger this policy.)
For example: If 50 unencrypted files of an unknown format are sent during 1 hour, this policy is triggered. Thresholds are set in the Wide or Default rule."
*
*
*
*
*
Policy for detection of suspicious behavior of users by measuring the rate and type of transactions over time. This may cause false positives. The rules for this policy are:
*
*
*

Go to the previous page Go to the next page View or print as PDF
Copyright 2016 Forcepoint LLC. All rights reserved.