Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Forcepoint DLP Predefined Policies and Classifiers > Discovery policies > Company Confidential and Intellectual Property
Company Confidential and Intellectual Property
Predefined Policies and Classifiers | Forcepoint DLP | v8.4.x
*
Policy for detecting bids, proposals, and tenders, such as responses to request for proposal (RFP) and invitation for bids (IFB) documents.
*
*
*
*
Policy for detection of Call Detail Record (CDR) files. The rules for this policy are:
*
*
*
Policy for the detection of database files. The rules for this policy are:
*
*
*
Database File: dBase format
*
Database File: Filemaker format
*
Database File: Lotus Notes NSF format
*
Database File: MORE format
*
Database File: Microsoft Access format
*
*
Database File: Microsoft Works for DOS format
*
Database File: Microsoft Works for Mac format
*
Database File: Microsoft Works for Windows format
*
Database File: Paradox format
*
*
Policy for detection of files containing general, personal, and investment financial information.The rules for this policy are:
*
*
*
*
Policy for detection of source code for various hardware languages: SPICE and its flavors, VHDL and Verilog. This policy is comprised of several rules for each language, each covering a different aspect of the detected texts.
The rules for this policy are:
*
*
*
*
*
Policy for detection of serial (IMEI) numbers of cell phones. The International Mobile Equipment Identity (IMEI) is a number unique to every GSM and UMTS and iDEN mobile phone as well as some satellite phones. It is usually found printed on the phone underneath the battery.
The rules for this policy are:
*
*
Policy for detection of location coordinates. The rules for this policy are:
*
*
*
Policy for detection of movie and TV script files.
The rule for this policy is:
*
*
Policy for detection of network security documents and network diagrams. This policy detects Network diagrams by searching for IP addresses, MAC addresses and various terms common to such documents. In order to achieve complete coverage, first 2 rules and one of the MAC address rules must be selected.
The rules for this policy are:
*
*
*
*
Policy for detection of patents and patent applications
The rule for this policy is:
*
*
Detect leakage of sensitive data in the Oil and Gas industry and, in particular, information pertaining to oil prospecting and drilling.
The rules for this policy are:
*
*
*
*
*
*
Policy for detection of software design documents.
The rule for this policy is:
*
*
Policy for detection of computer source code. The rules for this policy are:
*
*
*
*
*
Policy for detection of documents of prime strategic value, such as business and marketing plans. The rule for this policy is:
*
*
Policy to identify Microsoft license keys. This helps mitigate software piracy and unauthorized usage of corporate assets. The rule for this policy is:
*

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Forcepoint DLP Predefined Policies and Classifiers > Discovery policies > Company Confidential and Intellectual Property
Copyright 2017 Forcepoint. All rights reserved.