
16
2 SINGLE, CENTRAL AUTOMATED CONSOLE REVIEWER’S GUIDE
There are two types of data control rule:
• file matching rule: specifies the action that is taken if the user attempts
to transfer a file with the specified file name or of the specified file type
(true file type category, e.g. a spreadsheet) to the specified destination, for
example, block the transfer of databases to removable storage devices
• content rule: contains one or more data definitions and specifies the action
that is taken if the user attempts to transfer data that matches all the
definitions in the rule to the specified destination.
To simplify policy creation, SophosLabs maintain a library of extensive library of
global sensitive data definitions (Content Control Lists) which covers personally
identifiable information (PII) such as credit card numbers, social security
numbers, postal addresses, or email addresses.
These definitions use a wide range of techniques to ensure accurate detection.
They are continually refined by SophosLabs and new definitions will be added
as part of the monthly endpoint data updates.
You can create your own lists specific to your organization such as customer
reference numbers or specific confidential document markers.
Figure 11: Data control – Content Control Lists
Figure 10: Data control – preconfigured policy rules
Komentarze do niniejszej Instrukcji