12.07.2015 Views

McAfee Data Loss Prevention 9.2.2 Product Guide

McAfee Data Loss Prevention 9.2.2 Product Guide

McAfee Data Loss Prevention 9.2.2 Product Guide

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

10Managing action rulesAction rules work by applying actions when rules generate incidents. Actions might be preventive,corrective, or protective, and the actions available depend on whether <strong>McAfee</strong> DLP Prevent or a proxyserver is used to implement them.When a rule produces an incident, use of an action rule can resolve problems in network traffic, triggera remedial action in data repositories, or react to an action that has been taken at a network endpoint.Differences between action and protection rules<strong>McAfee</strong> DLP Endpoint protection rules are pre‐configured with reactions to events that occur atendpoints. Because the design of endpoint and network <strong>McAfee</strong> DLP products differs, action andprotection rules work in different ways.• <strong>McAfee</strong> DLP network products allow action rules to have multiple actions that are attached to manydifferent rules. Each of those rules can deploy the action once to network traffic, a repository, orendpoints.• The <strong>McAfee</strong> DLP Endpoint product uses protection rules to apply reactions to many differentendpoints that might be online (on‐site) or offline (in contact with a domain controller) when aviolation occurs.How action rules work in different <strong>McAfee</strong> DLP productsPreventive, corrective, or protective actions are applied depending on whether they are used in<strong>Data</strong>‐in‐Motion, <strong>Data</strong>‐at‐Rest, or <strong>Data</strong>‐in‐Use.• If preventive action is to be taken, action rules are applied to <strong>Data</strong>‐in‐Motion, which monitors emailand webmail in network traffic. This feature requires configuration of an MTA (Mail TransportServer) or proxy server with <strong>McAfee</strong> DLP Prevent, which must be registered to <strong>McAfee</strong> DLPManager.• If corrective action is to be taken, action rules are applied to <strong>Data</strong>‐at‐Rest, which identifies data at riskin network repositories. This feature requires <strong>McAfee</strong> DLP Discover, which must be registered to<strong>McAfee</strong> DLP Manager.• If protective action is to be taken, action rules are applied to <strong>Data</strong>‐in‐Use, which identifies problemsat endpoints. This feature requires <strong>McAfee</strong> DLP Endpoint, which must be registered to <strong>McAfee</strong> DLPManager.If <strong>McAfee</strong> DLP Monitor and <strong>McAfee</strong> DLP Discover devices are both managed by <strong>McAfee</strong> DLP Manager,every rule can be configured to deploy one action of each of the three incident types.ContentsHow <strong>McAfee</strong> DLP Prevent uses action rulesHow <strong>McAfee</strong> DLP Endpoint uses action rulesHow <strong>McAfee</strong> DLP Discover uses action rulesAdd, modify, or delete action rules<strong>McAfee</strong> <strong>Data</strong> <strong>Loss</strong> <strong>Prevention</strong> <strong>9.2.2</strong> <strong>Product</strong> <strong>Guide</strong> 221

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!