12.07.2015 Views

McAfee Data Loss Prevention 9.2.2 Product Guide

McAfee Data Loss Prevention 9.2.2 Product Guide

McAfee Data Loss Prevention 9.2.2 Product Guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

10Managing action rulesHow <strong>McAfee</strong> DLP Prevent uses action rulesHow <strong>McAfee</strong> DLP Prevent uses action rulesDepending on whether <strong>McAfee</strong> DLP Prevent is configured with an MTA (Mail Transport Agent) or aproxy server, <strong>McAfee</strong> DLP Prevent can take up to eight different actions when a significant incident isdetected.<strong>McAfee</strong> DLP Prevent might use action rules to perform any of the following actions:• Allow email that is determined to be legitimate.• Block confidential data breaches.• Bounce email that violates policies.• Encrypt authorized transmissions.• Monitor traffic and record incidents in a system log.• Notify supervisory personnel of a violation.• Quarantine suspicious traffic.• Redirect messages that violate policy.<strong>McAfee</strong> DLP Prevent can also capture network traffic for later forensic analysis, and block thetransmission of sensitive data sent using specific protocols (for example, HTTP, SMTP, HTTP POST,etc.).How <strong>McAfee</strong> DLP Endpoint uses action rulesDepending on what protection rules <strong>McAfee</strong> DLP Endpoint is configured to deploy, up to nine differentonline and offline actions can be applied when a significant event is detected.<strong>McAfee</strong> DLP Endpoint might use action rules to perform any of the following actions:• Block confidential data breaches. • Quarantine reported events.• Delete email that violates policies. • Request justification for blocked actions.• Encrypt authorized transmissions. • Tag files.• Monitor events. • Store evidence of violations.• Notify users of violations.Online and Offline optionsFor each reaction provided by a protection rule, you must select an Online, Offline status, or both.These terms refer to where a computer is located in relation to the internal network, so they might beconsidered "on‐site" or "off‐site".Specifically, online/offline status is determined by whether or not the ePolicy Orchestrator IP addresscan be resolved with a DNS query. In other words, a user who is offline is not in contact with anetwork domain controller.222 <strong>McAfee</strong> <strong>Data</strong> <strong>Loss</strong> <strong>Prevention</strong> <strong>9.2.2</strong> <strong>Product</strong> <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!