27.11.2012 Views

IronPort - Configuration Guide - AsyncOS 7.6.1

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 11 Data Loss Prevention<br />

Customizing the DLP Policies<br />

Step 2: Reports<br />

OL-25136-01<br />

California SB-1386 detects documents and transmissions that contain personally identifiable<br />

information (PII) as regulated by California SB-1386 (Civil Code 1798), such as US Social Security<br />

numbers, credit card numbers, and US drivers license numbers. Any business that operates in<br />

California and owns or licenses computerized PII data for California residents, regardless of their<br />

physical location, is required to comply.<br />

Restricted Files detects emails that contain restricted files, including .mdb, .exe, .bat and Oracle<br />

executable files (.fmx, .frm). This policy can be customized to add additional file attributes to the<br />

policy violation rules.<br />

You can create other types of DLP policies using the DLP Policy Manager.<br />

Some DLP policies use content matching classifiers that can be customized to detect sensitive<br />

information in outgoing messages. The customized classifiers for the FERPA and GLB, policies use a<br />

regular expression to search for identification number patterns in outgoing messages. If you select the<br />

Restricted Files policy, you can choose the attachment file types you want the DLP policy to detect. The<br />

Restricted Files policy detects .exe and .mdb files by default, but you can remove these file types. You<br />

can also configure the Restricted Files policy to apply only to encrypted or password-protected files.<br />

For more information on customizing the content matching classifiers for these DLP policies, see<br />

Customizing Classifiers for DLP Policies, page 11-14.<br />

Click Next to continue.<br />

Figure 11-7 DLP Assessment Wizard: Step 1. Policies<br />

Enter an email address for the scheduled DLP Incident Summary report. Use commas to separate<br />

multiple addresses. If you leave this value blank, the scheduled report is not created. For more<br />

information on DLP Incident Summary reports, see the “Using Email Security Monitor” chapter in the<br />

Cisco <strong>IronPort</strong> <strong>AsyncOS</strong> for Email Daily Management <strong>Guide</strong>.<br />

Click Next to continue.<br />

Cisco <strong>IronPort</strong> <strong>AsyncOS</strong> 7.6 for Email <strong>Configuration</strong> <strong>Guide</strong><br />

11-19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!