Global Exception
|
Description
|
||
---|---|---|---|
Non-monitored Targets
|
Specify destinations outside your network
where an endpoint is permitted to send sensitive data. DLP will
not check sensitive data sent through this network service.
Define
each target by:
To
target specific channels, include the default or company-defined
port numbers for those channels. For example, port 21 is typically
for FTP traffic, port 80 for HTTP, and port 443 for HTTPS. Use a
colon to separate the target from the port numbers.
You can
also include port ranges. To include all ports, ignore the port
range.
Examples of targets with port numbers and port ranges:
For the subnet mask, DLP only
supports a classless inter-domain routing (CIDR) type port. That
means that you can only type a number like 24 instead of 255.255.255.0.
Separate
targets with commas.
|
||
Monitored Targets
|
Specify destinations inside your network
that do not have total clearance. DLP checks traffic but does not
block content unless you specify blocking as the policy action.
Define
each target by:
To
target specific channels, include the default or company-defined
port numbers for those channels. For example, port 21 is typically
for FTP traffic, port 80 for HTTP, and port 443 for HTTPS. Use a
colon to separate the target from the port numbers.
You can
also include port ranges. To include all ports, ignore the port
range.
Examples of targets with port numbers and port ranges:
For the subnet mask, DLP only
supports a classless inter-domain routing (CIDR) type port. That
means that you can only type a number like 24 instead of 255.255.255.0.
Separate
targets with commas.
|
||
Internal Email Domains
|
Type all internal email domains to help
DLP determine the email to monitor.
DLP checks the transmission
scope, which you need to configure when specifying actions for a
policy. DLP automatically monitors email traffic when:
Specify domains using any
of the following formats, separating multiple domains with commas:
|