On the Add Policy: Step 3:
Conditions screen, select or import one or more templates
for the policy condition. The policy is activated if these conditions
are met.
Select Enable data-stealing malware detection to
detect unmonitored transmissions of sensitive data, including:
Keyloggers, spyware, and trojans that collect
and post sensitive data on the Internet
Phone-home malware (DSM)
Hidden FTP processes that transfer stolen data to remote
hacker sites