dlppolicy

Digital Asset Control Policies

OfficeScan evaluates a file or data against a set of rules defined in Digital Asset Control policies. Policies determine files or data that must be protected from unauthorized transmission and the action that OfficeScan performs when it detects transmission.

You can configure policies for internal and external clients. OfficeScan administrators typically configure a stricter policy for external clients.

Policies are granular settings in the OfficeScan client tree. You can enforce specific policies to client groups or individual clients. You can also enforce a single policy to all clients.

After you deploy the policies, clients use the location criteria you have set in the Computer Location screen (see Computer Location) to determine their location and the policy to apply. Clients switch policies each time the location changes.

Policy Configuration

Define Digital Asset Control policies by configuring the following settings:

Settings that Define a Digital Asset Control Policy

Settings

Description

Definitions

OfficeScan uses definitions to identify digital assets. Definitions include expressions, file attributes, and keywords.

Template

A digital asset template combines digital asset definitions and logical operators (And, Or, Except) to form condition statements. Only files or data that satisfy a certain condition statement will be subject to a Digital Asset Control policy.

OfficeScan comes with a set of predefined templates and allows you to create customized templates.

A Digital Asset Control policy can contain one or several templates. OfficeScan uses the first-match rule when checking templates. This means that if a file or data matches the definition on a template, OfficeScan will no longer check the other templates.

Channel

Channels are entities that transmit digital assets. OfficeScan supports popular transmission channels, such as email, removable storage devices, and instant messaging applications.

Action

OfficeScan performs one or several actions when it detects an attempt to transmit digital assets through any of the channels.

See also: