Preparatory Work

Before monitoring sensitive data for potential loss, determine the following:

  • Which data needs protection from unauthorized users

  • Where the data resides

  • Where and how the data is transmitted

  • Which users are authorized to access or transmit this information

This important audit typically requires input from multiple departments and personnel familiar with the sensitive information in your organization. The procedures below assume that you have identified the sensitive information and have established security policies regarding handling of confidential business information.

The Data Loss Prevention feature comprises three basic parts:

  • Rules (patterns to search for)

  • Domains to exclude from filtering

  • Approved Senders (email accounts to exclude from filtering)

For details, see Managing Data Loss Prevention Rules.