Before monitoring sensitive data for potential loss, determine the following:
Which data needs protection from unauthorized users
Where the data resides
Where and how the data is transmitted
Which users are authorized to access or transmit this information
This important audit typically requires input from multiple departments and personnel familiar with the sensitive information in your organization. The procedures below assume that you have identified the sensitive information and have established security policies regarding handling of confidential business information.
The Data Loss Prevention feature comprises three basic parts:
Rules (patterns to search for)
Domains to exclude from filtering
Approved Senders (email accounts to exclude from filtering)
For details, see Managing Data Loss Prevention Rules.