DLP Policies
- Protecting data on the move
- Data protection in use
- Control and protection of equipment
- Classification and protection of documents
Table of contents
- CLIPBOARD Policy
- CLOUD STORAGE Policy
- DEVICE Policy
- E-MAIL Policy
- FILE MOVE COPY Policy
- FINGERPRINT Policy
- PRINTSCREEN Policy
- Policy PROCESS
- REMOVABLE DEVICE Policy
- SCHEDULED TAGGING Policy
- POLICY SOFTWARE SCHEMES
- SCREEN MONITORING Policy.
- SPLASH SCREEN Policy.
- USB ENCRYPTION Policy
- WEB Policy
- WLAN policy
- WORKING TIME Policy.
CLIPBOARD Policy
Unauthorized copying of data is one of the most common threats in organizations. CLIPBOARD ‘s policy allows monitoring the contents of the system clipboard, detecting copy attempts and blocking unwanted operations. The system provides logging of all actions, sending alerts and automatically triggering actions in case of security policy violations.
This gives the organization full control over the flow of information, minimizing the risk of data leakage and unauthorized transfer of content between applications.
Advanced control of clipboard operations
Features
CLOUD STORAGE Policy
Storing data in the cloud carries the risk of uncontrolled information sharing and potential leaks. CLOUD STORAGE policies ensure that all data sent to the cloud is monitored, allowing you to identify risks, block unauthorized access, and tightly control the flow of information.
The system supports 20 different types of cloud services, analyzing user activity in real time and responding to suspicious activity. Built-in alerting and event logging mechanisms enable administrators to have full visibility and make quick decisions to secure corporate data. Cloud Policy works only for installed clients and does not support web browser-based sharing to the cloud.
Advanced control of cloud storage
Features
DEVICE Policy
This policy enables comprehensive management of access to different types of devices connected to the system, ensuring a high level of security by blocking and monitoring their activity at the hardware level. This allows the organization to effectively eliminate the risk of unauthorized access to sensitive data and prevent potential attacks using external media or communication devices. Advanced control mechanisms allow defining detailed access rules, enabling flexible privilege management for different users and groups. In addition, real-time monitoring provides full transparency into connected devices, allowing you to quickly respond to any unwanted activity or potential threats.
Advanced access control for devices
Features
E-MAIL Policy
The security of electronic communications is critical to protecting an organization’s data and resources. The E-MAIL policy ensures that messages sent are monitored, analyzing their content, attachments and recipients to prevent unauthorized sharing of information.
The system allows blocking the transfer of specific files, identifying risky content and detecting potential threats such as confidential data leakage, phishing or unwanted attachments. With alerting and automatic action-triggering features, administrators can quickly respond to incidents and implement protective measures. The policy only works for the email client installed on the computer.
Advanced monitoring of e-mail communications
Features
FILE MOVE COPY Policy
FILE MOVE COPY policy provides full control over file operations on the system. It allows you to monitor and block actions such as creating, opening, deleting, renaming and copying files, which increases data security and prevents unauthorized processing.
With this solution, the organization can effectively enforce information protection policies, detect suspicious activities, and minimize the risk of data leakage, file loss and confidentiality breaches.
Control of actions on files
Features
FINGERPRINT Policy
The FINGERPRINT policy provides advanced mechanisms for classifying documents, enabling them to be marked with an invisible marker (fingerprint). This allows the organization to effectively track and identify documents at various stages of processing, enhancing security and control over the flow of information.
The system supports real-time classification, analyzing documents in use, and allows scanning of files stored in shared resources (documents at rest). Popular formats such as DOCX, XLSX, TXT and PDF are supported, ensuring broad compatibility with the office systems in use.
Advanced document protection
Features
PRINTSCREEN Policy
Protecting sensitive data from unauthorized sharing requires control over the screenshot function. PRINTSCREEN ‘s policy allows you to monitor every attempt to take a screenshot, and block it from being saved and further used.
This allows the organization to effectively prevent information leaks, protecting both the data displayed on the screen and the content available to sensitive users. The system allows you to record attempts to take snapshots and take immediate action in the event of a policy violation.
Monitoring screenshots
Features
Policy PROCESS
Modern IT systems require effective control over running processes to ensure data protection and eliminate threats. PROCESS policy enables monitoring of running applications, blocking unwanted processes and generating alerts and event logs. This gives administrators full control over system activity and allows them to react quickly to potential threats.
Advanced action triggers allow automatic decision-making when suspicious activity is detected, minimizing the risk of running unauthorized or malicious applications.
Full control over system processes
Features
Want to effectively block unwanted processes in your company? Check out how to do it with eAuditor!
REMOVABLE DEVICE Policy
The REMOVABLE DEVICE policy provides full control over access to mobile devices such as USB drives and other removable media. It allows blocking unauthorized devices, creating lists of blocked media and monitoring their activity. This allows an organization to minimize the risk of data leakage, malware infections and uncontrolled file transfers.
Thanks to advanced management mechanisms, it is possible to configure access policies individually, tailored to users’ needs and security requirements. The system records every device connection and enables immediate response to potential threats.
Access control for mobile devices
Features
SCHEDULED TAGGING Policy
The SCHEDULED TAGGING policy enables automatic scanning and classification of documents stored in shared resources according to a set schedule. This allows the organization to regularly monitor documents at rest, identify sensitive data and enforce information security policies.
The system allows scanning to be scheduled at specific time intervals, minimizing the impact on IT infrastructure performance and providing up-to-date information on file contents. The classification process can include marking documents, detecting specific patterns and assigning appropriate security categories.
Automatic classification of documents
Features
POLICY SOFTWARE SCHEMES
Managing applications in an organization requires precise control over what software is installed and used by users. The SOFTWARE SCHEMES policy allows you to define sets of applications that are recommended, allowed and prohibited, and then assign them to specific users or groups.
This allows administrators to not only monitor IT policy compliance, but also to automatically take action, such as uninstalling prohibited software or forcing the installation of required applications.
Software policy management
Features
Protect your business from unwanted applications – check how eAuditor will help you block them.
SCREEN MONITORING Policy.
Surveillance of user activity is key to ensuring data security and compliance with organizational policies. The SCREEN MONITORING policy allows the automatic capture of screenshots from users’ computers, both at the administrator’s request and in response to specific user actions. The system also allows the user to set time intervals at which snapshots are taken, ensuring continuous monitoring of work on a given device.
This solution allows effective detection of potential security policy violations, unauthorized data processing and monitoring of user activities in critical applications and systems.
Advanced user screen monitoring
Features
SPLASH SCREEN Policy.
Effective communication with users is crucial in an organizational environment. The SPLASH SCREEN policy allows automatic messages to be displayed on the user’s screen right after login. This can be information about activity monitoring, system updates, security procedures or important service messages.
With this solution, administrators can provide better control over the transmission of important messages, eliminating the risk of users overlooking them.
Advanced screen management
Features
USB ENCRYPTION Policy
Security of data carried on USB flash drives is key to protecting organizational assets. The USB ENCRYPTION policy enforces automatic encryption or decryption of USB devices using Microsoft BitLocker technology, providing an additional layer of security.
Administrators can define groups of USB devices to be covered by the encryption policy, eliminating the risk of storing unencrypted data on portable media. The default security method is a password, the complexity of which is determined by local Windows security policies.
Control and management of USB encryption
Features
Secure your company’s data today! Learn how to effectively block unauthorized USB devices and manage access in eAuditor.
WEB Policy
WEB Policy provides comprehensive management of access to Internet resources, enabling effective blocking of undesirable sites and control of users’ online activities. With advanced filtering mechanisms and the support of BTC Web Classification artificial intelligence, the system can dynamically classify websites, identify threats and automatically enforce access policies.
The solution allows precise definition of rules covering both entire categories of sites (e.g. social networks, blogs, discussion forums) and specific domains. It can also detect and block sites with dangerous content, such as gambling, pornography, phishing or sites without encryption.
Controlling access to online resources
Features
Full control over web access! Secure your work environment and eliminate hazards
WLAN policy
It enables effective management of access to wireless networks, providing full control over network traffic. This allows an organization to limit the possibility of connecting to unauthorized Wi-Fi networks, whether open or secured. The system allows blocking access based on network type and address masks, increasing security and minimizing the risk of attacks using untrusted access points.
The use of precise access rules eliminates the risks of unauthorized access, traffic eavesdropping and the possibility of data leakage through unsecured wireless connections.
Wireless access control
Features
WORKING TIME Policy.
Controlling user computer time is an important part of managing IT resources and ensuring compliance with organizational policies. The WORKING TIME policy allows you to monitor the length of a user’s session, send notifications when the set limit is exceeded , and take certain administrative actions, such as automatically logging off, closing applications or restricting access.
With this solution, the organization can effectively manage user time, reduce overuse of IT resources, and improve digital hygiene by minimizing the risk of overloading systems and working outside of set hours.