DLP Policies

  • Protecting data on the move
  • Data protection in use
  • Control and protection of equipment
  • Classification and protection of documents

CLIPBOARD Policy

Unauthorized copying of data is one of the most common threats in organizations. CLIPBOARD ‘s policy allows monitoring the contents of the system clipboard, detecting copy attempts and blocking unwanted operations. The system provides logging of all actions, sending alerts and automatically triggering actions in case of security policy violations.

This gives the organization full control over the flow of information, minimizing the risk of data leakage and unauthorized transfer of content between applications.

Advanced control of clipboard operations

  • Monitor clipboard contents

    Record copied data and analyze user activity

  • Block unauthorized copying

    Restrict the transfer of sensitive information between applications

  • Breach alerts and notifications

    Immediate alerts when risky operations are detected

  • Event logging and activity analysis

    Create a history of clipboard operations for auditing and threat detection

Features

CLOUD STORAGE Policy

Storing data in the cloud carries the risk of uncontrolled information sharing and potential leaks. CLOUD STORAGE policies ensure that all data sent to the cloud is monitored, allowing you to identify risks, block unauthorized access, and tightly control the flow of information.

The system supports 20 different types of cloud services, analyzing user activity in real time and responding to suspicious activity. Built-in alerting and event logging mechanisms enable administrators to have full visibility and make quick decisions to secure corporate data. Cloud Policy works only for installed clients and does not support web browser-based sharing to the cloud.

Advanced control of cloud storage

  • Analyze uploaded files

    Identify types of data sent to the cloud and detect potentially sensitive information

  • Restrict access to selected cloud services

    Ability to define a list of allowed and blocked data storage platforms

  • Immediate responses to suspicious activity

    Automatically pause file transfers and trigger security if violations are detected

  • Detailed reports on user activity

    Collect data on interactions with cloud services for better control and auditing

Features

DEVICE Policy

This policy enables comprehensive management of access to different types of devices connected to the system, ensuring a high level of security by blocking and monitoring their activity at the hardware level. This allows the organization to effectively eliminate the risk of unauthorized access to sensitive data and prevent potential attacks using external media or communication devices. Advanced control mechanisms allow defining detailed access rules, enabling flexible privilege management for different users and groups. In addition, real-time monitoring provides full transparency into connected devices, allowing you to quickly respond to any unwanted activity or potential threats.

Advanced access control for devices

  • Data carriers

    CD-ROM, USB memory stick, external hard drives

  • Communication modules

    Wi-Fi, Bluetooth, NFC, network cards, modems

  • Input and peripheral devices

    Keyboards, mice, card readers, printers

  • System components

    Graphics cards, GPS, control devices

Features

E-MAIL Policy

The security of electronic communications is critical to protecting an organization’s data and resources. The E-MAIL policy ensures that messages sent are monitored, analyzing their content, attachments and recipients to prevent unauthorized sharing of information.

The system allows blocking the transfer of specific files, identifying risky content and detecting potential threats such as confidential data leakage, phishing or unwanted attachments. With alerting and automatic action-triggering features, administrators can quickly respond to incidents and implement protective measures. The policy only works for the email client installed on the computer.

Advanced monitoring of e-mail communications

  • Monitor content and attachments

    Analyze messages for potential threats and security policy violations

  • Blocking file uploads

    Restricting the ability to send attachments containing confidential information

  • Real-time alerts and notifications

    Automatic alerts for suspicious activity in your email system

  • Event logging and log analysis

    Creating a detailed history of emailing operations

Features

FILE MOVE COPY Policy

FILE MOVE COPY policy provides full control over file operations on the system. It allows you to monitor and block actions such as creating, opening, deleting, renaming and copying files, which increases data security and prevents unauthorized processing.

With this solution, the organization can effectively enforce information protection policies, detect suspicious activities, and minimize the risk of data leakage, file loss and confidentiality breaches.

Control of actions on files

  • Block unauthorized operations

    Ability to restrict copying, deleting or renaming of files

  • Monitoring activities on files

    Recording all file operations on the system

  • Protection against data loss and leakage

    Protection of files from unauthorized access and modification

Features

FINGERPRINT Policy

The FINGERPRINT policy provides advanced mechanisms for classifying documents, enabling them to be marked with an invisible marker (fingerprint). This allows the organization to effectively track and identify documents at various stages of processing, enhancing security and control over the flow of information.

The system supports real-time classification, analyzing documents in use, and allows scanning of files stored in shared resources (documents at rest). Popular formats such as DOCX, XLSX, TXT and PDF are supported, ensuring broad compatibility with the office systems in use.

Advanced document protection

  • Invisible document marking

    Identification and tracking of files through unique fingerprint

  • Real-time classification

    Automatic marking and analysis of documents as they are edited and uploaded

  • Scanning documents at rest

    Analysis of files located on network resources and shared drives

Features

PRINTSCREEN Policy

Protecting sensitive data from unauthorized sharing requires control over the screenshot function. PRINTSCREEN ‘s policy allows you to monitor every attempt to take a screenshot, and block it from being saved and further used.

This allows the organization to effectively prevent information leaks, protecting both the data displayed on the screen and the content available to sensitive users. The system allows you to record attempts to take snapshots and take immediate action in the event of a policy violation.

Monitoring screenshots

  • Block saving and sharing screenshots

    Prevent screenshots from being used for unauthorized purposes

  • Breach notifications and alerts

    Immediate response to suspicious user activities

  • Event history and activity analysis

    Creation of logs regarding attempts to take screenshots

Features

Policy PROCESS

Modern IT systems require effective control over running processes to ensure data protection and eliminate threats. PROCESS policy enables monitoring of running applications, blocking unwanted processes and generating alerts and event logs. This gives administrators full control over system activity and allows them to react quickly to potential threats.

Advanced action triggers allow automatic decision-making when suspicious activity is detected, minimizing the risk of running unauthorized or malicious applications.

Full control over system processes

  • Block unauthorized processes

    Automatically stop applications that do not comply with security policies

  • Instant alerts and notifications

    Inform administrators when suspicious activity is detected

  • Event logging and detailed log analysis

    Creation of process history for better detection of incidents and threats

Features

Want to effectively block unwanted processes in your company? Check out how to do it with eAuditor!

REMOVABLE DEVICE Policy

The REMOVABLE DEVICE policy provides full control over access to mobile devices such as USB drives and other removable media. It allows blocking unauthorized devices, creating lists of blocked media and monitoring their activity. This allows an organization to minimize the risk of data leakage, malware infections and uncontrolled file transfers.

Thanks to advanced management mechanisms, it is possible to configure access policies individually, tailored to users’ needs and security requirements. The system records every device connection and enables immediate response to potential threats.

Access control for mobile devices

  • Locking USB devices

    Restrict access to unauthorized storage media

  • List of blocked devices

    Defining devices that cannot be used in the system

  • Monitoring of connected devices

    Logging of connection attempts and analysis of user actions

Features

SCHEDULED TAGGING Policy

The SCHEDULED TAGGING policy enables automatic scanning and classification of documents stored in shared resources according to a set schedule. This allows the organization to regularly monitor documents at rest, identify sensitive data and enforce information security policies.

The system allows scanning to be scheduled at specific time intervals, minimizing the impact on IT infrastructure performance and providing up-to-date information on file contents. The classification process can include marking documents, detecting specific patterns and assigning appropriate security categories.

Automatic classification of documents

  • Scanning documents on a scheduled basis

    Regular analysis of files stored in shared repositories

  • File identification and tagging

    Automatic classification of documents at rest

  • Minimal impact on system performance

    Ability to schedule scans during off-peak hours

Features

POLICY SOFTWARE SCHEMES

Managing applications in an organization requires precise control over what software is installed and used by users. The SOFTWARE SCHEMES policy allows you to define sets of applications that are recommended, allowed and prohibited, and then assign them to specific users or groups.

This allows administrators to not only monitor IT policy compliance, but also to automatically take action, such as uninstalling prohibited software or forcing the installation of required applications.

Software policy management

  • Create application schemas

    Define sets of recommended, allowed and prohibited software

  • Automatic assignment to users

    Possibility to apply different policies according to position, department or group of users

  • Block and remove unauthorized software

    Automatically detect and uninstall applications that do not comply with the organization’s policies

  • Enforcing the installation of key software

    Ensuring that users are using the necessary tools according to company requirements

Features

Protect your business from unwanted applications – check how eAuditor will help you block them.

SCREEN MONITORING Policy.

Surveillance of user activity is key to ensuring data security and compliance with organizational policies. The SCREEN MONITORING policy allows the automatic capture of screenshots from users’ computers, both at the administrator’s request and in response to specific user actions. The system also allows the user to set time intervals at which snapshots are taken, ensuring continuous monitoring of work on a given device.

This solution allows effective detection of potential security policy violations, unauthorized data processing and monitoring of user activities in critical applications and systems.

Advanced user screen monitoring

  • Automatically take screenshots

    Can be set to capture images at specific time intervals

  • Automatic notifications when time is exceeded

    Informing the user when the maximum operating time is reached

  • Enforcement of organizational policies

    Ability to automatically log off or block access when the limit is exceeded

  • Flexible limit configuration

    Defining different working times for users, groups or specific devices

Features

SPLASH SCREEN Policy.

Effective communication with users is crucial in an organizational environment. The SPLASH SCREEN policy allows automatic messages to be displayed on the user’s screen right after login. This can be information about activity monitoring, system updates, security procedures or important service messages.

With this solution, administrators can provide better control over the transmission of important messages, eliminating the risk of users overlooking them.

Advanced screen management

  • Automatic message display

    Immediate presentation of information after logging into the system

  • Customize content to meet the needs of the organization

    Ability to define different messages for users or groups

  • Confidence that the information has reached the user

    Required confirmation of reading before moving on

  • Flexible configuration options

    Ability to specify frequency and conditions for displaying messages

Features

USB ENCRYPTION Policy

Security of data carried on USB flash drives is key to protecting organizational assets. The USB ENCRYPTION policy enforces automatic encryption or decryption of USB devices using Microsoft BitLocker technology, providing an additional layer of security.

Administrators can define groups of USB devices to be covered by the encryption policy, eliminating the risk of storing unencrypted data on portable media. The default security method is a password, the complexity of which is determined by local Windows security policies.

Control and management of USB encryption

  • Automatically enforce encryption

    Any detected USB device from the assigned group must be encrypted before use

  • Defining USB device groups

    Determining which removable drives are subject to forced encryption

  • Secure storage of recovery keys

    Keys are encrypted and stored in the eAuditor system database

Features

Secure your company’s data today! Learn how to effectively block unauthorized USB devices and manage access in eAuditor.

WEB Policy

WEB Policy provides comprehensive management of access to Internet resources, enabling effective blocking of undesirable sites and control of users’ online activities. With advanced filtering mechanisms and the support of BTC Web Classification artificial intelligence, the system can dynamically classify websites, identify threats and automatically enforce access policies.

The solution allows precise definition of rules covering both entire categories of sites (e.g. social networks, blogs, discussion forums) and specific domains. It can also detect and block sites with dangerous content, such as gambling, pornography, phishing or sites without encryption.

Controlling access to online resources

  • Blocking access to sites

    Ability to restrict access to selected sites and content categories

  • AI-based content filtering

    Artificial intelligence classifies websites in real time

  • Access policy management

    Individual rules for users, groups and devices

Features

Full control over web access! Secure your work environment and eliminate hazards

WLAN policy

It enables effective management of access to wireless networks, providing full control over network traffic. This allows an organization to limit the possibility of connecting to unauthorized Wi-Fi networks, whether open or secured. The system allows blocking access based on network type and address masks, increasing security and minimizing the risk of attacks using untrusted access points.

The use of precise access rules eliminates the risks of unauthorized access, traffic eavesdropping and the possibility of data leakage through unsecured wireless connections.

Wireless access control

  • Blocking connections to Wi-Fi networks

    Restrict access to open and secured wireless networks

  • Filtering by type and mask

    Ability to define blocking rules based on specific network parameters

  • Access policy managementManage access policies

    Personalized policies for users and devices

Features

WORKING TIME Policy.

Controlling user computer time is an important part of managing IT resources and ensuring compliance with organizational policies. The WORKING TIME policy allows you to monitor the length of a user’s session, send notifications when the set limit is exceeded , and take certain administrative actions, such as automatically logging off, closing applications or restricting access.

With this solution, the organization can effectively manage user time, reduce overuse of IT resources, and improve digital hygiene by minimizing the risk of overloading systems and working outside of set hours.

Computer time management

  • Monitor activity time

    Record the length of user sessions and overruns of the set limit

  • Automatic notifications when time is exceeded

    Informing the user when the maximum operating time is reached

  • Enforcement of organizational policies

    Ability to automatically log off or block access when the limit is exceeded

  • Flexible limit configuration

    Defining different working times for users, groups or specific devices

Features