Cisco Cisco Email Security Appliance C160 Guía Del Usuario
11-9
Cisco IronPort AsyncOS 7.5 for Email Configuration Guide
OL-25136-01
Chapter 11 Data Loss Prevention
shows the categories of DLP policy templates available.
Figure 11-3
Add DLP Policy From Templates
DLP policy templates are organized into the following categories:
•
Regulatory Compliance. Identifies messages and attachments that contain
personally identifiable information, credit information, or other protected or
non-public information.
personally identifiable information, credit information, or other protected or
non-public information.
•
US State Regulatory Compliance. Identifies messages and attachments that
contain personally identifiable information, credit information, or other
information protected by US state laws.
contain personally identifiable information, credit information, or other
information protected by US state laws.
•
Acceptable Use. Identifies messages sent to competitors or restricted
recipients that contain sensitive information about an organization.
recipients that contain sensitive information about an organization.
•
Privacy Protection. Identifies messages and attachments that contain
identification numbers for financial accounts, tax records, or national IDs.
identification numbers for financial accounts, tax records, or national IDs.
•
Intellectual Property Protection. Identifies popular publishing and design
document file types that may contain intellectual property that an
organization would want to protect.
document file types that may contain intellectual property that an
organization would want to protect.
•
Company Confidential. Identifies documents and messages that contain
information about corporate accounting information and upcoming mergers
and acquisitions.
information about corporate accounting information and upcoming mergers
and acquisitions.
•
Custom Policy. AsyncOS also provides the option to create your own policy
from scratch using classifiers developed by RSA or your organization. This
option is considered advanced and should be used only in the rare cases when
the predefined policy templates do not meet the unique requirements of your
network environment. See
from scratch using classifiers developed by RSA or your organization. This
option is considered advanced and should be used only in the rare cases when
the predefined policy templates do not meet the unique requirements of your
network environment. See
for more information.
For information on DLP policy templates that require customization, see