Cisco Cisco Email Security Appliance C190 Guía Del Usuario
11-19
Cisco IronPort AsyncOS 7.5 for Email Configuration Guide
OL-25136-01
Chapter 11 Data Loss Prevention
•
Payment Card Industry Data Security Standard (PCI-DSS) detects credit
card track data and credit cards.
card track data and credit cards.
•
HIPAA (Health Insurance Portability and Accountability Act) detects
HIPAA dictionaries and code sets, US Social Security numbers, US National
Provider Identifiers and may be customized to detect patient identification
numbers.
HIPAA dictionaries and code sets, US Social Security numbers, US National
Provider Identifiers and may be customized to detect patient identification
numbers.
•
FERPA (Family Educational Rights and Privacy Act) detects student
records and can be customized to detect student identification numbers.
records and can be customized to detect student identification numbers.
•
GLBA (Gramm-Leach Bliley Act) detects credit card numbers, US Social
Security numbers, US Drivers License numbers and may be customized to
detect custom account numbers.
Security numbers, US Drivers License numbers and may be customized to
detect custom account numbers.
•
California SB-1386 detects documents and transmissions that contain
personally identifiable information (PII) as regulated by California SB-1386
(Civil Code 1798), such as US Social Security numbers, credit card numbers,
and US drivers license numbers. Any business that operates in California and
owns or licenses computerized PII data for California residents, regardless of
their physical location, is required to comply.
personally identifiable information (PII) as regulated by California SB-1386
(Civil Code 1798), such as US Social Security numbers, credit card numbers,
and US drivers license numbers. Any business that operates in California and
owns or licenses computerized PII data for California residents, regardless of
their physical location, is required to comply.
•
Restricted Files detects emails that contain restricted files, including .mdb,
.exe, .bat and Oracle executable files (.fmx, .frm). This policy can be
customized to add additional file attributes to the policy violation rules.
.exe, .bat and Oracle executable files (.fmx, .frm). This policy can be
customized to add additional file attributes to the policy violation rules.
You can create other types of DLP policies using the DLP Policy Manager.
Customizing the DLP Policies
Some DLP policies use content matching classifiers that can be customized to
detect sensitive information in outgoing messages. The customized classifiers for
the HIPAA, FERPA, and GLB, policies use a regular expression to search for
identification number patterns in outgoing messages. If you select the Restricted
Files policy, you can choose the attachment file types you want the DLP policy to
detect. The Restricted Files policy detects .exe and .mdb files by default, but you
can remove these file types. You can also configure the Restricted Files policy to
apply only to encrypted or password-protected files.
detect sensitive information in outgoing messages. The customized classifiers for
the HIPAA, FERPA, and GLB, policies use a regular expression to search for
identification number patterns in outgoing messages. If you select the Restricted
Files policy, you can choose the attachment file types you want the DLP policy to
detect. The Restricted Files policy detects .exe and .mdb files by default, but you
can remove these file types. You can also configure the Restricted Files policy to
apply only to encrypted or password-protected files.
For more information on customizing the content matching classifiers for these
DLP policies, see
DLP policies, see
Click Next to continue.