Cisco Cisco Email Security Appliance C170 Guia Do Utilizador
11-19
Cisco IronPort AsyncOS 7.6 for Email Configuration Guide
OL-25136-01
Chapter 11 Data Loss Prevention
•
California SB-1386 detects documents and transmissions that contain personally identifiable
information (PII) as regulated by California SB-1386 (Civil Code 1798), such as US Social Security
numbers, credit card numbers, and US drivers license numbers. Any business that operates in
California and owns or licenses computerized PII data for California residents, regardless of their
physical location, is required to comply.
information (PII) as regulated by California SB-1386 (Civil Code 1798), such as US Social Security
numbers, credit card numbers, and US drivers license numbers. Any business that operates in
California and owns or licenses computerized PII data for California residents, regardless of their
physical location, is required to comply.
•
Restricted Files detects emails that contain restricted files, including .mdb, .exe, .bat and Oracle
executable files (.fmx, .frm). This policy can be customized to add additional file attributes to the
policy violation rules.
executable files (.fmx, .frm). This policy can be customized to add additional file attributes to the
policy violation rules.
You can create other types of DLP policies using the DLP Policy Manager.
Customizing the DLP Policies
Some DLP policies use content matching classifiers that can be customized to detect sensitive
information in outgoing messages. The customized classifiers for the FERPA and GLB, policies use a
regular expression to search for identification number patterns in outgoing messages. If you select the
Restricted Files policy, you can choose the attachment file types you want the DLP policy to detect. The
Restricted Files policy detects .exe and .mdb files by default, but you can remove these file types. You
can also configure the Restricted Files policy to apply only to encrypted or password-protected files.
information in outgoing messages. The customized classifiers for the FERPA and GLB, policies use a
regular expression to search for identification number patterns in outgoing messages. If you select the
Restricted Files policy, you can choose the attachment file types you want the DLP policy to detect. The
Restricted Files policy detects .exe and .mdb files by default, but you can remove these file types. You
can also configure the Restricted Files policy to apply only to encrypted or password-protected files.
For more information on customizing the content matching classifiers for these DLP policies, see
.
Click Next to continue.
Figure 11-7
DLP Assessment Wizard: Step 1. Policies
Step 2: Reports
Enter an email address for the scheduled DLP Incident Summary report. Use commas to separate
multiple addresses. If you leave this value blank, the scheduled report is not created. For more
information on DLP Incident Summary reports, see the “Using Email Security Monitor” chapter in the
Cisco IronPort AsyncOS for Email Daily Management Guide.
multiple addresses. If you leave this value blank, the scheduled report is not created. For more
information on DLP Incident Summary reports, see the “Using Email Security Monitor” chapter in the
Cisco IronPort AsyncOS for Email Daily Management Guide.
Click Next to continue.