Previous Topic: Removable Devices Folder

Next Topic: Data At Rest Protection Folder

Network Locations Folder

This contains the following policy settings:

Trusted Application List

These are applications that are exempted from CFSA control. That is, users can save files to any network location if they are using a trusted application.

For example, you may not need to monitor an in‑house system application that always encrypts files when saving. By default, lsass.exe is always included in this list—see the ‘trusted application’ definition in CFSA terminology.

In the Trusted Application List setting, add the applications you want to exempt from the CFSA. You must supply the executable or process name, such as Winword.exe.

Note: Trusted applications override any network location filters. Users can save files directly from a trusted application to any network location.

Default Handling

This setting determines how the agent handles attempts to copy files to unlisted network locations (that is, any not listed in Special Locations List). The available actions are exactly the same as for special locations (see below).

Note: If no special locations are listed, the default handling is applied to all network locations.

Special Locations List

This is a list of network locations that require specific handling by the CFSA. You can either list the locations you want the CFSA to control or the ones you want it to ignore. In the Special Locations List setting, specify the network locations that you want to detect. You must supply the UNC path, for example:

\\UX-FILESVR-01\New Project\Reports

Note: If a path contains spaces, you do not need to enclose it in quotes.

Handling of Special Locations

This setting determines how the CFSA handles attempts to copy files to a network location listed in Special Locations. The available actions are:

Allow write access

The user is allowed to copy files to special locations. Policy is not applied.

Read only

The user is not allowed to copy files to special network locations (unless they are using a trusted application).

Apply User Policy To File

If the user attempts to copy a file to a special location using:

  • A policy-enabled application, policy is applied to the file using Data In Motion triggers.
  • A trusted application, copy operations are always permitted. Policy is not applied to the file.
  • Any other application, the copy operation is blocked; that is, the location is set to read only.

More information:

CFSA Terminology