A user policy contains hundreds of triggers, covering all the main channels: incoming and outgoing emails; Internet activity; files being copied, printed, downloaded or uploaded, or sent over FTP; scanned files; and application usage.
For each channel, there are also separate sets of control triggers (these control what a user can do) and capture triggers (these save details about what the user was doing).
| Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |