When CA DLP detects unauthorized behavior or activity that it needs to control, the first question it asks is ‘Whose policy do I apply?’ To answer this question, CA DLP must map the user to a CA DLP user account. The mechanism for doing this depends on the type of activity.
This section contains the following topics:
Internal and External Email Addresses
| Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |