All triggers in the user policy are conditionally dependent on lists of trigger items. If detected, these items can trigger a capture or control event. Examples include lists of key words or phrases, email addresses, file names, Web site URLs, and executable paths.
| Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |