'What' defines the action taken by CA Data Protection after detecting unauthorized activity.
After identifying the user and checking the circumstances to confirm that intervention is required, CA Data Protection can take several possible actions.
For example, it can block Spencer Rimmel’s unauthorized email or simply warn him, allowing him to reconsider or rectify what he is doing. Or it can quarantine his email, only releasing it when it has been viewed and approved by Spencer Rimmel’s manager. Alternatively, it can cause the email to be encrypted before it is sent.
CA Data Protection can block or warn users from printing a confidential file or copying it to a removable device, network share, or sync folder. CA Data Protection can also encrypt the file before it is copied to a removable device or sync folder.
Likewise, CA Data Protection can block users if they attempt unauthorized Web activity, such as posting a sensitive document or submitting unauthorized comments to a Web site.
If CA Data Protection is scanning a file system (or Exchange Public Folders, or SharePoint site), it can delete, replace or move any unauthorized files or documents that it discovers.
Alternatively, for emails and files, the action taken by CA Data Protection may be to categorize them, allowing them to be easily retrieved from an archive at a later date.
'Wha't also defines how CA Data Protection notifies a user if it decides to block or warn them, or if it quarantines an email. Typically, users see a pop-up advisory or they receive an explanatory email. The wording is easily customizable to reflect the circumstances that caused the blocking or warning. For example, Spencer Rimmel may see an advisory explaining that his email was blocked because "You are not authorized to send messages to spencer777@hotmail.co.uk pertaining to the Unipraxis acquisition". (In this example, Spencer was trying to send an unauthorized email to his own Hotmail account.)
To define what actions CA Data Protection takes when it intervenes, edit the control actions in your user policies.
Copyright © 2015 CA Technologies.
All rights reserved.
|
|