Data In Motion triggers include general settings that let you specify which types of document you want the CFSA to detect. For information about these general settings, see the Administration console online help.
This section focuses on the key Data In Motion settings for the CFSA. Specifically, you need to edit the following settings in the Data In Motion capture and control triggers:
In each Data In Motion trigger, this setting instructs the trigger to analyze files or documents captured by various CA DataMinder agents.
Verify that the Client File System Agent check box is selected! This enables the trigger to analyze files being copied or saved to removable devices or network locations.
These settings define a further device filter for the CFSA. You can specify lists of included or excluded devices; these lists are similar to the Special Device List settings in machine policy. If you set up the trigger to use:
All Data In Motion triggers include Top Level File Lists. Use these lists to detect normal files or zip files. You edit these lists to identify the names of files that you want to apply policy to. For example, you can specify:
For each trigger, you can choose whether to use an Included, Excluded or Ignored file list.
If required, Data In Motion triggers can look for files contained within a zip file or embedded in a master file. To do this, edit the Individual/Embedded File Lists. For each trigger, you can choose to use an Included or Excluded file list.
Using these lists in conjunction with the Top Level File Lists, you can feasibly search all .zip files for a specific file. For example, set Included Top Level Names to *.zip and Included Individual/Embedded File Names to *.doc to search for all .doc files contained within .zip files.
In each Data In Motion control action, the Intervention setting determines how the CFSA handles files being copied to removable devices or network locations. The available options include Block, Warn, Inform and Categorize.
For files copied to removable devices, you can also apply Advise Encryption or Enforce Encryption options (the user must supply a decryption password).
|
Copyright © 2012 CA.
All rights reserved.
|
|