Previous Topic: CFSA Flow Chart: Scanned Files on Local Hard DiskNext Topic: Risk of Data Loss If CA DataMinder Blocks File Move


How Does the CFSA Apply Policy to Protect Files?

The CFSA applies machine policy and user policy to protect your data in the following ways:

Apply machine policy when files copied to removable devices or network locations

The CFSA detects attempts to copy files onto removable devices, primarily USB flash drives, or to network locations such as shared folders, or to burn files to CD or DVD. It then applies machine policy in real time to block unauthorized saving or copying, based on the device or application being used, or the target network folder. It can also apply Data In Motion triggers to analyze files being copied—see below.

Apply Data In Motion triggers to copied files

The CFSA can apply Data In Motion triggers in real time to files being copied to removable devices or network locations or burnt to CD or DVD. To do this, it channels users into using policy-enabled applications (Windows Explorer or DOS commands) to copy or burn their files by blocking other applications.

The CFSA can then apply Data In Motion triggers based on a file’s properties or text content. It uses the results of policy processing to allow or block the copy operation, or simply to warn the user. Alternatively, you can configure Data In Motion control actions to categorize or encrypt the file being copied.

Note: Data In Motion control actions can only encrypt files being copied to removable devices. They cannot encrypt files being copied to network locations or CD.

Apply Data At Rest triggers to scanned local files

Finally, it can run scheduled scans of the local hard disk and apply Data At Rest policy to targeted files. For example, it can categorize files based on their text content, and delete, replace or move unauthorized files.

More information:

Configure the Local Machine Policy

Data In Motion Triggers

Data At Rest Triggers

Which Policies Are Applied?