Previous Topic: Configure the User PolicyNext Topic: Access Denied Message Subfolder


Data In Motion Triggers

Data In Motion triggers include general settings that let you specify which types of data you want the CFSA, CPSA, or Client Network Agent to detect. This section focuses on the key Data In Motion settings for the CFSA.

Which File Sources?

In each Data In Motion trigger, this setting instructs the trigger to analyze files or documents captured by various CA DataMinder agents.

Verify that the following sources are selected:

Which Targets?

(Not applicable to file sync operations and files copied to network folders. To specify network locations, edit the Top Level File Lists settings.)

Note: Depending on the Which File Sources? setting, the Targets settings can specify lists of removable devices, printer names, network folders, URLs, or writable CD drives.

For the CFSA, you can specify lists of included or excluded devices. These lists are similar to the Special Device List settings in machine policy.

Type the names of the devices that you want to include or exclude. Use ? and * wildcards if required. If a device name contains spaces, you do not need to enclose it in quotes.

If you set up the trigger to use:

Where can I find device names?

Device names are shown in the Windows Device Manager applet. You can also see them in Windows Explorer. When you view the properties of a removable drive, the device name is listed in the Hardware tab of the Properties dialog.

You can also check device names in Windows Device Manager. Note that Device Manager automatically appends 'USB Device' to device names. You must omit this appended text when you specify the device name in the machine policy or user policy. For example, if the Device Manager lists 'Unipraxis DataStick 2.0 USB Device', enter this in the policy as 'Unipraxis DataStick 2.0'.

Top Level File Lists (including network locations)

All Data In Motion triggers include Top Level File Lists. Use these lists to detect normal files or zip files, or files in network locations.

Edit these lists to identify the names of files that you want to apply policy to. For example, you can specify:

For each trigger, choose whether to use an Included, Excluded or Ignored file list.

Network Locations

You also use this setting to specify UNC network paths. This path must use a fully qualified domain name (FQDN). Use a wildcard to detect all files in the specified folder. For example:

\\UX-FILESVR-01\New Project\Reports\*.*

If a path contains spaces, you do not need to enclose it in quotes.

Individual/Embedded File List

If required, Data In Motion triggers can look for files contained within a zip file or embedded in a master file. To do this, edit the Individual/Embedded File Lists. For each trigger, you can choose to use an Included or Excluded file list.

Using these lists in conjunction with the Top Level File Lists, you can feasibly search all .zip files for a specific file. For example, set Included Top Level Names to *.zip and Included Individual/Embedded File Names to *.doc to search for all .doc files contained within .zip files.

Intervention

In each Data In Motion control action, the Intervention setting determines how the CFSA handles files being copied to removable devices, network locations, or sync folders. The available options include Block, Warn, Inform, Categorize and Encrypt (the user must supply a decryption password).

Note: The CFSA cannot encrypt files being copied to network locations.

More information:

Access Denied Message Subfolder