For each trigger, there is a drop-down list of available actions.
To choose a policy action
You can block emails, warn the user, enforce or advise email encryption, or monitor emails.
You can block files, warn the user, enforce or advise file encryption, or monitor file activity.
You can 'report' unauthorized files (that is, capture the file details but take no other action. Or you can remove files and replace them with explanatory 'stub' files. Or you can simply delete files.
Copyright © 2014 CA.
All rights reserved.
|
|