How Can Client Documents Be "Tall" To Prevent Disclosure?
Special attention focused scanning - strengthening pertinence
File The scan is only for the type defined in the policy, and the scan does not depend on whether the terminal is installing the document editor. The types of documents currently supported include: Word (97-2010), Excel (97-2010), PPT (2003-2010), PDF, TXT, RTF. The parsed document type is interface oriented, and users can customize the type of document concerned according to their actual document application environment. The scope of document checking includes file name, file attribute, file content, and also supports checking of embedded text, such as the Excel table contained in WORD.
Identification of sensitive documents - improvement Effectiveness
Document scanning is also a process of keyword matching. In document strategy, sensitive information can be defined as needed, that is, sensitive keywords. All documents containing keywords are marked as sensitive documents. Keywords are server preset or manually added by administrators, which can be single words, but also with different words or combinations, and can also support regular expressions. By tagging documents, management work can only aim at sensitive documents containing key words without requiring all documents to be controlled and audited, thus improving the effectiveness of document management.
Guard against Leak Protection guarantee reliability
The document inspection strategy adopts real-time scanning and real-time protection mechanism. When end-users try to copy or transmit a sensitive document through network sharing, U disk, compressed files, e-mail attachments, browsers, etc., the terminal will give information on the violation according to the policy settings, and prevent the document from being transmitted, thereby effectively preventing the spread of sensitive information (leakage), and ensuring the reliability of document management.
Firewall, private network and intrusion detection can prevent illegal access to external personnel, but can not prevent insiders from sending sensitive documents to others. This is the main way to cause electronic documents to leak. How to balance the high security without hindering the normal work of the staff? The host monitoring and auditing system provides a simple strategy to realize the powerful document protection function.
Mobile storage protection - protection of comprehensiveness
If the mobile storage protection is selected in the strategy, the document checking strategy can monitor the mobile storage medium, but the type of the monitored document is limited to the type set in the policy. Mobile storage protection allows end users to copy files that are monitored in mobile storage to local disks, but does not allow new, edited, renamed, copied and cut operations in mobile storage media. Warning messages will be given during violation.
Encrypting file processing - handling particularity
Encrypted file processing is used to specify the way to process encrypted files. When choosing to ignore the encrypted file, the policy does not control the encrypted file; instead, when the selection is regarded as a sensitive file, whether the encrypted file contains sensitive keywords, the strategy adds it to the list of sensitive documents, and any operation of the user will be monitored and audited.
Detailed audit logs - Historical traceability
Audit information is generated for new documents, modification and other operations of sensitive documents. Audit information includes information such as operator, responsible person IP, operation generation time, operation file path, operation type, operation result, and permitted information. Through a full scan, administrators can fully grasp the sensitive documents that each client owns. At the same time, through the real-time audit function, the administrator can clearly understand when and where the document is executed by the user, and can make timely response to the illegal operation administrator to avoid the leakage of confidential information. It not only achieves user document leakage prevention, but also traceability historical data of document operation.
- Related reading
- Association dynamics | Do Not Attend The Conference Of Chinese Professional Wear Industry? Regret!
- News Republic | Big Gathering Of Dry Goods Is Full Of Exploding Spots - Reconstructing The Future. China's Garment Industry Summit Is Held In Pu Yuan.
- Expo News | Brand Jiangsu Fashion Jiangsu Twenty-First Jiangsu International Fashion Festival Opening Ceremony And Grand Opening
- Fabric accessories | Chen Shujin And My Motherland: Proud Of Our Motherland! Proud Of The Textile
- Fabric accessories | Visiting PIS Exhibition In Korea To Feel The Current Market
- Fabric accessories | Continuous Fermentation, Chanel Canceled Hongkong Big Show Rumors Intensified
- Popular this season | This Year's Popular Clothing Match With 2019 Autumn And Winter 6 Coat Trends
- Management treasure | Flower Autumn Autumn: How Does A Clothing Store Do A Good Service Process For Customers To Try On?
- neust fashion | A Sense Of Technology -- Air Max 720 ISPA Will Debut Tomorrow.
- Fashion brand | 2019 Beijing Fashion Week "Traces To The Future", Saussurea Salute To The Republic Of 70
- Telemarketing, Such As Identifying Phone Lists And Quality Skills.
- Telephone Skills That Workplace People Should Learn
- Telemarketing Skills: How To Conquer The Hearts Of Customers?
- Telephone Sales Tips, Easy To Get 98% Of The Customers.
- 5 Telemarketing Skills That Salesmen Should Master
- Biodegradable Tencel Chopped Fibers Are Best Suited For Making High-Quality Wet Towels.
- Three Skills Of First Phone Call
- The Standard System Of Ethnic Costumes Will Be Built
- Nine Taboos In Speaking Skills Of Telemarketing Staff
- The Positioning Function Of The Bracelet And Shoes Helps The Stray People To Return Home Safely.