Data awareness is crucial for successful data management. Because data trends and user requirements are constantly changing, in turn data policies have to evolve to accommodate these changes. For this, Endpoint DLP Plus offers a multitude of comprehensive reports to track and stay up to date with your network performance. Furthermore, it provides actionable insights to decide precisely which security measures should be implemented or improved to best protect and handle your sensitive information.
This report contains all the rules that were implemented for detecting and consolidating specific sets of sensitive data. In Endpoint DLP Plus, rules are instructions to comb your endpoints to find particular types of sensitive data. The report can be filtered to show the rules that were created to find each of these classes of sensitive information: finance, PII, health records, source code and custom rules.
This report displays all the boundary restrictions and data transfer protocols that are enforced. The information displayed in this report can be narrowed down based on these data transfer mediums: software applications, web domains, email domains, network printers, USB printers and other peripheral devices.
This audit includes reasons that trusted users have given in order to justify overriding an enforced DLP policy. When attempting to override a restriction, users will be prompted for reasons, they can give their own explanation or pick one of these: they are transferring a personal document, the client is outside the organization or they have gotten prior approval from their manager. This report can be filtered based on these options.
This report includes any request sent to the admin to change or modify existing boundary restrictions. Overriding is only permitted for high-level users so ordinary employees have to provide a reason first and wait for admin approval. All these requests will be logged here for easy review.
To err on the side of caution, DLP policies are set to encompass many different endpoints and users. At times, this leads to data which isn't actually sensitive being marked as such. In these cases, users can let the admin when there is a false positive so that policies can be modified if necessary. All the false positive notifications can be browsed here.
This report enables thorough inspection of user behavior within the network. The audits can be narrowed down according to each computer or user, what type of activity it was related to (file upload, transfer etc) and the Endpoint DLP Plus permission level the action was associated with (allowed, blocked, self-override, reported as false positive).
Dashboard info-graphics are displayed in the homepage for admins looking for a quick overview of data-related activities. For in-depth evaluation of network performance, the above reports can be availed and for efficiency smart audit filters are provided to help quickly find the required information.
For convenience, reports can be generated according to a particular time table and then sent via email.
Endpoint DLP Plus provides an ability to retrieve the required information from the database using the Query Report. This might be useful in cases where you require information other than what is given in the pre-defined reports. All query reports can be saved for future reference and exported to CSV format for further processing.