After creating a data rule, the next crucial step is deploying it. Deploying a policy ensures that the data rules are enforced on endpoints, providing real-time protection for sensitive information across your network.
Select the relevant data rules from the data classification set up earlier to apply within the policy.
Password-protected files can be classified as sensitive, with support for formats including 7z, zip, tar, Bzip2, xz, Gzip, RAR, RAR4, RAR5, WIM, ISO, ARG, and ISOUDF.

To manage the various access control for sensitive files, navigate to Policy Deployment -> Data Loss Prevention.
The File Access feature enables admins to specify which applications are permitted to access and open sensitive files.
For enhanced security, the preview pane in Windows File Explorer can be disabled.

The Email Client feature allows admins to define how Outlook handles sensitive files, ensuring secure file management during email communication.
Block Emails with Sensitive Content/Attachments: Completely prevents the sharing of sensitive files through the email client, ensuring that sensitive data cannot be transmitted via email.

Navigate to Policy Deployment -> Configure Consent Settings.
By enabling this consent, Endpoint DLP will be able to monitor the transfer of sensitive emails through the installation of Outlook add-ins. Without this consent, the add-ins will not be installed, and sensitive email transfers will go unmonitored.

Admins can control how sensitive files are managed when using removable storage devices, ensuring secure handling and preventing unauthorized data transfers.
Block Sensitive File Transfers: Completely restricts the transfer of files containing sensitive data to removable storage devices, ensuring that sensitive data cannot be moved or copied.

Admins can manage the handling of sensitive files during printing, ensuring secure processing and preventing unauthorized access or distribution.
Block Sensitive File Prints: Printing of sensitive files is completely restricted, preventing any unauthorized printing.

An option is available to allow users to override restrictions with business reasons, allowing the printing of sensitive content on other printers.

Configure settings to prevent the upload of sensitive files to the web, ensuring that critical data remains secure.
Block sensitive File Uploads: Completely restricts the upload of sensitive files to any domain or destination.

Add a list of trusted domains where sensitive file uploads should not be tracked.

Providing consent installs the browser plugin, allowing Endpoint DLP to block sensitive file uploads to the web. Without consent, the plugin will not be installed, and sensitive file uploads cannot be restricted.

Under the settings option, you can enable the feature to automatically mark files created from enterprise apps or downloaded from corporate web domains or emails as sensitive by default.

The Screen Capture feature allows admins to enable or restrict screen capture.

The Clipboard Restriction option prevents copying information from trusted applications to untrusted ones, while still allowing file copying within the trusted applications listed.

The Automatically Override if False-Positive feature allows users to bypass a block if they believe a non-sensitive file has been incorrectly flagged as sensitive. All overrides are logged in the audit for review. This option can be enabled temporarily until the DLP policy is fine-tuned, ensuring employee productivity remains unaffected.

The Mail Configuration feature allows you to configure email notifications that are sent to admins whenever a user raises a business override or reports a false positive. This ensures that administrators are alerted in real time and can take immediate action to review and address the incident.

Add the list of email addresses that need to be notified when an override is reported.
