User Profile
techtalk_nu
Copper Contributor
Joined Aug 27, 2023
User Widgets
Recent Discussions
Re: What is Enforcement mode in Activity Explorer
This exists because Endpoint DLP has specific enforcement actions at the device level, unlike cloud-based workloads. Example: Copying a file with sensitive data to USB - WarnAndBypass (Endpoint DLP) Sending sensitive data via Exchange with override - DLP rule undo (Exchange DLP) Hope this clears it up!179Views0likes0CommentsIssue with Advanced Hunting in Security Portal
Hi all, Do you also have issue with Advanced Hunting? See attachment: Keep getting this error: Semantic error Error message: between(): argument #1 - invalid data type: string How to resolve: Fix semantic errors in your querySolved619Views0likes1CommentRe: Purview integration - Where does the file content get scanned?
Hi Charles1575 The scanning is typically done "in-place", meaning it scans the data where it resides without moving the actual content. The metadata might be sent to Purview's catalog though. If I understand you right your actual content of a file remains in its original location (e.g., Canada) during the scanning process. Mathias814Views0likes2CommentsRe: Files Policy - Filter if the file is shared to a user that is a member of a specific group?
HI Charles1575 I agree with Keith. But if you need to determine whether an external user is a "member of or not", consider the following approach: File Policy: Create a file policy. Within this policy, whitelist specific domains. Based on the domains and the applied sensitivity labels, you can then remove external users. This ensures that only users from trusted domains have access to files with specific sensitivity labels. Session Policy: Next, create a session policy using the type "Control file download (with inspection)". This policy allows you to set filters based on specific sensitivity labels. Under "Actions", you have the option to either "Block" or "Protect". If the goal is to prevent the download of sensitive files, opt for "Block". With these steps, you can ensure that your sensitive files are only accessible to specific users, and any unauthorized attempts to download these files are blocked. Mathias615Views0likes0Comments
Recent Blog Articles
No content to show