# Data Loss Prevention

## Data Loss Prevention

**Data Loss Prevention** is an advanced tool that enables IT administrators to monitor data access, control information flow, block leaks, and prevent data theft. By defining DLP triggers (e.g., file deletion, sending a file with specific text by email, working outside designated hours, or visiting prohibited websites), the system initiates appropriate actions (e.g., blocking operations, monitoring, taking a screenshot, recording the screen) and optionally notifies administrators or end users.

### Comprehensive data loss prevention

#### Device control

Monitoring and blocking USB device access based on unique device identifiers, product identifiers, and serial numbers. Ability to identify encrypted devices.

#### Data at rest protection

Identifying, monitoring, and securing confidential data through automatic or manual inventory.

#### Data in use protection

Monitoring, controlling, and blocking access to data, including detailed control of document usage.

#### Data in transit protection

Monitoring, controlling, and blocking file transfers, with detailed content analysis before sending.

#### Application control

Monitoring employee application and process usage, with the ability to block execution of programs on a blacklist. Determining details such as who, when, and where a selected process was started.

#### Print control

Monitoring printed documents. Information about individuals who printed documents containing specified content.

#### Email control

Monitoring the content of email attachments. Ability to block sending messages containing particularly sensitive data.

#### Web filtering

Blocking access to selected websites and controlling downloading of content and files from those sites. Functionality utilizing website classification based on artificial intelligence.

### Key data protection functionalities

1. **Triggers and actions**
   * Definition of DLP triggers that initiate specific actions.
   * Actions may include blocking operations, taking screenshots, recordings, or sending notifications.
2. **Notifications**
   * Optional messages delivered to administrators or end users.
   * Delivered via email messages, system alerts, or pop-up windows on the user's computer.
3. **Creating data protection policies**
   * Ability to define policies containing multiple DLP rules.
   * Policies can be assigned to user groups or devices, enabling precise data management.

### Example use case for data protection

* **Secure use of removable media** – Monitoring and restricting access to confidential data stored on storage devices.
* **Protection against unauthorized file deletion** – Protecting data stored on servers from accidental or intentional deletion.
* **Control of data transfer** – Limiting the ability to send certain files outside the organization.

### Getting started with data protection

In the following sections of the documentation we will discuss in detail:

1. Creating and managing DLP triggers.
2. Configuration of actions and notifications.
3. Assigning data protection policies to user groups and devices.
4. Monitoring and analysis of data protection logs.

## Summary

Data Loss Prevention is not only a tool that secures the organization but also a key component of risk management. With consistent configuration options, administrators can easily define advanced protection policies tailored to the organization's unique requirements, minimizing the risk of data leakage.
