Copy
Copy Trigger in DLP policies
Trigger "Copy" allows monitoring of data copied to the clipboard by the user on the device. The rule analyzes the clipboard contents for specific types of data in accordance with the security policy.
A properly configured policy allows you to:
Perform a selected action automatically (e.g., block the operation).
Display a notification to the user with a message about the action taken.
Available configuration options
Type of data to monitor
Specify the clipboard contents to be monitored:
Copying file paths Control copying of file locations (e.g., document path strings).
Copying images Tracking copying of graphics and images.
Copying text Monitor copying of text fragments to the clipboard (e.g., personal data, passwords).

NOTE!
The "Copy" trigger covers all standard types of data that can be placed into the clipboard. In practice this means:
File paths If a user selects a file in Explorer and chooses "Copy", the path text itself (e.g.,
C:\Data\Report.xlsx) is also placed into the clipboard. The system will detect this and, according to the policy, either log it or block further pasting if a blocking action is active.Images Any copy of an image to the clipboard is subject to monitoring regardless of source. This includes: clicking "Copy" on an image, screen snips, and even a standard Print Screen. The system will log such an event or block pasting the image if the policy prescribes it.
Text The system responds to any text copied while working on a device with the agent: from documents, web pages, applications, terminals, and messengers. If the policy has an active blocking action, further pasting will be stopped and the incident may be recorded.
Example of use
Objective: Monitoring of copied textual data.
Configuration: Data type set to "Text".

Action: Block the text copying operation and display a message informing about the security policy violation.

Summary
Trigger "Copy" is an effective tool for protecting sensitive data within the organization. It enables precise monitoring of clipboard copy operations and taking automatic actions, supporting enforcement of DLP security policies.
Last updated
Was this helpful?