Fortinet black logo

Cookbook

Inspection mode differences for data leak prevention

Copy Link
Copy Doc ID fed12558-14f5-11e9-b86b-00505692583a:942392
Download PDF

Inspection mode differences for data leak prevention

This section identifies the behavioral differences between data leak prevention (DLP) operating in flow and proxy inspection.

Feature comparison between DLP inspection modes

The following table indicates which DLP filters are supported by their designated inspection modes.

Credit Card Filter SSN Filter Regex Filter File-Type Filter File-Pattern Filter Fingerprint Filter

Watermark Filter

Encrypted Filter

File-Size Filter

Proxy Yes Yes Yes Yes Yes Yes

Yes

Yes

Yes

Flow Yes Yes Yes No Yes No

No

Yes

Yes*

*File-size filtering will only work if file size is present in the protocol exchange.

Protocol comparison between DLP inspection modes

The following table indicates which protocols can be inspected by DLP based on the specified inspection modes.

HTTP FTP IMAP POP3 SMTP NNTP

MAPI

CIFS

Proxy Yes Yes Yes Yes Yes Yes

Yes

No

Flow Yes Yes Yes Yes Yes No

No

No

Inspection mode differences for data leak prevention

This section identifies the behavioral differences between data leak prevention (DLP) operating in flow and proxy inspection.

Feature comparison between DLP inspection modes

The following table indicates which DLP filters are supported by their designated inspection modes.

Credit Card Filter SSN Filter Regex Filter File-Type Filter File-Pattern Filter Fingerprint Filter

Watermark Filter

Encrypted Filter

File-Size Filter

Proxy Yes Yes Yes Yes Yes Yes

Yes

Yes

Yes

Flow Yes Yes Yes No Yes No

No

Yes

Yes*

*File-size filtering will only work if file size is present in the protocol exchange.

Protocol comparison between DLP inspection modes

The following table indicates which protocols can be inspected by DLP based on the specified inspection modes.

HTTP FTP IMAP POP3 SMTP NNTP

MAPI

CIFS

Proxy Yes Yes Yes Yes Yes Yes

Yes

No

Flow Yes Yes Yes Yes Yes No

No

No