Inspection mode differences for data leak prevention
This section identifies the behavioral differences between data leak prevention (DLP) operating in flow and proxy inspection.
Feature comparison between DLP inspection modes
The following table indicates which DLP filters are supported by their designated inspection modes.
Credit Card Filter | SSN Filter | Regex Filter | File-Type Filter | File-Pattern Filter | Fingerprint Filter |
Watermark Filter |
Encrypted Filter |
File-Size Filter |
|
---|---|---|---|---|---|---|---|---|---|
Proxy | Yes | Yes | Yes | Yes | Yes | Yes |
Yes |
Yes |
Yes |
Flow | Yes | Yes | Yes | No | Yes | No |
No |
Yes |
Yes* |
*File-size filtering will only work if file size is present in the protocol exchange.
Protocol comparison between DLP inspection modes
The following table indicates which protocols can be inspected by DLP based on the specified inspection modes.
HTTP | FTP | IMAP | POP3 | SMTP | NNTP |
MAPI |
CIFS |
|
---|---|---|---|---|---|---|---|---|
Proxy | Yes | Yes | Yes | Yes | Yes | Yes |
Yes |
No |
Flow | Yes | Yes | Yes | Yes | Yes | No |
No |
No |