Inspection mode differences for Data Leak Prevention
Inspection mode differences for Data Leak Prevention
This section identifies the behavioral differences between Data Leak Prevention (DLP) operating in flow and proxy inspection.
Feature comparison between DLP inspection modes
The following table indicates which DLP filters are supported by their designated inspection modes.
Credit
Card Filter |
SSN Filter | Regex
Filter |
File-
Type Filter |
File-Pattern Filter | Fingerprint
Filter |
Watermark
Filter |
Encrypted
Filter |
FileSize
Filter |
|
Proxy | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Flow | Yes | Yes | Yes | No | Yes | No | No | Yes | Yes* |
*File-size filtering will only work if file size is present in the protocol exchange.
Protocol comparison between DLP inspection modes
The following table indicates which protocols can be inspected by DLP based on the specified inspection modes.
HTTP | FTP | IMAP | POP3 | SMTP | NNTP | MAPI | CIFS | |
Proxy | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No |
Flow | Yes | Yes | Yes | Yes | Yes | No | No | No |
Having trouble configuring your Fortinet hardware or have some questions you need answered? Check Out The Fortinet Guru Youtube Channel! Want someone else to deal with it for you? Get some consulting from Fortinet GURU!
Don't Forget To visit the YouTube Channel for the latest Fortinet Training Videos and Question / Answer sessions!
- FortinetGuru YouTube Channel
- FortiSwitch Training Videos
Cybersecurity Videos and Training Available Via: Office of The CISO Security Training Videos
Leave a Reply