Inspection mode differences for Data Leak Prevention
This section identifies the behavioral differences between Data Leak Prevention (DLP) operating in flow and proxy inspection.
Feature comparison between DLP inspection modes
The following table indicates which DLP filters are supported by their designated inspection modes.
Credit
Card Filter |
SSN Filter | Regex
Filter |
File-
Type Filter |
File-Pattern Filter | Fingerprint
Filter |
Watermark
Filter |
Encrypted
Filter |
FileSize
Filter |
|
Proxy | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Flow | Yes | Yes | Yes | No | Yes | No | No | Yes | Yes* |
*File-size filtering will only work if file size is present in the protocol exchange.
Protocol comparison between DLP inspection modes
The following table indicates which protocols can be inspected by DLP based on the specified inspection modes.
HTTP | FTP | IMAP | POP3 | SMTP | NNTP | MAPI | CIFS | |
Proxy | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No |
Flow | Yes | Yes | Yes | Yes | Yes | No | No | No |