You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/data-protection-policies.md
+11-10Lines changed: 11 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,17 +61,17 @@ To create a new file policy, follow this procedure:
61
61
62
62
1.**Create a filter for the files this policy will act on** to set which discovered apps trigger this policy. Narrow down the policy filters until you reach an accurate set of files you wish to act upon. Be as restrictive as possible to avoid false positives. For example, if you wish to remove public permissions, remember to add the **Public** filter, if you wish to remove an external user, use the "External" filter and so on.
63
63
64
-
> [!NOTE]
65
-
> The file policy,'Contains' filter searches only for complete words. These words must be separated by punctuation marks like commas, dots, hyphens, or spaces.
66
-
> * Spaces or hyphens between words function like OR. For example, if you search for 'malware virus' it finds all files with either malware or virus in the name, so it finds both malware-virus.exe and virus.exe.
67
-
> * If you want to search for a string, enclose the words in quotation marks. This functions like AND. For example, if you search for "malware" "virus," it finds virus-malware-file.exe but it will not find malwarevirusfile.exe and it will not find malware.exe. However, it searches for the exact string. If you search for "malware virus," it will not find "virus" or "virus-malware."\
68
-
> ***Equals** searches only for the complete string. For example, if you search for malware.exe it finds malware.exe but not *malware.exe.txt.*
64
+
> [!NOTE]
65
+
> The file policy,'Contains' filter searches only for complete words. These words must be separated by punctuation marks like commas, dots, hyphens, or spaces.
66
+
> * Spaces or hyphens between words function like OR. For example, if you search for 'malware virus' it finds all files with either malware or virus in the name, so it finds both malware-virus.exe and virus.exe.
67
+
> * If you want to search for a string, enclose the words in quotation marks. This functions like AND. For example, if you search for "malware" "virus," it finds virus-malware-file.exe but it will not find malwarevirusfile.exe and it will not find malware.exe. However, it searches for the exact string. If you search for "malware virus," it will not find "virus" or "virus-malware."\
68
+
> ***Equals** searches only for the complete string. For example, if you search for malware.exe it finds malware.exe but not *malware.exe.txt.*
69
69
70
-
1. Under the first **Apply to** filter, select either **all files**, **all files excluding selected folders** or **selected folders** for Box, SharePoint, Dropbox, or OneDrive. This setting allows you to enforce the file policy across all files in the app or within specific folders. You are then prompted to sign in to the cloud app and add the relevant folders.
70
+
1. Under the **Apply to** filter, select either **all files**, **all files excluding selected folders** or **selected folders** for Box, SharePoint, Dropbox, or OneDrive. This setting allows you to enforce the file policy across all files in the app or within specific folders. You are then prompted to sign in to the cloud app and add the relevant folders.
71
71
72
72
:::image type="content" source="media/file-policies/screenshot-showing-where-to-apply-file-policies-for-example-all-files-or-selected-folders.png" alt-text="Screenshot showing where to apply file policies, for example to all files or selected folders" lightbox="media/file-policies/screenshot-showing-where-to-apply-file-policies-for-example-all-files-or-selected-folders.png":::
73
73
74
-
1. Under the second**Apply to** filter, select either **all file owners**, **file owners from selected user groups** or **all file owners excluding selected groups**. Then select the relevant user groups to determine which users and groups should be included in the policy.
74
+
1. Under the **Select user groups** filter, select either **all file owners**, **file owners from selected user groups** or **all file owners excluding selected groups**. Then select the relevant user groups to determine which users and groups should be included in the policy.
75
75
76
76
1. Select the **Content inspection method**. We recommend using the [**Data Classification Services**](content-inspection.md).
77
77
@@ -175,7 +175,7 @@ Below is a list of the file filters that can be applied:
175
175
176
176
***Collaborators** – Include/exclude specific collaborators or groups.
177
177
178
-
**Any from domain** – If any user from this domain has direct access to the file.
178
+
***Any from domain** – If any user from this domain has direct access to the file.
179
179
> [!NOTE]
180
180
> - This filter doesn't support files that were shared with a group, only with specific users.
181
181
> - For SharePoint and OneDrive, the filter doesn't support files shared with a specific user through a shared link.
@@ -184,8 +184,9 @@ Below is a list of the file filters that can be applied:
184
184
185
185
-**Groups** – If a specific group has access to the file. Groups can be imported from Active Directory, cloud apps or manually created in the service.
186
186
187
-
>[!NOTE]
188
-
> - This filter is used to search for a collaborator group as a whole. It doesn't match for individual group members.
187
+
>[!NOTE]
188
+
> - This filter is used to search for a collaborator group as a whole. It doesn't match for individual group members.
189
+
189
190
-**Users** – Certain set of users that might have access to the file.
190
191
191
192
-**Created** – File creation time. The filter supports before/after dates and a date range.
0 commit comments