Reference Guide

Navigate the Dell Server
110
Policies: Protected Office Documents, Content Based Protection, Content Based Protection Rules. To
include emails that must comply with a Content Based Protection rule, also enable Email Encryption via
Outlook.
For a report, select from these column options.
Audit Event - Column options
Description
Content Rule
The content rule category, such as Public, Internal Use, or Restricted.
Content Rule File
The name of the file that was audited or encrypted based on a content rule.
Content Rule Path
The location of the file.
Content Rule Action
Based on the content rule selected, these actions can display:
Audit - If a rule in the Categories list has a priority of two and higher, audit events are
created.
Encrypt - If the Encrypt check box is selected for a rule in the Categories list, the file was
encrypted based on the rules set.
Public rule has no actions.
Content Rule Triggers
The rules that cause the actions to occur.
Column options for Protected Email only (Windows)
Audit Event - Column options
Description
Email Keyid
The Key ID used to protect the email.
Email Subject
Subject line from the email.
Email From
The email address of the person who sent the email.
Email To
Email addresses of recipients.
Email Cc
Email addresses of those copied.
Email Bcc
Email addresses of those blind-copied.
Email Attachment
Names of attachments added to the email.
Email Action
What the user did with the action. In
Protected_Office_Document_or_Basic_File_Protection_audit_events , see Opened, Sent, Reply, and
Forwarded.
Column options for Share only (Windows)
In Column_options_for_all_audit_events, see User, Logged in User, Client Type, Action. You can
also select File, Email, Group, and Status.
Actions for Share are listed here.
Actions
for Share
audit
events
Description Windows
Add
A protected file or email was shared with a user or a group. This applies
to pre
-share.
Remove
Data Guardian Access to a protected file or email has been revoked from
a user or a group.
Request
A user had to request access to a protected file or email because they
did not have access.
Examples of Map Visualization and Column Filters