ITM / DLP Explorations and Common Use Cases

Here are a few use cases.

Explorations

Detecting Web Uploads

Detecting Copy to USB

Detecting Credit Card Exfiltration

Monitor High Risk Users

 

For more, Quick-Reference Guides, see ITM / Endpoint DLP Onboarding.