Fortinet black logo

Administration Guide

DLP techniques

DLP techniques

The security of sensitive data is a top priority for organizations. A range of techniques and tools are used to maintain the confidentiality and accessibility of data.

The following table describes some of the industry standard techniques that are used for data loss protection, and if they can be configured in the GUI or CLI.

Technique

Description

GUI

CLI

Indexed Document Matching (IDM)

IDM creates unique fingerprints for your organization’s crucial documents that hold sensitive information. This process involves analyzing the content of these documents and generating a checksum for each one.

See DLP fingerprinting for more information.

True file type filtering

Identify a file by the data type in its meta data.

See DLP File Pattern for more information.

File size filtering

Identify a file based on its size.

See Example 2: Block HTTPS downloads of EXE files and log HTTPS downloads of files larger than 500 KB for an example.

DLP techniques

The security of sensitive data is a top priority for organizations. A range of techniques and tools are used to maintain the confidentiality and accessibility of data.

The following table describes some of the industry standard techniques that are used for data loss protection, and if they can be configured in the GUI or CLI.

Technique

Description

GUI

CLI

Indexed Document Matching (IDM)

IDM creates unique fingerprints for your organization’s crucial documents that hold sensitive information. This process involves analyzing the content of these documents and generating a checksum for each one.

See DLP fingerprinting for more information.

True file type filtering

Identify a file by the data type in its meta data.

See DLP File Pattern for more information.

File size filtering

Identify a file based on its size.

See Example 2: Block HTTPS downloads of EXE files and log HTTPS downloads of files larger than 500 KB for an example.