Fortra Data Classification Suite For Windows Use Case Guide
Fortra Data Classification Suite For Windows Use Case Guide
Copyright © Fortra, LLC and its group of companies. All trademarks and registered trademarks are the property of their respective
owners.
The content in this document is protected by the Copyright Laws of the United States of America and other countries worldwide.
The unauthorized use and/or duplication of this material without express and written permission from Fortra is strictly prohibited.
Excerpts and links may be used, provided that full and clear credit is given to Fortra with appropriate and specific direction to the
original content.
202409160204
Table of Contents
Audience 6
Create a Configuration 8
Schema Examples 9
Visual Markings 46
Perform safe recipients checking based on email properties and metadata 165
Perform safe recipients checking based on Active Directory group membership 174
Audience
This guide is for Administrators who are using the Administration Console to create and
manage Configurations. The Administrator can create multiple Configurations and target
them to Active Directory users or groups in the organization. This guide is also useful to set
up a trial edition of the product.
Administrators can use these use cases as a reference when building Policies or as a
training exercise in a testing environment.
Fortra's Data Classification Suite (DCS) for Windows (On-premises) Deployment Guide and
Fortra's Data Classification Suite (DCS) Administration Console (On-premises) Deployment
Guide.
l Visual Markings
l Auto and Suggested Classification
These use cases show how to configure the Policies to classify, protect, and confidently
share information, and meet regulatory compliance requirements by identifying and
securing unstructured data.
The following symbols are used to identify which client applications can be used to create
the use case.
This symbol is used to identify use cases that can be created using Fortra's DCS
for Outlook (On-premises)
This symbol is used to identify use cases that can be created using Fortra's DCS
for Office (On-premises)
This symbol is used to identify use cases that can be created using Fortra's DCS
for Desktop (On-premises)
Create a Configuration
A Configuration contains the building blocks that define how DCS appears and interacts
with users and content in client applications. A Configuration is a collection of targeted
users and groups, a Schema, Policies, and Application Settings.
For complete information about Configurations, refer to the Fortra's Data Classification
Suite (DCS) Administration Console (On-premises) User Guide.
NOTE: ASchema is required in order to create a Configuration. You can create a Schema
without any Fields.
Schema Examples
Metadata Schema in Microsoft Outlook
The Classification Selector dialog appears in Microsoft Outlook when the Administrator has
created a Classification Schema and:
l A user chooses Select from the Advanced button in the Ribbon or Favorites task
pane.
l A user selects a classification from the One Click Classification in the ribbon
l On Save when one or more Fields are required and the user has not already made a
selection.
l When the Fields are set to “Required” and the user has not already made a selection.
Selecting Metadata Properties from the file context menu launches the Classification
Selector Dialog as seen in the screenshot below.
This Schema has been configured so that when a user selects Public another Field is
displayed.
Apply Visual Markings is a Conditional Field that only appears in the Classification Selector
dialog when the user selects Public as the value for the Classification Field.
The Metadata Schema includes the Fields, Values, Tooltips, and Descriptions that appear in
the Classification Selector Dialog. “Classification” is an example of a Field name.
2. Click New.
The Namespace URI is an automatically generated unique identifier for Schemas using this
license. We recommend that the default Namespace URI is used unless your organization
plans to create multiple Schemas.
Create a Field
A Field is displayed to the user in the Classification Selector Dialog and can also be used as
part of a conditional expression for a Policy or Rule.
1. Enter a name for the Field in the Field Name text box; in this example,
“CLASSIFICATION”. The Field Name text appears in the metadata stored by Data
Classification products. Field Names must begin with a letter and can only contain
letters and numbers. Spaces cannot be used in the Field Name.
2. Select “Text” from the Field Type dropdown list to create a text Field.
3. Enter the display text for the Field in the Display Text text box. This text appears in
the Classification Selector Dialog; it can also be referenced in Policies and used for
Protective Markings.
4. Enter a Tooltip in the Tooltip text box. Users are able to view this Tooltip when they
hover their mouse over the Field in the Classification Selector Dialog.
5. Enter a description in the Description text box.
6. This descriptive text provides users with more information about the correct use of
the Field. This text can be enabled or disabled by the user in the Classification
Selector Dialog.
7. Ensure that the Enabled checkbox is selected to display the Field in the
Classification Selector Dialog.
8. Select or leave unchecked the Required checkbox. When a Field is “Required” the
user must select a Value before sending the email message.
1. Click Add.
A Value is a label that is associated with a Field. For example, the Field “Classification” may
contain Values such as Public, Internal, Confidential, and Restricted.
1. Enter a Value which will be stored as metadata for this classification; in this
example, “PUBLIC”.
2. Enter the Display Text which will appear in the Classification Selector Dialog for
users to view; in this example, “Public”.
This text appears in the Classification Selector Dialog. Display text can contain
spaces and punctuation to make it appear more readable.
3. Enter a Tooltip.
Users are able to view this Tooltip when they hover their mouse over the Value in the
Classification Selector Dialog. The Tooltip helps users to more accurately select the
classification for the message. Tooltips should be short and concise.
4. Enter a Description for the Value.
This descriptive text provides users with more information about the correct use of
the Value. This text can be enabled or disabled by the user in the Classification
Selector Dialog.
5. Check the Selected checkbox to set the current Value as the default Value. A default
Value can only be selected when a Field is not “Required” (i.e., the Required
checkbox is not selected).
In this example, we will create abbreviations as alternate names for each Value. These
abbreviations can be used with features such as Subject Labels and Portion Marks.
1. Click Add.
2. Enter a name for the Alternate Display Text group in the Name text box; for example,
“Abbreviations”.
3. Enter the abbreviation for the Value name; for example, “P”.
4. Click OK.
Repeat the previous steps to create the following Values for the CLASSIFICATION Field:
l Internal
l Confidential
l Restricted
1. Navigate to the main Schema Page and create a Field called Department and add
three Values.
In this example we have created the following Values for the Field:
l Engineering
l Human Resources
l Finance
l Senior Managers
2. Once you have created the Field and its Values click the Save button at the bottom of
the Field Page.
Field Conditionality defines the relationships between Fields and Dependent Fields. A
Dependent Field is a Field that only appears when a Value from another Field is selected.
In this example the “DEPARTMENT” Field will only appear when the Value “Internal” is
selected from the “CLASSIFICATION” Field. Departments are not relevant to the other
classification Values.
1. Click Add.
1. Select CLASSIFICATION as the Target Field from the first dropdown list.
This is the only selection because the Department Field only applies to email
messages that have been Classified as Restricted.
3. Select Department from the Dependent Field dropdown list.
4. Check all options:
l Engineering
l Human Resources
l Finance
l Senior Managers
The Schema Field Preview shows you Field Conditionality as it will appear to users now that
“DEPARTMENT” has been added as a Dependent Field of the “Restricted” Value of the
“CLASSIFICATION” Field.
This is created using Fortra Data Classification for Microsoft Outlook for Microsoft Outlook
NOTE: See
policy 2.3 Alert When Confidential Message Sent in sample
UseCasesGuide.TCF file.
The Administrator can create a condition to specify when the Rules contained in the Policy
are run.
For this example, no conditions were created to define when the Rule is applied. The Rules
created for this Policy will be evaluated for each message that is sent.
1. Click New in the Rules section of the page to create a Rule for the Policy.
1. Enter a name for the Rule; in this example, “Alert When Confidential Message Sent”.
This Rule Name indicates the purpose of the Rule.
2. Enter a Rule Description to further describe the purpose of the Rule.
3. Select the Rule Active checkbox to enable the Rule. By default, Rules are disabled
when they are created.
4. Leave Repeat Rule unchecked.
Rules must be explicitly repeated if they apply to recipients or attachments. In this
use case it is not required that the Rule be repeated.
5. Click Save and Continue.
The defined conditions must be evaluated as true in order to apply the Actions associated
with the Rule. In this use case Actions are only applied if the email message has been
classified as Confidential.
Actions also interact with the user via Warning Dialogs, Visual Markings, or by modifying the
email message on the Client desktop.
2. Enter a name for the Action in the Action Name text box; in this example,
“Confidential Classification Alert”.
3. Enter a description of the Action in the Action Description text box. The description
should provide further detail about when and why the Action should be applied.
4. Leave the Policy Event as the default “Occurs when a message is sent”.
5. Select “Alert” from the Action Type dropdown list.
6. Save the Action.
EXAMPLE:
This Rule applies the Confidential Classification Alert Action when the message is sent
if the user selects “Confidential” classification from the Classification Selector Dialog.
As a result, an Alert appears.
NOTE: See
policy 2.4 Alert When Message has Multiple Attachments in sample
UseCasesGuide.TCF file.
1. Select Policies from the side menu bar and click the New button to create a new
Policy.
2. Enter a name for the Policy in the Policy Name text box; in this example, “Alert When
Message contains multiple attachments”.
3. Enter a description of the purpose of the Policy in the PolicyDescription text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default Policies are
disabled when they are created.
5. Select “Occurs when a message is sent” from the Policy Event dropdown list. This is
the Event triggers the Policy.
6. Click Save and Continue.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Alert When Message contains multiple
attachments”.
The defined condition(s) must be evaluated as true in order to apply the Actions associated
with the Rule. In this use case Actions are only applied if the email message contains
multiple attachments.
2. Enter a name for the Action in the Action Name text box; in this example, “Alert –
multiple attachments”.
3. Enter a description of the Action in the Action Description text box. The description
should provide further detail about when and why the Action should be applied.
4. Leave the Policy Event as the default “Occurs when a message is sent”.
5. Select “Alert” from the Action Type dropdown list.
6. Save the Action.
Action parameters are configured by selecting the parameter and clicking the Edit button.
Once you have saved the Action, the Edit Rule Actions window appears.
1. Select “Alert – multiple attachments” from the Available Actions list box.
2. Click the arrow to move the Action to the Selected Actions list box.
3. Click OK.
4. Save the Rule and Policy.
EXAMPLE:
An email is sent that contains more than one attachment. A warning is displayed to the
user.
This is created using Fortra Data Classification for Microsoft Outlook for Microsoft Outlook
NOTE: See
policy 2.5 Alert based on Multiple Conditions Policy in sample
UseCasesGuide.TCF file.
1. Select Policies from the side menu bar and click the New button to create a new
Policy.
2. Enter a name for the Policy in the Policy Name text box; in this example, “Alert
triggered by multiple Conditions”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default Policies are
disabled when they are created.
5. Select “Occurs when a message is sent” from the Policy Event dropdown list. This
Event triggers the Policy.
6. Click Save and Continue.
This Rule will combine email properties and classification metadata to trigger the Actions
associated with the Rule.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Alert When Message Contains Multiple
Conditions”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Leave Repeat Rule unchecked.
6. Rules must be explicitly repeated if they apply to recipients or attachments. In this
use case it is not required that the Rule be repeated.
7. Click Save and Continue.
The defined conditions must be evaluated as true in order to apply the Actions associated
with the Rule. In this use case Actions are only applied if the email message is:
Action parameters are configured by selecting the parameter and clicking the Edit button.
Once you have saved the Action, the Edit Rule Actions window appears.
1. Select “Alert for multiple conditions” from the Available Actions list box.
2. Click the arrow to move the Action to the Selected Actions list box.
3. Click OK.
4. Save the Rule and Policy.
EXAMPLE:
An email message is sent and classified as Confidential with a total size higher than
300k.
This is created using Fortra Data Classification for Microsoft Outlook for Microsoft Outlook
NOTE: See
policy 2.6 Use a Dynamic Property to Assign a Value in sample
UseCasesGuide.TCF file.
Create a Policy
This Policy searches for an external recipient in email messages that are classified as
Confidential.
1. Select Policies from the side menu bar and click New to create a new Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example,“External
Recipients on Confidential Email”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default Policies are
disabled when they are created.
5. Select “Occurs when a message is sent” from the Policy Event dropdown list. This
Event triggers the Policy.
6. Click Save and Continue.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “ExternalRecipient”.
In this example, if a message contains an external recipient, a value will be assigned that
can be used in a conditional expression.
Once you have created an “Assign” Dynamic Property, create a Property Assignment so the
Administrator can input values that Fortra's DCS does not provide out of the box.
1. Click Newin the Dynamic Properties section of the Add/Edit Rule page to create a
new Dynamic Property.
2. Enter the Dynamic Property Name; in this example, “ContainsExternalRecipient”. This
name will appear in the Condition Editor dropdown list.
3. Enter the Dynamic Property Description to further describe the purpose of the
Dynamic Property.
4. Select Assign from the Function dropdown list.
The defined condition(s) must be evaluated as true in order to apply the Action(s)
associated with the Rule.
1. Select the parent rule (in this case “External Recipient”) and click New.
2. Enter a name for the Rule; in this example, “Scan for External Recipients”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule.
5. Select the Repeat Rule checkbox.
Rules must be explicitly repeated if they apply to recipients or attachments. In this
use case the Rule must be repeated so that each message recipient is evaluated by
the Rule.
6. Select “Message.Recipient” from the dropdown list.
7. Click Save and Continue.
1. Click New in the Dynamic Properties section of the Add/Edit Rule page to create a
new Dynamic Property.
Create a third rule or child rule for Scan for External Recipients
1. Select the parent Rule (in this case “Scan for External Recipients”) and click New.
2. Enter a name for the Rule; in this example, “Alert User”.
3. Enter a Rule Ddescription to further describe the Rule.
4. Select the Rule Active checkbox to enable the Rule.
5. Leave Repeat Rule unchecked.
6. Click Save and Continue.
Action parameters are configured by selecting the parameter and clicking the Edit button.
EXAMPLE:
A user attempted to send a message to multiple external recipients. The Dynamic
Function is used to ensure that only one message appears in the Warning dialog.
Visual Markings
Visual Markings include Headers/Footers, Document Markings, Watermarks, Subject Labels,
Portion Marks, and Overlay Icons. These protective markings are designed to promote
security awareness, accountability, and ensure proper handling of corporate information.
Policies can be created to automatically apply Visual Markings and handling instructions to
content to ensure that the sensitivity and business value of corporate information is
identified.
NOTE: See policy 3.1 Apply Document Markings in sample UseCasesGuide.TCF file.
Create a Policy
1. Select Policies from the side menu bar and click the New button to create a Policy.
2. Enter a name for the Policy in the Policy Name text box; in this example, “Apply
Document Markings”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default, Policies are
disabled when they are created.
5. Select “Occurs before any open document is saved” from the Policy Event dropdown
list. This Event that triggers the Policy.
6. Click the Save and Continue button.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Apply Document Markings”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Click Save and Continue.
3. Enter a name for the Action in the Action Name text box; in this example, “Apply
Document Marking to document header”.
4. Enter a description in the Action Description text box. The description should provide
further detail about when and why the action should be applied.
5. Select “Occurs before any open document is saved” from the Policy Event dropdown
list.
6. Select “Apply Document Markings” from the Action Type dropdown list.
For this use case we will update only two parameters: Content and Pages.
1. Click Content in the Parameters section of the page and click the Edit button.
2. In the Edit Parameter Value window, enter the property or text you want to use in the
Document Marking. Use the down arrow icon to select an available property from the
list.
3. In this example the Administrator selected the
Document.Metadata.CLASSIFICATION property which will insert the classification in
the header of the document.
4. Click OK .
7. Click OK.
8. Click Save to save the Action.
Once you have saved the Action, the Edit Rule Actions window appears.
1. Select “Apply Document Markings” from the Available Actions list box.
2. Click the arrow to move the selected Action to the Selected Actions list box.
3. Click OK.
4. Save the Rule and Policy.
EXAMPLE:
When the document is saved a Document Marking indicating the classification is
inserted in the header. This Document Marking is applied as a text box in the header
region of the document. It does not have any impact on existing Headers in the
document.
NOTE: See
policy 3.2 Visual Markings for Restricted Documents in sample
UseCasesGuide.TCF file.
1. Select Policies from the side menu bar and click the New button to create a new
Policy.
2. Enter a name for the Policy in the Policy Name text box; in this example, “Document
Visual Markings”.
This Policy will contain a Rule that defines the conditions when the “Document
Visual Markings” Action is applied.
3. Enter a description of the purpose of the Policy in the Policy Descriptions text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default Policies are
disabled when they are created.
5. Select “Occurs when the currently active document is being closed” from the Policy
Event dropdown list.
6. Click the Save and Continue button.
The Administrator can create a condition to specify when the Rules contained in the Policy
are run. Conditions are defined at the Policy level to define when Rules are invoked.
For this example we did not create any conditions to define when the Rule is applied. The
Rule(s) created for this Policy will be evaluated for each document before it is saved.
1. Click the New button in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Apply Watermark to Restricted
documents”.
3. Enter a Rule Description to further describe the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Click the Save and Continue button.
The defined condition(s) must be evaluated as true in order to apply the Action(s)
associated with the Rule.
1. Click the Edit button in the Condition section of the Add/Edit Rule page.
2. Enter a name for the Action in the Action Name text box; in this example, “Apply
Watermark on Close”.
3. Enter a description of the Action in the Action Description text box. The description
should provide further detail about when and why the action should be applied.
4. Select “Occurs when the currently active document is being closed” from the Policy
Event dropdown list.
5. Select “Apply Watermark” from the Action Type dropdown list.
2. Enter the text you want to display as a Watermark in the Value text box.
The Administrator can enter plain text into the Value text box or replaceable
parameters.
In this example the Administrator has inserted a Field Code; this will insert the
classification selected by user as the Watermark.
The HTML tag “<br>” is also supported. It is used to manually insert a line break in
the watermark. The following will apply a watermark with the classification on the
first line and the user name of the person currently logged into Microsoft Windows
on the second line:
{{Document.Metadata.CLASSIFICATION}}<br>{{UserName}}
3. Click the OK button to save the Action parameter.
4. Click the Save button to save the Action.
Once you have saved the Action, the Edit Rule Actions window appears.
1. Select “Apply Watermark on Close” from the Available Actions list box.
2. Click the arrow to move the selected Action to the Selected Actions list box.
EXAMPLE:
The document contains a Watermark with two lines: the classification on the first and
the user name on the second.
This use case illustrates how to select and define the parameters associated with an
Overlay Icon. DCS provides seven Overlay icons.
This is created using Fortra Data Classification for Microsoft Outlook for Desktop
NOTE: See
policy 3.3 Overlay Icons to Represent Classification in sample
UseCasesGuide.TCF file.
1. Right-click a file.
2. Select a Classification Value.
When a user clicks on a Flyout Menu item, the metadata value is applied to the file. Once the
metadata has been applied to the file a checkmark appears beside the selected Flyout
Menu items.
If icon overlay is enabled the icon will appear on the file indicating that it contains Fortra
Data Classification for Desktop metadata.
NOTE: If
you are using Windows 11, Classification values are located under Show more
options.
If Icon Overlays are enabled, documents that contain Fortra Data Classification for Desktop
metadata are identified with an icon. The icons provided by DCS appear in the bottom left
corner.
This is created using Fortra Data Classification for Microsoft Outlook for Microsoft Outlook
NOTE: See 3.4 Apply a Portion Mark to an Email in sample UseCasesGuide.TCF file.
NOTE: Thisuse case can only be performed using a Fortra Data Classification for
Microsoft Outlook Military license.
The Portion Marking feature is used to classify a portion of an email message. Using
Portion Marks in this way enables users to label specific portions of an email clearly and
with a high level of granularity.
When the Options Ribbon Group is enabled the Add Portion Mark button appears in the
Ribbon.
1. Place your cursor where you would like the Portion Mark to appear. The Portion Mark
will be inserted before, after, or before and after the paragraph depending on how the
feature was configured in Application Settings.
2. Click Add Portion Mark in the Ribbon at the top of the pane.
The Portion Marking window appears.
3. Select a classification.
4. Click OK.
EXAMPLE:
A user has Portion Marked each paragraph. Notice that the Portion Marks appear as
Alternate Display Text. The Portion Marks have been configured to display
abbreviations.
This use case illustrates how to apply a Watermark to documents when they are uploaded
to Dropbox.
NOTE: To perform this procedure a Cloud Storage Activation key is required in addition to
the license file.
1. Select Policies from the side menu bar and click the New button to create a new
Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example, “Apply
Watermark to Dropbox Documents”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default, Policies are
disabled when they are created.
5. Select “Occurs when a document is uploaded to file storage in the cloud” from the
Policy Event dropdown list. This Event triggers the Policy.
6. Click Save and Continue.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Apply Watermark to Dropbox
Documents”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Click Save and Continue.
2. Enter a name for the Action in the Action Name text box; in this example, “Apply
Watermark to Dropbox Documents”.
3. Enter a description of the Action in the Action Description text box.
4. Select “Occurs when a document is uploaded to a file storage in the cloud” Policy
Event. This Event triggers the Action.
5. Select “Apply Watermark” from the Action Type dropdown list.
Action parameters are configured by selecting the parameter and clicking the Edit button.
For this use case, only the Content parameter is changed.
1. Click Content in the Parameters section of the page and click the Edit button.
2. In the Edit Parameter Value window, enter the property/text you want to use for the
Watermark. Use the down arrow icon to select an available property from the list; in
this example:
[Document.Metadata.CLASSIFICATION]
3. Click the OK button to save the changes to the Action parameter.
4. Click the Save button to save the Action.
EXAMPLE:
A Watermark indicating the document classification appears when the user clicks
Upload.
NOTE: See policy 3.6 Advanced Portion Marking in sample UseCasesGuide.TCF file.
NOTE: Thisuse case can only be performed using a Fortra's DCS for Desktop (On-
premises) Military license.
l United Kingdom
l United States
NOTE: Clearthe “Use Global Settings” checkbox before changing Word: Portion Marking
or Word: Ribbon Settings.
1. Select Policies from the side menu bar and click the New button to create a new
Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example, “Five Eyes
Portion Marking”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default, Policies are
disabled when they are created.
5. Select “Occurs when a portion mark is added, edited, or deleted in a document” from
the Policy Event dropdown list. This Event triggers the Policy.
6. Click the Save and Continue button.
1. Click the New button in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Apply Portion Mark to documents”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Click the Save and Continue button.
This Condition specifies that the Rule is only applied when all of the options in the
Releasable to multiselect Field are not selected.
2. Enter a name for the Action in the Action Name text box; in this example, “Apply PM”.
3. Enter a description of the Action in the Action Description text box.
4. Select “Occurs when a Portion Mark is added, edited, or deleted in a document” from
the Policy Event dropdown list. This Event triggers the Action.
5. Select “Apply Portion Mark” from the Action Type dropdown list.
2. Enter a name for the Action in the Action Name text box; in this example, “Apply PM
Metadata”.
3. Enter a description of the Action in the Action Description text box.
4. Select “Set Classification” from the Action Type dropdown list.
1. Click the New button in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Apply Five Eyes Portion Mark”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
Add the Action for the second rule to add the Portion Mark metadata
2. Select the “Apply PM Metadata” Action from the list of available actions and move it
to the Selected Actions list.
2. Enter a name for the Action in the Action Name text box; in this example, “Apply
portion marking five eyes”.
3. Enter a description of the Action in the Action Description text box.
4. Select “Occurs when a Portion Mark is added, edited, or deleted in a document” from
the Policy Event dropdown list. This Event triggers the Action.
5. Select “Apply Portion Mark” from the Action Type dropdown list.
1. Select “Apply Five Eyes Portion Marking” from the Available Actions list box.
2. Click the arrow to move the Action to the Selected Actions list box.
3. Click OK.
4. Save the Rule and Policy.
EXAMPLE:
The user has selected to include all five Values in the Portion Mark.
When all five options are selected, “Five Eyes” is inserted as the Portion Mark.
When only one option is selected, the original Value is inserted as the Portion Mark.
This is created using Fortra Data Classification for Microsoft Outlook for Microsoft Outlook
NOTE: See
policy 3.7-1 Display Body Tag To Email before sent in
sampleUseCasesGuide.TCF file.
1. Select Policies from the side menu bar and click the New button to create a new
Policy.
NOTE: Only use this Policy if you have configured the Schema to include a default
classification.
2. Enter a name for the Policy in the Policy Name text box; in this example, “Display
Body Tags in Email before it is sent”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default, Policies are
disabled when they are created.
5. Select “Occurs when a new message is started” from the Policy Event dropdown list.
This Event triggers the Policy.
6. Click Save and Continue.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Display Body Tag to email author”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Leave Repeat Rule unchecked.
Rules must be explicitly repeated if they apply to recipients or attachments. In this
use case repetition of the Rule is not required.
6. Click Save and Continue.
2. Enter a name for the Action in the Action Name text box; in this example, “Body Tag”.
3. Enter a description of the Action in the Action Description text box.
4. Select “Occurs when a new message is started” from the Policy Event dropdown list.
This Event triggers the Action.
5. Select “Body Tagging” from the Action Type dropdown list.
6. Save the Action.
Action parameters are configured by selecting the parameter and clicking the Edit button.
Once you have saved the Action, the Edit Rule Actions window appears.
This Policy updates the Body Tags in an email when the classification is changed.
NOTE: See
policy 3.7-2 Update Body Tag When Classification changed in sample
UseCasesGuide.TCF file.
1. Select Policies from the side menu bar and click the New button to create a new
Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example, “Update
Body Tags when Classification is changed”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default, Policies are
disabled when they are created.
5. Select “Occurs when user changes the classification of a message” from the Policy
Event dropdown list. This Event triggers the Policy.
6. Click Save and Continue.
This Rule is used to update the classification when the Classification of a message is
changed.
NOTE: See
policy 3.7-3 Apply Body Tag When a Message is sent in sample
UseCasesGuide.TCF file.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Update Body Tags when Classification is
changed”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Leave Repeat Rule unchecked.
6. Click Save and Continue.
1. Click the Add/Edit button in the Actions When True section of the Rule.
2. Select “Body Tag” from the Available Actions list box.
3. Click the arrow to move the Action to the Selected Actions list box.
4. Click OK.
5. Save the Rule and Policy.
This Policy updates the Body Tags in an email when the message is sent.
1. Select Policies from the side menu bar and click the New button to create a new
Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example, “Apply Body
Tag When a Message is Sent”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default, Policies are
disabled when they are created.
5. Select “Occurs when message is sent” from the Policy Event dropdown list. This
Event triggers the Policy.
6. Click Save and Continue.
This Rule is used to update the classification when the message is sent.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Apply Body Tag When a Message is
Sent”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Leave Repeat Rule unchecked.
6. Click Save and Continue.
1. Click Add/Edit button in the Actions when True section of the Rule.
2. Select “Body Tag” from the Available Actions list box.
3. Click the arrow to move the Action to the Selected Actions list box.
4. Click OK.
5. Save the Rule and Policy.
1. .
EXAMPLE:
By default, the message contains a Body Tag.
When the message author changes the Classification from the default, the Body Tag is
automatically updated. The Body Tag is updated once again on Send to ensure the
contents of the marking have not been edited by the message author.
This is created using Fortra Data Classification for Microsoft Outlook for Microsoft Outlook
NOTE: See
policy 4.1 Assign a Classification to an Email in sample
UseCasesGuide.TCF file.
1. Select Policies from the side menu bar and click the New button to create a new
Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example, “Classify
Email sent to the Fortra domain”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default, Policies are
disabled when they are created.
5. Select “Occurs when message is sent” from the Policy Event dropdown list. This
Event triggers the Policy.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Check Recipient Domain”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Select the Repeat Rule checkbox.
Rules must be explicitly repeated if they apply to recipients or attachments. In this
use case the Rule must be repeated so that each recipient in the email message is
evaluated by the Rule.
6. Select “Message.Recipient” from the dropdown list.
7. Click Save and Continue.
The defined condition must be evaluated as true in order to apply the Action(s) that have
been associated with the Rule. In this use case Actions are only applied if the email
message recipient is fortra.com.
2. Enter a name for the Action in the Action Name text box; in this example, “Classify
email sent to the Fortra domain”.
3. Enter a description of the Action in the Action Description text box. The description
provides further details about when and why the Action should be applied.
4. Select “Occurs when a message is sent” from the Policy Event dropdown list. This
Event triggers the Action.
5. Select “Set Message Classification” from the Action Type dropdown list.
1. Select “Classify email sent to the Fortra domain” from the Available Actions list box.
2. Click the arrow to move this Action to the Selected Actions list box.
3. Click OK.
4. Save the Rule and Policy.
EXAMPLE:
In this example a user has attempted to send an email message using the default
classification “Public”.
Because the message is being sent to a recipient with the Fortra.com domain, the email
classification is automatically set to Internal.
NOTE:
Microsoft Word and Excel are able to open non-Office filetypes like TXT, RTF, and CSV.
When these files are classified and saved from inside of Microsoft Word or Excel,
metadata, including classification and custom properties, is not retained.
1. Select Policies from the side menu bar and click New to create a new Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example, “Classify
documents based on location”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default, Policies are
disabled when they are created.
5. Select “Occurs when a document is opened” from the Policy Event dropdown list.
This Event triggers the Policy.
6. Click Save and Continue.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Set Classification – Internal”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Click Save and Continue.
The defined condition must be evaluated as true in order to apply the Actions that have
been associated with the Rule. In this use case Actions are only applied if the document is
opened from the following location:
1. Select “Classify documents based on location” from the Available Actions list box.
2. Click the arrow to move this Action to the Selected Actions list box.
3. Click OK.
4. Save the Rule and Policy.
This is created using Fortra Data Classification for Microsoft Outlook for Microsoft Outlook
EXAMPLE:
When a recipient forwards a message and changes the classification a task pane alert
appears.
Ensure you have Term Set Name, Term Name, and Term GUID set in the Managed Metadata
Property of your SharePoint Document Library. These values are used in the Document
Server Name and Document Server parameters of the Set Document Server Property Action.
See Define the Action Parameters on page 96. You set the Terms using the SharePoint
Admin Center. For more information, see https://learn.microsoft.com/en-
us/sharepoint/create-and-manage-terms.
NOTE: See policy 5.1 Document Server Properties in sample UseCasesGuide.TCF file.
1. Select Policies from the side menu bar and click New to create a new Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example, “Set
Document Server Properties”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default, Policies are
disabled when they are created.
5. Select “Occurs when a document is opened” from the Policy Event dropdown list.
This Event triggers the Policy.
6. Click Save and Continue.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “SetDocumentProperty”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Click Save and Continue.
The defined condition must be evaluated as true in order to apply the Actions associated
with the Rule. In this use case, the first rule is only applied when the Document Server
Properties defined in SharePoint are of a higher classification than those defined by
Document Classification.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “SetDocumentServerProperty”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Click Save and Continue .
The defined condition must be evaluated as true in order to apply the Actions that have
been associated with the Rule. In this use the second rule is only applied when the
Document Server Properties defined in SharePoint are of a lower classification than those
defined by Document Classification in the document properties.
l Server Property Value – Enter the metadata value that will be assigned to the
document as the Document Server Property. In this case it will be the selected
Classification defined in the Document Properties by Data Classification for
Microsoft Office. This value is taken from the Term Name and Term GUID set in
the Managed Metadata property of your SharePoint Document Library. The
Term GUID links your SharePoint Document Library to the action in DCS.
2. Save the Action.
l Detailed Description – Enter the display message text that will be displayed to
the user in the Warning Dialog.
l Expand Detailed Description - Set to Yes if you want the detailed description to
appear by default.
l Enable Justification – Set to False by default. When True, the user is permitted
to provide information about why they are disregarding the policy warning and
still sending the email message.
l Severity – Possible values are Log Only, Warn, and Prevent. In this use case the
user will be warned when they violate the policy.
2. Save the Action.
For example, if a user selects CONFIDENTIAL, this word is stored in the Keywords document
property. Many Adobe PDF conversion tools preserve the Keywords properties, so this is a
way to maintain the Fortra's DCS for Office (On-premises) metadata in addition to the visual
labels when converting to PDF.
If you prefer not to use PDF keywords to maintain PDF metadata, you can use a Custom
Action to save Microsoft Office files as PDFs. See Save Microsoft Office documents as PDF
with classification metadata on page 108. This Custom Action writes metadata as PDF
keywords as well as custom properties.
NOTE: See
policy 5.2 Add Keywords to Office documents in sample
UseCasesGuide.TCF file
1. Select Policies from the side menu bar and click the New button to create a new
Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example, “Add
Keywords to Office documents”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default, Policies are
disabled when they are created.
5. Select “Occurs before any open document is saved” from the Policy Event dropdown
list. This Event triggers the Policy.
6. Click the Save and Continue button.
This Rule does not contain any conditions because we want to add keywords to all
documents.
1. Click the New button in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Add Keywords to Office documents”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Click the Save and Continue button.
2. Enter a name for the Action in the Action Name text box; in this example, “Add
Keywords”.
3. Enter a description of the Action in the Action Description text box. The description
provides further details about when and why the Action should be applied.
4. Select “Occurs before any open document is saved” from the Policy Event dropdown
list. This Event triggers the Action.
5. Select “Add Keywords” from the Action Type dropdown list.
Action parameters are configured by selecting the parameter and clicking the Edit button.
Once you have saved the Action, the Edit Rule Actions window appears.
This is created using Fortra Data Classification for Microsoft Outlook for Desktop
NOTE: See
policy 5.3 Set Classification During Patrol Scan in sample
UseCasesGuide.TCF file.
2. Find “Patrol Settings” in the Feature Name column and click Edit in the “Desktop”
column.
3. Select the Enable Patrol checkbox to enable Patrol.
4. Select the Enable Quick Scan and Enable Full Scan checkboxes.
5. In the Exclusion Pattern section, click Add.
6. Enter “*.tmp” in the Exclusion Pattern text box to exclude temporary files from the
scan.
7. In the Watched Folders section, click Add.
8. Enter “{Environment.UserProfile}\Downloads” in the Folder Name text box to scan
the downloads folder on each user’s computer.
9. Click Save.
1. Select Policies from the side menu bar and click the New button to create a new
Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example, “Classify
files in Downloads folder”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default, Policies are
disabled when they are created.
5. Select “Occurs when a file is detected by an automated process” from the Policy
Event dropdown list. This Event triggers the Policy.
6. Click Save and Continue.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Classify downloads”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Select the Repeat Rule checkbox.
Rules must be explicitly repeated if they apply to files. In this use case the Rule must
be repeated so that each file is evaluated by the Rule.
6. Select “File” from the dropdown list.
7. Click Save and Continue.
2. Enter a name for the Action in the Action Name text box; in this example, “Classify
files in downloads folder”.
3. Enter a description of the Action in the Action Description text box. The description
provides further details about when and why the Action should be applied.
4. Select “Occurs when a file is detected by an automated process” from the Policy
Event dropdown list. This Event triggers the Action.
5. Select “Set Classification” from the Action Type dropdown list.
Action parameters are configured by selecting the parameter and clicking the Edit button.
NOTE: See policy 5.4 Add Box Metadata to Documents in sample UseCasesGuide.TCF
file.
1. Select Policies from the side menu bar and click the New button to create a new
Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example, “Add Box
Metadata to Documents”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default, Policies are
disabled when they are created.
5. Select “Occurs when a document is uploaded to a file storage in the cloud” from the
Policy Event dropdown list. This Event triggers the Policy.
6. Click the Save and Continue button.
1. Click the New button in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Add Box Metadata to Documents”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Click the Save and Continue button.
1. Enter a name for the Action in the Action Name text box; in this example, “Add Box
Metadata to Documents”.
2. Enter a description of the Action in the Action Description text box. The description
provides further details about when and why the Action should be applied.
3. Select “Occurs when a document is uploaded to a file storage in the cloud” from the
Policy Event dropdown list. This Event triggers the Action.
4. Select “Add Box metadata” from the Action Type dropdown list.
Action parameters are configured by selecting the parameter and clicking the Edit button.
1. Set the Metadata to set parameter Value to a Key and Value in the following format:
Key1=Value1
Key2=Value2
In this example we added:
Document Owner=TITUS, Inc.
Classification=[Document.Metadata.Classification]
Keys are used to describe the Box metadata associated with the document such as
Classification or Author.
Values can include:
l Plain text
l Out of the box Document Properties provided by Microsoft Office. Document
Properties must be surrounded by square or double curly braces.
l The Values created for the Schema entered in the following format
[Document.Metadata.<Field>]
2. Click the Save button to save the Action.
EXAMPLE:
A document was uploaded to a folder in Box.
1. Select the Box folder that contains the uploaded document.
2. Select the actual document.
3. In the right-side panel select Info.
4. Scroll to the bottom to view the Custom Metadata.
To use this Action, your organization's license must include the EnableExternalProcessing
custom feature. This license must be uploaded and applied to your configuration. Without
this custom feature, Apply Custom Action does not appear in the list of Actions.
NOTE: The TCOSaveAsPDF Custom Action does not perform any Policy evaluations. If a
document does not have DCS metadata, no metadata is applied to the resulting PDF. If
you only want to save a document as PDF when it meets certain criteria (such as having
DCS metadata applied), you can check these criteria using Rule conditions.
This use case repurposes the Check Policy button to save Office documents as PDFs that
contain classification metadata. The Check Policy button is a configurable button that can
be added to the Titus group of the Microsoft Office ribbon. To instruct users to use this
button rather than the Microsoft Office PDF buttons, you can relabel the button so it is more
descriptive.
1. Select Policies from the side menu bar and click the New button to create a new
Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example, Save as PDF
using Check Policy.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default, Policies are
disabled when they are created.
5. From the Policy Event dropdown list, select the Occurs when user clicks the Check
Policy button on a document Event. This Event triggers the Policy.
6. Click Save and Continue.
This Rule does not contain any conditions because we want to save documents as PDF if
the user requests it. This means that if the document does not have metadata applied, no
metadata is applied to the resulting PDF. See the note at the beginning of this topic for more
information.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, Save as PDF.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Click Save and Continue.
The PDF classification is visible in the Fortra Data Classification for Desktop interface.
NOTE: This example shows the DCS for Desktop flyout menu. These menus are not
enabled by default, but can be enabled in the Desktop add-in settings. See the
Fortra's Data Classification Suite (DCS) Administration Console (On-premises) User
Guide for more information. If you are using Windows 11, Classification options are
located under Show more options.
RMS must be set up within your organization in order to implement this use case.
1. Select Policies from the side menu bar and click the New button to create a new
Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example, “Apply RMS”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default, Policies are
disabled when they are created.
5. Select “Occurs before any open document is saved” from the Policy Event dropdown
list. This Event triggers the Policy.
6. Click Save and Continue.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example “Apply RMS - Restricted”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Click Save and Continue.
The defined condition must be evaluated as true in order to apply the Action(s) that have
been associated with the Rule. In this use case Actions are only applied if the document is
classified as “Restricted”.
Action parameters are configured by selecting the parameter and clicking Edit .
1. Set the Template Name parameter Value to the name of the RMS Template you want
to apply in the Value text box.
RMS must be set up within your organization in order to implement this Action.
2. Click Save to save the Action.
Once you have saved the Action, the Edit Rule Actions window appears.
1. Select “Apply RMS - Restricted” from the Available Actions list box.
2. Click the arrow to move it to the Selected Actions list box.
3. Click OK.
4. Save the Rule and Policy.
This is created using Fortra Data Classification for Microsoft Outlook for Windows
Create the Attachment Policy. See the use case in Check email attachments on page 124
for instructions.
1. Enter a name for the Rule; in this example, “Sign and Encrypt emails with
attachments”.
2. Enter a Rule Description to further describe the purpose of the Rule.
3. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
4. Leave Repeat Rule unchecked.
Rules must be explicitly repeated if they apply to recipients or attachments. In this
use case repetition of the Rule is not required.
5. Click Save and Continue.
The defined condition must be evaluated as true in order to apply the Action(s) that have
been associated with the Rule. In this use case Actions are only applied if the email
message contains an attachment.
2. Enter a name for the Action in the Action Name text box; in this example, “Sign and
Encrypt emails with attachments”.
3. Enter a description of the Action in the Action Description text box. The description
provides further details about when and why the Action should be applied.
4. Select “Occurs when a message is sent” from the Policy Event dropdown list. This
Event that triggers the Action.
5. Select “S/MIME Sign/Encrypt” from the Action Type dropdown list.
Action parameters are configured by selecting the parameter and clicking the Edit button.
Once you have saved the Action, the Edit Rule Actions window appears.
1. Select “Sign and Encrypt emails with attachments” from the Available Actions list
box.
2. Click the arrow to move the Action to the Selected Actions list box.
3. Click OK.
4. Save the Rule and Policy.
EXAMPLE:
When the user sends an email message that contains an attachment, the Policy
automatically triggers the encryption and digital signatures.
NOTE: See
policy 6.3 Apply Custom RMS to Documents in sample
UseCasesGuide.TCF file.
1. Select Policies from the side menu bar and click New to create a new Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example, “Apply
Custom RMS to Documents”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default, Policies are
disabled when they are created.
5. Select “Occurs before any open document is saved” from the Policy Event dropdown
list. This Event that triggers the Policy.
6. Click Save and Continue.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Apply Custom RMS to Documents”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Click Save and Continue.
The defined condition(s) must be evaluated as true to apply the Actions that will be
associated with the Rule.
2. Enter a name for the Action in the Action Name text box; in this example, “Apply
Custom RMS to Documents”.
3. Enter a description of the Action in the Action Description text box. The description
provides further details about when and why the Action should be applied.
4. Select “Occurs before any open document is saved” from the Policy Event dropdown
list. This Event that triggers the Action.
5. Select “Apply Custom RMS to Documents” from the Action Type dropdown list.
Action parameters are configured by selecting the parameter and clicking the Edit button.
l Expiry – Use the Calendar Control to select the expiry date; in this example, January
1, 2016.
l Print Content - Set to True to allow users to print document content.
l Access Content Programmatically – Set to True to allow the use of macros, add-ins,
and Data Classification in this document.
l RequestPermission URL- Enter an URL where users can request and be granted
additional permissions.
l Require a connection – Select True to require a connection to verify a user’s
permission.
2. Save the Action.
EXAMPLE:
When the author saves the document classified as Restricted, a custom RMS template
is applied.
Attachment checking
The policy engine can be used to build advanced policies that take into account content,
recipients, sender, classification, and other attributes when checking attachments.
1. Select Policies from the side menu bar and click New to create a new Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example, “Attachment
Policy”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default, Policies are
disabled when they are created.
5. Select “Occurs when a message is sent” from the Policy Event dropdown list. This
Event that triggers the Policy.
6. Click Save and Continue.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Attachment size and count”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Select the Repeat Rule checkbox.
Rules must be explicitly repeated if they apply to recipients or attachments. In this
use case the Rule must be repeated so that each attachment in the email message is
evaluated by the Rule.
6. Select “Message.Attachment” from the dropdown list.
7. Click Save and Continue.
The defined condition must be evaluated as true in order to apply the Action(s) that have
been associated with the Rule. In this use case Actions are only applied if the email
message contains two or more attachments or if the total size of the attachments exceeds
300 KB.
1. In the Actions When True section, Select “Break” from the Behavior Flow dropdown
list.
This prevents multiple messages from appearing on the Client machine if more that
one attachment triggers the Rule.
2. Enter a name for the Action in the Action Name text box; in this example, “Upload to
SharePoint Warning”.
3. Enter a description of the Action in the Action Description text box. The description
provides further details about when and why the Action should be applied.
4. Select “Occurs when a message is sent” from the Policy Event dropdown list. This is
the Event that triggers the Action.
5. Select “Alert” from the Action Type dropdown list.
Action parameters are configured by selecting the parameter and clicking the Edit button.
Once you have saved the Action, the Edit Rule Actions window appears.
1. Select “Upload to SharePoint Warning” from the Available Actions list box.
2. Click the arrow to move the Action to the Selected Actions list box.
3. Click OK.
4. Save the Rule and Policy.
EXAMPLE:
A user has sent an email message that contains more than two attachments and the
total size of the attachments exceeds 300 KB. The Warning Dialog appears instructing
the user to upload the attachments to SharePoint.
NOTE: The description text for this warning will be duplicated for each attachment
included in the email. To prevent duplicate descriptions, see Use a Dynamic
Property to assign a value on page 38 for more information.
This is created using Fortra Data Classification for Microsoft Outlook for Microsoft Outlook
Create the Attachment Policy. See Check email attachments on page 124 for instructions.
1. Click the New button in the Dynamic Properties section of the Add/Edit Rule page to
create a new Dynamic Property.
2. Enter the Dynamic Property Name; in this example, “MaxAttachmentClassification”.
3. Enter the Dynamic Property Description.
4. Select “Assign” from the Function dropdown list.
The second Rule is a child of DefineDynamicProperty. To create a child, click on the Rule
that will become the parent and click the New button below the list of Rules in a Policy.
1. Click the parent rule, DefineDynamicProperty, in the list of Rules, and then click the
New button to create a new child rule.
This Rule iterates through the message attachments searching for scenarios where an
attachment is classified at a higher level than the message.
1. Click the Edit button in the Condition section of the Add/Edit Rule page.
2. Click the Add Condition ( ) button.
3. Click the Properties dropdown arrow and select
“Message.Attachment.Metadata.CLASSIFICATION”.
4. Click the Operator dropdown arrow and select the “>” operator.
5. Enter “[Message.Metadata.CLASSIFICATION]” in the Value text box.
When this condition is evaluated as true the Display Bad Attachments Action is applied.
The Action is used to warn users and optionally allows blocking of emails with attachments
that violate a Policy. The Warning Dialog that appears when this Action is triggered allows
users to upgrade the Classification of the email message.
2. Enter a name for the Action in the Action Name text box; in this example, “Display
Bad Attachments”.
3. Enter a description of the Action in the Action Description text box.
4. Select “Occurs when a message is sent” from the Policy Event dropdown list.
5. Select “Classification Alert” from the Action Type dropdown list.
Action parameters are configured by selecting the parameter and clicking the Edit button.
Once you have saved the Action, the Edit Rule Actions window appears.
1. Select “Upgrade Message Classification” and “Display Bad Attachments” from the
Available Actions list box.
2. Click the arrow to move it to the Selected Actions list box.
3. Click OK.
4. Save the Rule and Policy.
1. Click the parent rule, GetHighestClassifiedAttachment, in the list of Rules, and then
click the New button to create a new child rule.
Property Assignment allows the Administrator to input values to the following Dynamic
Properties once they are defined in a Rule.
This Rule searches for instances where the highest classified document is greater than the
classification of the document. The Upgrade Message Classification Action is applied if this
condition is evaluated as true.
The Upgrade Message button applies the required classification to the message so that is
as high as the highest classified attachment included in the message.
The Action is used to warn users and optionally allows blocking of emails with attachments
that violate a Policy. The Warning Dialog that appears when this Action is triggered allows
users to upgrade the Classification of the email message.
5. Select “Set Message Classification” from the Action Type dropdown list.
Action parameters are configured by selecting the parameter and clicking the Edit button.
Once you have saved the Action, the Edit Rule Actions window appears.
1. Select “Upgrade Message Classification” and “Display Bad Attachments” from the
Available Actions list box.
2. Click the arrow to move it to the Selected Actions list box.
3. Click OK.
4. Save the Rule and Policy.
EXAMPLE:
A user is able to click the Upgrade Message button to classify the message at the same
level as the highest classified attachment.
The email was classified as Public and the attachments were classified as Internal.
NOTE: See
policy 7.3 Keyword Attachment Validation in sample
UseCasesGuide.TCF file.
See the Fortra's Data Classification Suite (DCS) Administration Console (On-premises) User
Guide for more information on content validation.
3. Enter a name for the Content Validation Profile in the Profile Name text box; in this
example, “Attachment Keywords”.
The Profile name is required when creating a Dynamic Property to run the Profile as
part of a Policy. The name identified here must be exactly the same as the name
used in the Dynamic Property.
4. Select “Match Any” from the Match Mode dropdown list. This activates the profile if
the criteria meets any combination of the defined rules.
5. Enter the Violation Text string; in this example, “prohibited keyword detected”. The
phrase contained in this field can be used as text of a user alert without showing the
exact values found.
6. Click Save and Continue.
Create a Policy
The Policy will execute the “Attachment Keywords” Content Validation Profile.
1. Select Policies from the side menu bar and click New to create a new Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example, “Keyword
Attachment Validation”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default Policies are
disabled when they are created.
5. Select “Occurs when message is sent” from the Policy Event dropdown list. This is
the Event that triggers the Policy.
6. Click Save and Continue.
This condition will prevent the Rules in the Policy from executing when there are no
attachments included in the email message.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Check Attachments for Keywords”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Select the Repeat Rule checkbox.
Rules must be explicitly repeated if they apply to recipients or attachments. In this
use case the Rule must be repeated so that each attachment in the email message is
evaluated by the Rule.
6. Select “Message.Attachment” from the dropdown list.
7. Click Save and Continue.
This Dynamic Property is used to review each email attachment and validate its contents.
1. Click New in the Dynamic Properties section of the Add/Edit Rule page to create a
new Dynamic Property.
2. Enter the Dynamic Property Name; in this example, “AttachBody”. This name will
appear in the Condition Editor dropdown list.
3. Enter the Dynamic Property Description.
4. Select “GetTextFromFile” from the Function dropdown list.
This Condition ensures that the document contains text that can be used to evaluate the
Rule.
1. Click the Edit button in the Condition section of the Add/Edit Policy page.
2. Click the Add Condition ( ) button.
3. Click the Properties dropdown arrow and select “AttachBody”.
4. Select the “!=” operator from the Operator dropdown list.
5. Leave the Value text box blank.
6. Click OK.
This second Rule is a child of the Check Attachments for Keywords Rule.
1. To create a child Rule, click on the parent rule Check Attachments for Keywords in
the list of Rules, and then click New to create a new child rule.
2. Enter a name for the Rule; in this example, “Check Attachment Body".
3. Enter a Rule Description to describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule.
5. Leave Repeat Rule unchecked.
6. Click Save and Continue.
This Dynamic Property is used to run Content Validation Profile and use the results.
1. Click Newin the Dynamic Properties section of the Add/Edit Rule page to create a
new Dynamic Property.
2. Enter the Dynamic Property Name; in this example, “RunCV”. This name will appear in
the Condition Editor dropdown list.
3. Enter the Dynamic Property Description.
4. Select “RunContentValidation” from the Function dropdown list.
Dynamic function parameters are configured by selecting the parameter and clicking the
Edit button.
This Condition ensures that there are matches in order to apply the Action.
2. Enter a name for the Action in the Action Name text box; in this example, “Keyword
Alert”.
3. Enter a description of the Action in the Action Description text box. The description
provides further details about when and why the Action should be applied.
4. Select “Occurs when a message is sent” from the Policy Event dropdown list. This is
the Event that triggers the Action.
5. Select “Alert” from the Action Type dropdown list.
EXAMPLE:
Prohibited keywords detected in attached documents cannot be redacted using the
Policy Alert dialog. The user must open the attached document and redact or remove
the contents before reattaching it to the email message.
This is created using Fortra Data Classification for Microsoft Outlook for Microsoft Outlook
4. Enter a name for the Rule; in this example, “Prevent Unclassified Attachments”.
5. Enter a Rule Description to further describe the Rule.
6. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
7. Select the Repeat Rule checkbox.
Rules must be explicitly repeated if they apply to recipients or attachments. In this
use case the Rule is repeated so that each attachment in the email is evaluated by
the rule.
8. Select “Message.Attachment” from the drop down list.
9. Click Save and Continue.
The defined condition must be evaluated as true in order to apply the Actions that have
been associated with the Rule. In this use case Actions are only applied if the email
message contains one or more attachments that do not contain metadata.
This Action provides a warning and optionally allows blocking of emails with attachments
that violate policy.
2. Enter a name for the Action in the Action Name text box; in this example, “Block
Unclassified Attachments”.
3. Enter a description of the Action in the Action Description text box. The description
provides further details about when and why the Action should be applied.
4. Select “Occurs when a message is sent” from the Policy Event dropdown list. This is
the Event that triggers the Action.
5. Select “Alert” from the Action Type dropdown list.
Action parameters are configured by selecting the parameter and clicking the Edit button.
Once you have saved the Action, the Edit Rule Actions window appears.
1. Select “Block Unclassified Attachments” from the Available Actions list box.
2. Click the arrow to move the Action to the Selected Actions list box.
3. Click OK.
4. Save the Rule and Policy.
This is created using Fortra Data Classification for Microsoft Outlook for Microsoft Outlook
1. Select Policies from the side menu bar and click the New button to create a new
Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example, “Check for
Unclassified Attachments”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default Policies are
disabled when they are created.
5. Select “Occurs when message is sent” from the Policy Event dropdown list. This is
the Event that triggers the Policy.
6. Click the Save and Continue button.
1. Click the New button in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Check for Unclassified Attachments”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Select the Repeat Rule checkbox.
Rules must be explicitly repeated if they apply to recipients or attachments. In this
use case the Rule must be repeated so that each attachment in the email message is
evaluated by the Rule.
6. Select “Message.Attachment” from the dropdown list.
7. Click the Save and Continue button.
The defined condition must be evaluated as true in order to apply the Actions that have
been associated with the Rule. In this use case Actions are only applied if the email
message contains one or more attachment that does not contain any metadata.
1. Click the Edit button in the Condition section of the Add/Edit Rule page.
2. Click the Add Condition ( ) button.
3. Click the Properties dropdown arrow and select
“Message.Attachment.HasMetadata”.
4. Select the “=” operator from the Operator dropdown list.
5. Enter “False” in the Value text box.
6. Click the OK button.
1. Click the parent rule, Check for Unclassified Attachments, in the list of Rules, and
then click the New button to create a new child rule.
2. Enter a name for the Rule; in this example, “Check for Images in Email Signature”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule.
5. Select the Repeat Rule checkbox. This Rule must be repeated so that each
attachment in the email message is evaluated by the Rule.
6. Select “Message.Attachment” from the dropdown list.
7. Click the Save and Continue button.
The defined condition must be evaluated as true in order to apply the Action(s) that have
been associated with the Rule. In this use case Actions are only applied if the attachment
path is not blank.
1. Click the Edit button in the Condition section of the Add/Edit Rule page.
2. Click the Add Condition ( ) button.
3. Click the Properties dropdown arrow and select “Message.Attachment.Path”.
4. Select the “!=” operator from the Operator dropdown list.
5. Leave the Value text box blank.
6. Click the OK button.
This Action provides a warning and optionally allows blocking of emails with attachments
that violate policy.
2. Enter a name for the Action in the Action Name text box; in this example, “Block
Unclassified Attachments”.
3. Enter a description of the Action in the Action Description text box. The description
provides further details about when and why the Action should be applied.
4. Select “Occurs when a message is sent” from the Policy Event dropdown list. This is
the Event that triggers the Action.
5. Select “Alert” from the Action Type dropdown list.
Action parameters are configured by selecting the parameter and clicking the Edit button.
Once you have saved the Action, the Edit Rule Actions window appears.
1. Select “Block Unclassified Attachments” from the Available Actions list box.
2. Click the arrow to move the Action to the Selected Actions list box.
3. Click OK.
4. Save the Rule and Policy.
EXAMPLE:
A user has attached a document that has not been classified by Fortra Data
Classification for Microsoft Office.
A Policy Warning has appeared instructing the sender to classify the attachment before
sending it as an email attachment.
The only option available to the sender is to return to the message. This message
cannot be sent until the attachment is removed or classified because the Alert Action
was set to Prevent.Once the attachment is classified the email message can be sent.
The image in the email signature will not generate an Alert.
This is created using Fortra Data Classification for Microsoft Outlook for Microsoft Outlook
4. Enter a name for the Rule; in this example, “Classify Unclassified Attachments”.
5. Enter a Rule Description to further describe the Rule.
6. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
7. Select the Repeat Rule checkbox.
Rules must be explicitly repeated if they apply to recipients or attachments. In this
use case the Rule is repeated so that each attachment in the email is evaluated by
the rule.
8. Select Message.Attachment from the drop down list.
9. Click Save and Continue.
The defined condition must be evaluated as true in order to apply the Actions that have
been associated with the Rule. In this use case Actions are only applied if the email
message contains one or more attachments that do not contain metadata.
2. Enter a name for the Action in the Action Name text box; in this example, Classify
Unclassified Attachments.
3. Enter a description of the Action in the Action Description text box. The description
provides further details about when and why the Action should be applied.
4. Select Occurs when a message is sent from the Policy Event dropdown list. This is
the Event that triggers the Action.
5. Select Set Attachment Classifications from the Action Type dropdown list.
Action parameters are configured by selecting the parameter and clicking the Edit button.
Once you have saved the Action, the Edit Rule Actions window appears.
1. Select Classify Unclassified Attachments from the Available Actions list box.
2. Click the arrow to move the Action to the Selected Actions list box.
3. Click OK.
4. Save the Rule and Policy.
EXAMPLE:
A user has attached a PDF that has not been classified by Fortra's DCS for Desktop (On-
premises), and a Word document that has been classified as Confidential by Fortra's
DCS for Office (On-premises). Since the recipient belongs to the fortra.com domain, the
email is reclassified as DCS Internal and all unclassified attachments are classified as
DCS Internal when the email is sent. When a Set Attachment Classifications Action is
triggered, a temporary copy of the attachment is stored and classified. When the
temporary copy is classified, the original attachment is deleted from the message and
the classified copy is attached. The original source file is not classified or reclassified.
The attachment order is not preserved.
Using right-click attachment classification, you can apply a classification to most file types
that can be written to using an Adapter.
This feature does not support file types that are read or written to using the ADS Metadata
Adapter. Classification information can be read and applied but is not sent in the email. The
ADS Metadata Adapter is used when no other Adapters can classify the file type. For more
information, see the Fortra's Data Classification Suite (DCS) Administration Console (On-
premises)User Guide.
NOTE:
l This feature is only available in Microsoft Outlook 2016 or higher.
l This feature cannot be disabled, but can be overridden by applying Attachment
Classifications using a Policy. See Apply Classifications to unclassified
attachments on page 158 for an example use case.
1. In the Message window of an HTML- or Plain Text formatted email, right-click the
attachment you want to classify.
2. Select Select from the context menu.
NOTE: The label that appears in the context menu is controlled by the Outlook Ribbon
Settings. For more information, see Fortra's Data Classification Suite (DCS)
Administration Console (On-premises) User Guide.
3. The Classification Selector Dialog appears. The name of the attachment you are
classifying appears in the title bar.
4. Select a classification for the attachment. If the attachment is already classified, the
classification is preselected.
If the attachment cannot be read, the current classification of the attachment is not
displayed properly. This may occur if the attachment is password-protected, RMS-
protected, or otherwise encrypted.
5. Click OK.
A temporary copy of the attachment is stored and classified. When the temporary copy is
classified, the original attachment is deleted from the message and the classified copy is
attached. The original source file is not classified or reclassified. The attachment order is
not preserved.
NOTE: If the attachment cannot be classified, the user is not notified. The failure event is
written to the Windows event log and audit log.
NOTE: See
policy 8.1-8.2-8.3 Safe Recipients Checking in sample
UseCasesGuide.TCF file.
1. Select Policies from the side menu bar and click the New button to create a new
Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example, “Recipient
Policy”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default Policies are
disabled when they are created.
5. Select “Occurs when message is sent” from the Policy Event dropdown list. This is
the Event that triggers the Policy.
6. Click Save and Continue.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Safe Recipients for Internal emails”.
3. Enter a Rule Description to further describe the Rule.
4. Select the Rule Active checkbox to enable the Rule.
5. Select the Repeat Rule checkbox.
Rules must be explicitly repeated if they apply to recipients or attachments. In this
case the Rule must be repeated so that each recipient is evaluated by the Rule.
6. Select “Message.Recipient” from the dropdown list.
7. Click Save and Continue.
This conditional expression is configured to detect messages that contain a recipient email
address that is not part of the titus.com email domain AND is classified as “Internal”.
This Action displays a Warning Dialog that warns or blocks messages that contain a
recipient who is not permitted to receive an email message.
This Warning Dialog includes a button that allows users to remove recipients from the
message.
2. Enter a name for the Action in the Action Name text box; in this example, “Safe
Recipients for Internal emails”.
3. Enter a description of the Action in the Action Description text box. The description
provides further details about when and why the Action should be applied.
4. Select “Occurs when a message is sent” from the Policy Event dropdown list. This is
the Event that triggers the Action.
5. Select “Recipient Alert” from the Action Type dropdown list.
Action parameters are configured by selecting the parameter and clicking the Edit button.
Once you have saved the Action, the Edit Rule Actions window appears.
1. Select “Safe Recipients for Internal Emails” from the Available Actions list box.
2. Click the arrow to move the Action to the Selected Actions list box.
3. Click OK.
4. Save the Rule and Policy.
EXAMPLE:
A user has attempted to send an email message classified as Internal to a recipient
who does not have a the “@titus.com” domain name.
A Policy Alert appears to inform the user about the Policy violation and to provide
remediation options.
This is created using Fortra Data Classification for Microsoft Outlook for Microsoft Outlook
NOTE: See
policy 8.1-8.2-8.3 Safe Recipients Checking in sample
UseCasesGuide.TCF file.
1. Click New in the Dynamic Properties section of the Add/Edit Rule page to create a
new Dynamic Property.
2. Enter the Dynamic Property Name; in this example, “Clearance”. This name will
appear in the Condition Editor dropdown list.
3. Enter the Dynamic Property Description.
4. Select “GetAttribute” from the Function dropdown list.
The Get Attribute function prompts Fortra Data Classification for Microsoft Outlook to run
an Active Directory query based on the AD Attribute name provided by the Administrator.
This function retrieves the specified Active Directory attribute. This attribute can then be
used in a conditional expression.
Dynamic function parameters are configured by selecting the parameter and clicking the
Edit button.
Configure a Condition
The condition for this Rule searches for scenarios when the message is classified as
RESTRICTED and the recipient does not have RESTRICTED clearance.
This Action displays a Warning Dialog that warns or blocks messages that contain a
recipient that is not permitted to receive an email message.
This Warning Dialog includes a button that allows users to remove recipients from the
message.
2. Enter a name for the Action in the Action Name text box; in this example, “Restricted
Recipients Warning”.
3. Enter a description of the Action in the Action Description text box. The description
provides further details about when and why the Action should be applied.
4. Select “Occurs when a message is sent” from the Policy Event dropdown list. This is
the Event that triggers the Action.
5. Select “Recipient Alert” from the Action Type dropdown list.
Action parameters are configured by selecting the parameter and clicking the Edit button.
Once you have saved the Action, the Edit Rule Actions window appears.
1. Select “Restricted Recipients Warning” from the Available Actions list box.
2. Click the arrow to move the Action to the Selected Actions list box.
3. Click OK.
4. Save the Rule and Policy.
EXAMPLE:
A user has attempted to send an email message to a recipient who does not have the
required RESTRICTED Clearance.
A Policy Alert appears to inform the user about the Policy violation and to provide
remediation options.
This is created using Fortra Data Classification for Microsoft Outlook for Microsoft Outlook
NOTE: See
policy 8.1-8.2-8.3 Safe Recipients Checking in sample
UseCasesGuide.TCF file.
For this example we created an Active Directory Group for each Project Name.
l Buena Vista
l Riverdale
l Parisienne
l Hollywood
Create a Field
The Field name is Project and contains the following Project Values that correspond with
the Active Directory Groups:
l Buena Vista
l Riverdale
l Parisienne
l Hollywood
This Rule is used to restrict users from sending emails to recipients who do not have
access to the Active Directory Group.
7. Select the Repeat Rule checkbox. Rules must be explicitly repeated if they apply to
recipients or attachments. In this use case the Rule must be repeated so that each
recipient in the email message is evaluated by the Rule.
8. Select “Message.Recipient” from the dropdown list.
9. Click Save and Continue.
1. Click the New button in the Dynamic Properties section of the Add/Edit Rule page.
2. Enter the Dynamic Property Name; in this example, “HasGroupBuenaVista”. This
name will appear in the Condition Editor dropdown list.
3. Enter the Dynamic Property Description.
4. Select “HasGroup” from the Function dropdown list.
Dynamic function parameters are configured by selecting the parameter and clicking the
Edit button.
TheHasGroup Dynamic Function will check recipients for membership in this Active
Directory group.
This Action is used to prevent users who are not part of the selected Project Active
Directory Group from receiving an email.
2. Enter a name for the Action in the Action Name text box; in this example, “Project
Recipient Alert”.
2. Enter a description of the Action in the Action Description text box. The description
provides further details about when and why the Action should be applied.
3. Select “Occurs when a message is sent” from the Policy Event dropdown list. This is
the Event that triggers the Action.
4. Select “Recipient Alert” from the Action Type dropdown list.
Action parameters are configured by selecting the parameter and clicking the Edit button.
Once you have saved the Action, the Edit Rule Actions window appears.
1. Select “Project Recipient Alert” from the Available Actions list box.
2. Click the arrow to move the Action to the Selected Actions list box.
3. Click OK.
4. Save the Rule and Policy.
Repeat this Use Case to create new a Rule, Dynamic Property, Conditional
Expression, and Action for each of the remaining Project Names:
l Riverdale
l Parisienne
l Hollywood
EXAMPLE:
The Fortra Data Classification for Microsoft Outlook user has chosen one of the
available Classification Values and Project Values.
A Recipient Alert appears because one of the recipients does not have access to the
Buena Vista Active Directory Group.
Content Validation
Content Validation is used to check documents and email messages for specific sensitive
information, such as Social Insurance numbers and credit card numbers. Content Validation
can also replace the sensitive data it finds in Fortra Data Classification for Microsoft
Outlook; this is called remediation or redaction.
This is created using Fortra Data Classification for Microsoft Outlook for Microsoft Outlook
NOTE: See policy 9.1 Check for Credit Cards in sample UseCasesGuide.TCF file.
NOTE: You can also use Smart Regex or the Data Detection Engine to address this use
case. See the Fortra's Data Classification Suite (DCS) Data Detection Engine User Guide
or Fortra's Smart RegexGuide for more information.
Send Anyway Justification forces Microsoft Outlook users to provide justification when they
send an email message that fails to comply with a DCS for Outlook Policy. Send Anyway
Justification is configured by the Administrator so that Microsoft Outlook users can select a
reason from a pre-defined dropdown list or provide details in a text box using their own
words.
NOTE: Send Anyway Justification is not required for Content Validation. This step can be
omitted.
3. Enter a name for the Content Validation Profile in the Profile Name text box; in this
example, “Check for Credit Card Numbers”.
The Profile name is required when creating a Dynamic Property to run the Profile as
part of a Policy. The name identified here must be exactly the same as the name
used in the Dynamic Property.
4. Select “Match Any” from the Match Mode dropdown list. This activates the profile if
the criteria meets any combination of the defined rules.
5. Enter the Violation Text string; in this example, “A credit card number has been
detected”. The phrase contained in this field can be used as text of a user alert
without showing the exact values found.
6. Click Save and Continue.
Create a Policy
1. Select Policies from the side menu bar and click the New button to create a new
Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example, “Check for
Credit Cards”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default Policies are
disabled when they are created.
5. Select “Occurs when message is sent” from the Policy Event dropdown list. This is
the Event that triggers the Policy.
6. Click Save and Continue.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Apply Credit Card CV Profile”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Leave Repeat Rule unchecked.
6. Click Save and Continue.
This Dynamic Property uses the results of the run Content Validation Profile.
1. Click New in the Dynamic Properties section of the Add/Edit Rule page.
2. Enter the Dynamic Property Name; in this example, “CreditCardCheck”. This name
will appear in the Condition Editor dropdown list.
3. Enter the Dynamic Property Description.
4. Select “RunContent Validation” from the Function dropdown list.
NOTE: At times the parameters may appear in a different order. Please ensure that the
correct parameter is being updated.
Dynamic function parameters are configured by selecting the parameter and clicking the
Edit button.
The defined condition must be evaluated as true in order to apply the Actions that
associated with the Rule. In this use case Actions are only applied if a credit card number is
found.
2. Enter a name for the Action in the Action Name text box; in this example, “Credit
Card Alert”.
3. Enter a description of the Action in the Action Description text box. The description
provides further details about when and why the Action should be applied.
4. Select “Occurs when a message is sent” from the Policy Event dropdown list. This is
the Event that triggers the Action.
5. Select “Content Alert” from the Action Type dropdown list.
l Expand Detailed Description - Set to Yes if you want the detailed description to
appear by default.
l Masked Matches - This field must contain the exact name of the Dynamic
Property you will create in the Rule that will execute this Action, followed by the
text “.MaskedMatches”
l Enable Justification – Set to False by default. When True the user is permitted
to provide information about why they are disregarding the policy warning and
still sending the email message.
l Severity – Possible values are Log Only, Warn, and Prevent. In this use case the
user will be warned when they violate the policy.
2. Save the Action.
Once you have saved the Action, the Edit Rule Actions window appears.
1. Select “Credit Card Alert” from the Available Actions list box.
2. Click the arrow to move the Action to the Selected Actions list box.
3. Click OK.
4. Save the Rule and Policy.
EXAMPLE:
The user attempted to send an email message containing a credit card number. This
triggers the Content Validation Policy. A Policy Warning Dialog appears with Correct
Message which allows the user to remediate the Policy violations.
Test credit card numbers are available on the internet.
In this example, the user can disregard the Policy warning and send the message
anyway. To do so the user must click Send Anyway and provide justification for their
decision. This option is available because the Administrator enabled and configured
Send Anyway Justification.
NOTE: Check
policy 9.2 Check Documents for Internal Project Name in sample
UseCasesGuide.TCF file.
NOTE:You can also use Smart Regex to address this use case. See the Fortra's Smart
Regex Guide for more information.
3. Enter a name for the Content Validation Profile in the Profile Name text box; in this
example, “ProjectNameCheck”.
The Profile name is required when creating a Dynamic Property to run the Profile as
part of a Policy. The name identified here must be exactly the same as the name
used in the Dynamic Property.
4. Select “Match Any” from the Match Mode dropdown list. This activates the profile if
the criteria meets any combination of the defined rules.
5. Enter the Violation Text string; in this example, “Internal Project Detected”. The
phrase contained in this field can be used as text of a user alert without showing the
exact values found.
6. Click Save and Continue.
1. Select Policies from the side menu bar and click the New button to create a new
Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example, “Check
Documents for Internal Project Names”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default Policies are
disabled when they are created.
5. Select “Occurs before any open document is saved” from the Policy Event dropdown
list. This is the Event that triggers the Policy.
6. Click Save and Continue.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Apply the ProjectNameCheck CV Profile”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Leave Repeat Rule unchecked.
6. Click Save and Continue.
This Dynamic Property uses the results of the run Content Validation Profile.
1. Click New in the Dynamic Properties section of the Add/Edit Rule page.
2. Enter the Dynamic Property Name; in this example, “ProjectCheck”. This name will
appear in the Condition Editor dropdown list.
3. Enter the Dynamic Property Description.
4. Select “RunContent Validation” from the Function dropdown list.
Dynamic function parameters are configured by selecting the parameter and clicking the
Edit button.
Create the Condition to run the Content Validation Profile using the Dynamic Property.
This Alert Action warns the user that a Project Name has been detected in a document.
2. Enter a name for the Action in the Action Name text box; in this example, “Internal
Project Alert”.
3. Enter a description of the Action in the Action Description text box. The description
provides further details about when and why the Action should be applied.
4. Select “Occurs before any open document is saved” from the Policy Event dropdown
list. This is the Event that triggers the Action.
5. Select “Alert” from the Action Type dropdown list.
l Expand Detailed Description - Set to Yes if you want the detailed description to
appear by default.
2. Save the Action.
Once you have saved the Action, the Edit Rule Actions window appears.
1. Select “Internal Project Alert” from the Available Actions list box.
2. Click the arrow to move the Action to the Selected Actions list box.
3. Click OK.
4. Save the Rule and Policy.
EXAMPLE:
The following warning dialog will appear if the specified project text is detected in the
document.
This use case illustrates how to run a Content Validation Profile to scan files for Social
Insurance numbers.
This is created using Fortra Data Classification for Microsoft Outlook for Desktop
NOTE: See
policy 9.3 Scan Files for Social Security Numbers in sample
UseCasesGuide.TCF file.
NOTE: You can also use Smart Regex or the Data Detection Engine to address this use
case. See the Smart Regex Guide or the Data Detection Engine for DCS User Guide.
3. Enter a name for the Content Validation Profile in the Profile Name text box; in this
example, “SSNCheck”.
The Profile name is required when creating a Dynamic Property to run the Profile as
part of a Policy. The name identified here must be exactly the same as the name
used in the Dynamic Property.
4. Select “Match Any” from the Match Mode dropdown list. This activates the profile if
the criteria meets any combination of the defined rules.
5. Enter the Violation Text string; in this example, “A Social Security Number has been
detected”. The phrase contained in this field can be used as text of a user alert
without showing the exact values found.
6. Click Save and Continue.
3. Select Policies from the side menu bar and click the New button to create a new
Policy.
4. Enter a name for the Policy in the PolicyName text box; in this example, “Check Files
for Social Security Numbers”.
This Policy will execute the “SSNCheck” Content Validation Profile.
5. Enter a description of the purpose of the Policy in the Policy Description text box.
6. Select the Policy Enabled checkbox to enable the Policy. By default Policies are
disabled when they are created.
7. Select “Occurs when user changes the classification of a file” from the Policy Event
dropdown list. This is the Event that triggers the Policy.
8. Click Save and Continue.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Iterate through files”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
This Dynamic Property is used to extract the text from files so the Content Validation Profile
can search for the Social Security Numbers.
1. Click the New button in the Dynamic Properties section of the Add/Edit Rule page.
2. Enter the Dynamic Property Name; in this example, “FileContent”. This name will
appear in the Condition Editor dropdown list.
3. Enter the Dynamic Property Description.
4. Select “GetTextFromFile” from the Function dropdown list.
1. Select the first Rule (Iterate through files) and click the New button to create a
second Rule.
2. Enter a name for the Rule; in this example, “Check File Content”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule.
5. Leave Repeat Rule unchecked. This Rule is a sub-Rule of a Rule that is already
repeated.
6. Click Save and Continue.
This Dynamic Property is used to execute the Content Validation Profile to search for Social
Security Numbers.
1. Click New in the Dynamic Properties section of the Add/Edit Rule page.
2. Enter the Dynamic Property Name; in this example, “RunCVProfile”. This name will
appear in the Condition Editor dropdown list.
3. Enter the Dynamic Property Description.
4. Select “RunContentValidation” from the Function dropdown list.
1. Select the Content Validation Profile Name parameter and click the Edit button.
2. Enter SSNCheck in the Value text box and click OK.
3. Select the Source parameter and click the Edit button.
4. Enter “[FileContent]” in the Value text box and click OK.
NOTE: “FileContent” is the name of the Dynamic Property used to extract the text from
files. This Dynamic Property was defined in the first Rule.
5. Click Save.
This Condition ensures that users are only informed that a Social Security Number appears
in a file if it is detected when the Policy is applied.
This Alert warns the user that a Social Security Number has been detected in a file.
Action parameters are configured by selecting the parameter and clicking the Edit button.
l Expand Detailed Description - Set to Yes if you want the detailed description to
appear by default.
2. Save the Action.
Once you have saved the Action, the Edit Rule Actions window appears.
1. Select “File Alert” from the Available Actions list box and click the arrow to move this
Action to the Selected Actions list box.
2. Click OK.
3. Save the Rule and Policy.
EXAMPLE:
The following warning dialog appears when the user attempts to change the
Classification of a file that contains a Social Security Number.
Policies promote a culture of security. Policies can be designed to shape user behavior and
increase accountability by stopping mistakes before they happen by providing immediate
feedback about potential privacy violations.
This Policy is applied when a new document is created to capture the original classification
of the document.
1. Select Policies from the side menu bar and click the New button to create a new
Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example,
“SetTheOriginator”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default Policies are
disabled when they are created.
5. Select “Occurs when a new document is created” from the Policy Event dropdown
list. This is the Event that triggers the Policy.
6. Click Save and Continue.
This Rule identifies the document author and ensures that this information is saved.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “SettingTheOriginator”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Click Save and Continue.
This Action applies Custom Properties to the document to identify the originator by their
user name.
This Policy is applied when a user attempts to change the classification of the document.
1. Select Policies from the side menu bar and click the New button to create a new
Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example,
“OnlyOriginatorDownGrade”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default Policies are
disabled when they are created.
5. Select “Occurs when user changes the classification of a document” from the Policy
Event dropdown list. This is the Event that triggers the Policy.
6. Click Save and Continue.
The defined condition must be evaluated as true in order to apply the Actions that have
been associated with the Rule.
2. Enter a name for the Action in the Action Name text box; in this example,
“SetTheAuthor”.
3. Enter a description of the Action in the Action Description text box. The description
provides further details about when and why the Action should be applied.
4. Select “Occurs when user changes the classification of a document” from the Policy
Event dropdown list. This is the Event that triggers the Action.
5. Select “Set Custom Properties” from the Action Type dropdown list.
This rule retrieves the name of the originator when a user attempts to change the
classification of a document.
The defined conditions must be evaluated as true in order to apply the Actions that have
been associated with the Rule.
This Dynamic Property assigns the User Name of the document originator.
1. Click New in the Dynamic Properties section of the Add/Edit Rule page.
2. Enter the Dynamic Property Name; in this example, “CurrentUserToCompare”. This
name will appear in the Condition Editor dropdown list.
3. Enter the Dynamic Property Description.
4. Select “Assign” from the Function dropdown list.
This Alert warns the user that they are not permitted to change the classification of a
document unless they are the originator.
EXAMPLE:
The following warning dialog appears on the client desktop when a user attempts to
downgrade the classification of document without the required privileges.
1. Select Policies from the side menu bar and click the New button to create a new
Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example, “Printing
Policy”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default Policies are
disabled when they are created.
5. Select “Occurs before any open document is printed” from the Policy Event
dropdown list. This is the Event that triggers the Policy.
6. Click Save and Continue.
1. Click the New button in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Prevent Restricted Document Print”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Click Save and Continue.
The defined condition must be evaluated as true in order to apply the Actions that have
been associated with the Rule. In this use case Actions are only applied if the document is
Classified as Restricted.
1. In the Actions When True section, Select “Deny” from the Result dropdown list. This
prevents the Microsoft Office Print event from occurring.
2. In the Actions When True section, Select “Stop” from the Behaviour Flow dropdown
list to stop evaluating Rules after the Rule has been applied to a document.
2. Enter a name for the Action in the Action Name text box; in this example, “Prevent
Print - Restricted”.
3. Enter a description of the Action in the Action Description text box. The description
provides further details about when and why the Action should be applied.
4. Select “Occurs before any open document is printed” from the Policy Event
dropdown list. This is the Event that triggers the Action.
5. Select “Alert” from the Action Type dropdown list.
l Detailed Description – Enter the display message text that will be displayed to
the user.
l Expand Detailed Description - Set to Yes if you want the detailed description to
appear by default.
2. Save the Action.
1. Select “Prevent Print – Restricted” from the Available Actions list box.
2. Click the arrow to move the Action to the Selected Actions list box.
3. Click OK.
4. Save the Rule and Policy.
EXAMPLE:
An Alert appears when the user attempts to print a Restricted document. In this
scenario, printing is prevented.
NOTE: See
policy 10.3 Alert Users When a Doc is Opened in sample
UseCasesGuide.TCF file.
1. Select Policies from the side menu bar and click the New button to create a new
Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example, “On Open
Warnings”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy.
By default Policies are disabled when they are created.
5. Select “Occurs when a document is opened” from the Policy Event dropdown list.
This is the Event that triggers the Policy.
6. Click Save and Continue.
1. Click the New button in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Warn on Internal”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule.
By default Rules are disabled when they are created.
5. Click Save and Continue.
The defined condition must be evaluated as true in order to apply the Action(s) that have
been associated with the Rule. In this use case Actions are only applied if the document is
classified as Internal.
2. Enter a name for the Action in the Action Name text box; in this example, “Warn user
when opening Internal Document”.
3. Enter a description of the Action in the Action Description text box.
4. Select “Occurs when a document is opened” from the Policy Event dropdown list.
This is the Event that triggers the Action.
5. Select “Alert” from the Action Type dropdown list.
Action parameters are configured by selecting the parameter and clicking the Edit button.
Once you have saved the Action, the Edit Rule Actions window appears.
1. Select “Warn user when opening Internal Document” from the Available Actions list
box.
2. Click the arrow to move the Action to the Selected Actions list box.
3. Click OK.
4. Save the Rule and Policy.
EXAMPLE:
When a user opens a document that has been classified as Internal a warning appears.
The purpose of this warning is to provide information about proper handling and
distribution of Internal documents.
NOTE: See
policy 10.4 Reclassify Documents After One Day in sample
UseCasesGuide.TCF file.
1. Select Policies from the side menu bar and click the New button to create a new
Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example, “Reclassify
Documents After One Year”.
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default Policies are
disabled when they are created.
5. Select “Occurs when a document is opened” from the Policy Event dropdown list.
This is the Event that triggers the Policy.
6. Click Save and Continue.
1. Click Newin the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Reclassify Documents”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Click Save and Continue.
The defined condition must be evaluated as true in order to apply the Actions that have
been associated with the Rule. In this use case Actions are only applied if the Classification
date was over a year ago.
2. Enter a name for the Action in the Action Name text box; in this example, “Set to
Public”.
3. Enter a description of the Action in the Action Description text box. The description
provides further details about when and why the Action should be applied.
4. Select “” from the Policy Event dropdown list. This is the Event that triggers the
Action.
5. Select “Set Classification” from the Action Type dropdown list.
Action parameters are configured by selecting the parameter and clicking the Edit button.
Once you have saved the Action, the Edit Rule Actions window appears.
NOTE: See policy 10.5 Block upload to the cloud in sample UseCasesGuide.TCF file.
1. Select Policies from the side menu bar and click New to create a new Policy.
2. Enter a name for the Policy in the PolicyName text box; in this example, enter "Block
upload to the cloud".
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default Policies are
disabled when they are created.
5. Select “Occurs when a document is uploaded to a file storage in the cloud” from the
Policy Event dropdown list. This is the Event that triggers the Policy.
6. Click Save and Continue.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Block upload to the cloud”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Click Save and Continue.
Action parameters are configured by selecting the parameter and clicking the Edit
button.
Once you have saved the Action, the Edit Rule Actions window appears.
1. Select “Restricted Document Rules” from the Available Actions list box.
2. Click the arrow to move the Action to the Selected Actions list box.
3. Click OK.
1. In the Actions When True section, Select “Deny” from the Result dropdown list to
prevent the upload from occurring.
2. In the Actions When True section, Select “Stop” from the Behaviour Flow dropdown
list to stop evaluating Rules additional rules in the Policy.
3. Save the Rule and the Policy.
EXAMPLE:
Any attempt to upload a Restricted document to the cloud is blocked. The user is also
provided with an Alert explaining why the upload was blocked.
1. Select Policies from the side menu bar and click New to create a new Policy.
2. Enter a name for the Policy in the Policy Name text box; in this example, enter
"Prevent document sharing".
3. Enter a description of the purpose of the Policy in the Policy Description text box.
4. Select the Policy Enabled checkbox to enable the Policy. By default Policies are
disabled when they are created.
5. Select Occurs when a document is opened” from the Policy Event dropdown list. This
is the Event that triggers the Policy.
6. Click Save and Continue.
1. Click New in the Rules section of the page to create a Rule for the Policy.
2. Enter a name for the Rule; in this example, “Prevent document sharing”.
3. Enter a Rule Description to further describe the purpose of the Rule.
4. Select the Rule Active checkbox to enable the Rule. By default Rules are disabled
when they are created.
5. Click Save and Continue.
Action parameters are configured by selecting the parameter and clicking the Edit
button.
Once you have saved the Action, the Edit Rule Actions window appears.
1. Select “Prevent Document Sharing” from the Available Actions list box.
2. Click the arrow to move the Action to the Selected Actions list box.
3. Click OK.
l email properties
l classification metadata
l or other sensitive information
Titus Policies are no longer directly associated with Classification Fields. Policies contain
Rules and Conditions. Polices can, however, use Classification metadata to make Policy
decisions.
pre-defined with a single method of interacting with the user or the content on the Client
desktop.
In 4.x+, many Policies have become Actions. Actions are triggered based on the conditional
expression created within a Rule. Conditional Expressions can contain specific email
properties or metadata Fields.
Actions perform functionality that is exposed on the Client desktop. These Actions provide
information to the user (a Warning Message) or perform an Action such applying an RMS
template to an email message. In 4.x+, multiple Actions can be applied to one Rule.
The following table lists the Policies available in Fortra Data Classification for Microsoft
Outlook 3.x and describes the v4.x+ implementation.
Message.AttachmentCount
Message.AttachmentTotalSizeKB
BCC Auditing In 4.x, BCC Auditing is an Action In 4.x, the Administrator can
that occurs. create a conditional expression
to identify email messages that
should be BCC’d.
Policies are no longer directly associated with Classification Fields. Policies contain Rules
and Conditions. Polices can, however, use Classification metadata to make Policy
decisions.
In 4.x and higher, many Policies became Actions. Actions are triggered based on the
conditional expression created within a Rule. Conditional Expressions can contain specific
document properties or metadata Fields. Actions perform functionality that is exposed on
the Client desktop. These Actions provide information to the user (a Warning Message) or
perform an Action such applying an RMS template to a document. In 4.x+, multiple Actions
can be applied to one Rule.
The following table lists the Policies available in Titus Classification for Microsoft Office 3.x
and describes the v4.x+ implementation.
Contacting Fortra
Please contact Fortra for questions or to receive information about Data Classification Suite
for Windows (On-premises).
Gather and organize as much information as possible about the problem including job/error
logs, screen shots or anything else to document the issue.