Certain Taiwan ROC IDs are not detected when creating policy detecting the data identifier for Tawian ROC ID
Agent log
08/18/2019 23:20:22 | 6944 | FINEST | FileSystem.FOMConnector |
<DLPFileOperationRequestMarshallable>
<sourceFilePath type=String>C:\Users\Administrator\Documents\ROC ID
all.rtf</sourceFilePath>
<destinationFilePath type=String>\\192.168.127.10\bj\ROC ID
all.rtf</destinationFilePath>
<deviceType type="FileOperationTargetTypeMarshallable">
<FileOperationTargetTypeMarshallable>
<targetType type=int>3</targetType>
</FileOperationTargetTypeMarshallable>
</deviceType>
</DLPFileOperationRequestMarshallable>
08/18/2019 23:20:22 | 6944 | FINEST | AgentServices.PreFilterConfiguration
| FileFilter(Type&Size&Path): File[C:\Users\Administrator\Documents\ROC ID
all.rtf] Size[13691] did not match any filter, using default action
08/18/2019 23:20:22 | 8176 | FINEST | CoreServices.MessageLogger |
MESSAGETYPE_FILE_OP_ADDREMOVE_REQUEST
MESSAGESOURCE_FILEOPERATION_CONNECTOR 08/19/2019 06:20:22
08/18/2019 23:20:22 | 8176 | FINER |
Configuration.ApplicationSettingsHandler | C:\Windows\Explorer.EXE
{application id: -33} Microsoft® Windows® Operating System Windows Explorer
08/18/2019 23:20:22 | 8176 | FINEST | CoreServices.MessageLogger |
MESSAGETYPE_DETECTION_REQUEST MESSAGESOURCE_FILEOPERATION_CONNECTOR
08/19/2019 06:20:22 [
Request Id #52
Detection Request Details :
Session Command : Single Request
Request Type : Data In Motion Request
Dim Detection Request Details :
Process Id : 5648
Process Path : C:\Windows\Explorer.EXE
Application Name : Microsoft® Windows® Operating System Windows
Explorer
User : Administrator
Domain : Example
Time Stamp : 08/19/2019 06:20:22
Dim Event Type : File System
DIM File Detection Request Details :
file: C:\Users\Administrator\Documents\ROC ID all.rtf
On the Enforce console the incident can only detect some of the Taiwan ROC IDs in the file but not all
OR
Issue with DI regex