The steps below indicate an example scenario that you may encounter when adding a rule under the Group tab in a DLP policy and clarifies which configuration is supported and which may lead to problems.
15.x 16.x
DLP Enforce console loophole
If you configure your Group Rule up to step 4 in the Issue/Introduction section above and save it - your rule is compliant and in a supported state.
If however you continue on to step 5 you will have exploited an Enforce console loophole and created an unsupported Group Rule.
See below for some supported and unsupported examples as they will appear in your Enforce console:
Unsupported means that although you may get the expected results on testing the policy, its behaviour may change after an upgrade or patch. This is because the described configuration is not anticipated and therefore not a tested scenario during DLP product development. If you encounter any issues with such a policy, you must return it to a supported state and retest before contacting support if the observed issue is still present.
If it is currently working as expected you can leave the policy alone BUT make a careful note to re-test it for expected behaviour after any hotfix, maintenance pack or upgrade is applied.
This can be done EITHER by:
1. Removing the Group Rule entirely and adding the desired rule as an AND'd rule with each rule that you have under the Detection tab. (This may be cumbersome if you have a large number of detection rules). OR…
2. Including a supported Sender/Recipient/User Group rule in the Group tab rule that is so broadly scoped that it will encompass all your outgoing data scenarios. The screen shot example above uses a company's email domain as a sender pattern to encompass all outgoing email messages and an IP range example that would encompass all of the example company's sender traffic if they were using a 10.* range.