Summary and resources

Completed

That customer database copied to a personal USB drive exposed a gap cloud-based data loss prevention (DLP) can't close. In this module, you deployed endpoint DLP to extend protection to the devices where people work with sensitive data.

You onboarded devices, configured settings before creating policies, and built policies with conditions and actions matched to your risk profile. You validated them in simulation before enforcement and evaluated whether just-in-time protection and browser extensions were necessary for your environment.

In this module, you learned to:

  • Identify where endpoint DLP fits in a broader DLP strategy and what activities it protects against
  • Onboard devices for endpoint DLP using the method that matches your environment
  • Configure endpoint DLP settings that balance protection with user productivity
  • Create and manage endpoint DLP policies with appropriate conditions, actions, and simulation
  • Determine when just-in-time protection is appropriate and choose the right fallback action

Learn more