Cloud App Security Administration Guide for Dropbox
- Cloud App Security
- Understanding Cloud App Security
- Configuring Cloud App Security
- Managing Quarantine for Dropbox
- Using the SonicWall Cloud App Security Dashboard
- Managing Security Events
- Managing Policies
- Using Data Leak Protection
- Using Cloud App Security Analytics
- Configuring Cloud Applications in the Cloud App Store
- Managing Security Applications in the Security App Store
- Managing Security Tool Exceptions
- Using the System Log
- Managing Cloud App Security Licenses
- SonicWall Support
Creating Malware Policy Rules
To create a malware policy rule
- In the Rule Name field, enter the name you want to use to identify the rule.
- From the Mode dropdown list, select the mode in which you want the DLP policy rule to operate:
- In the Scope section, either:
- Select All users and groups (all licensed users) to have the policy rule apply to all users.
- In the Specific users and groups list, select the specific users or user groups to which the policy should apply or be excluded from being applied.
- In the Advanced > Security Tools section, select All running threat detection tools to use all of the activated Security Tools. (This is on by default.) If you unselect this option, you can then select which specific Security Tools are used.
- In the Advanced > Actions section:
- Select Quarantine drive files to quarantine detected files to the quarantine folder defined in your Cloud App Security configuration.
- Select Alert file owner of malware to notify the user sharing the file when possible malware is detected.
- Click the gears icon to modify the email message sent to the file owner.
- Select Alert admin(s) to notify administrators when possible malware is detected.
- Click the gears icon to modify the email message sent to administrators.
- Click the users icon to select which administrators should receive the message.
- Click Save and Apply.
Was This Article Helpful?
Help us to improve our support portal