CylanceAVERT release notes Skip Navigation

CylanceAVERT
release notes

What's new in the management console

Feature
Description
Sensitive data scanning
CylanceAVERT
can scan files uploaded to USB drives, internet browsers, and email attachments, as well as scan the body content of an email message for company data that the administrator defined as sensitive in the information protection policies. An email notification will be sent for data exfiltration events.
Information protection policies
Administrators can specify the conditions that must be met to trigger the policy violation, the allowed domains for the policy, and the actions to take when a policy has been violated. See Information Protection in the BlackBerry Avert Administration and Overview Guide for more information.
CylanceAVERT
events
When the conditions are met to trigger a policy violation, information about that data exfiltration event display in the
CylanceAVERT
events view. The events view shows detailed information about the event including the data and time of the event, the location that the file was exfiltrated to, the number of policies that were violated, and the user of the device where the event occurred. See BlackBerry Avert Events in the BlackBerry Avert Administration and Overview guide for more information.
Information protection settings
Administrators can use the information protection settings to configure the sensitive data that they want to monitor for by adding templates and data types to use in an information protection policy. Administrators can also define the browser and email domains that will be allowed and trusted, manage the evidence that they want to collect for data exfiltration events, and specify how long the evidence should be available. Specified email addresses can also be sent notifications of data exfiltration events. See Information protection settings in the BlackBerry Avert Administration and Overview guide for more information.
File inventory
The
CylanceAVERT
file inventory creates a record of all the sensitive files in an organization through a file trawling process. See File Inventory in the BlackBerry Avert Administration and Overview Guide for more information.
Evidence locker
Administrators can use the evidence locker to view details of the files that have been involved in exfiltration events and download the files to their local storage for auditing purposes. See Evidence locker in the BlackBerry Avert Administration and Overview guide for more information.