Data Leakage Protection
Search messages and attachments stored in any mailboxes on Exchange E-mail servers and find unprotected
occurrences of sensitive information.
Configure what to find and how deep to search to determine compliance with data leakage laws and
Produce Web Page Reports to easily review your findings and fulfill audit requirements or export
Text Reports as spreadsheets for detailed analysis. Report to the centralized Management Console for
enterprise-wide reporting and management.