Hi,
i think that is a tough question. based on what you configure.
put a discovery scan on you can track data on endpoints, you can control what is sent to cloud storage, what devices are plugged in and track what data is copied to it (or block)
touches on several families like audit, incident response, flow, access control, configuration management, and others based on what is implemented.