I have been trying to find out more about the Automatic Mail Notification rule, but I cannot find the answer I am looking for and I am not even sure now if that may be the right option. I have a requirement here, where I need to receive an alert once a user triggers a certain number of incidents of the same type. For example, a user copies more than ten sensitive documents to a USB drive which triggers more than ten incidents, would that be possible to send an automatic mail notification for it once that number of incidents has been reached?
Many thanks in advance.
Looks like my comments are not reflecting here.
The options which you are looking for are:-
Setting event thresholds lets you tailor the frequency of automatic responses to fit the needs and realities of your environment.
Use aggregation to set the number of events that occur before triggering an automatic response. For example, you can configure an automatic response rule to send an email message when either one of these thresholds is met:
Thanks for your reply. I had a look at the automatic responses section, and unfortunately it does not seem to include options for DLP events 😢. Is this a case for an RFE?
May I know what is the Event type selected(Threat\Client)
Can you please share screenshots of automatic response you have created?
The detecting product is DLPAGENT11100.
We have been able to successfully use Automatic Responses for DLP events as well. For example, admin should receive an email when someone connects a USB device to a client machine.
Please check one of the events under Threat Event log for event related details.
Alternatively you can use 'The detecting product' as DLPAGENT11100 and it can be defined for any system in System Tree for testing.
Thanks for your suggestion 😀, I think I may be getting somewhere now.I now need to figure out the aggregation section to ensure that a notification is only triggered when a certain number of incidents of specified incidents is detected.