| Action | Controls the operation for file transfers that trigger the policy.
									Options: 
Block: Scans file for sensitive content and blocks the transfer; stops matching subsequent policies.Allow: Scans file and allows the transfer; stops matching subsequent policies.Ignore: Scans file but ignores the result; continues matching subsequent policies.No Action: Does not scan the file; equivalent to not controlling sensitive transfers; stops matching subsequent policies. | 
| Record Screen | When checked, records the client screen when the policy is triggered. View logs under Sensitive Info → Sensitive Info Logs, right-click → View Screen Log. | 
| Add Watermark | Available with the "Watermark & Traceability" module. Apply a watermark template to files triggered by the policy. | 
| Encrypt | Available with the "Encryption" module. Can only be enabled if the policy action is Ignore or Allow. Encrypted files follow the specified document permissions and access settings. | 
| Expiration Date | Policies are valid indefinitely by default. Enabling and setting an expiration date will deactivate the policy after the specified time. | 
| Sensitive Info | Specifies the sensitive content for the policy. | 
| Sensitive Content | Select categories from Classification Management → Sensitive Info Library. Clients will scan files to detect matches.
									Note: Sensitive content control requires enabling Sensitive Content Recognition Authorization on the client. | 
| Document Tag | Files matching the specified document tag are considered matched by the policy. | 
| Document Classification | Files with classification within the specified range are considered matched by the policy. | 
| Match Any Condition | By default, all conditions must be satisfied. Check this to trigger the policy if any single condition is met. | 
| File Name | Documents can be controlled based on file path or name. By default, this is empty, which means all documents are included. Wildcards are supported. | 
| MD5 | Specifies document MD5 values for matching. Format: MD5:[full MD5], e.g., MD5:a6616067d6df8a43e171f0e40e79a301. Multiple MD5 values can be separated by ';' or ','. Case-insensitive. Wildcards and fuzzy matching are not supported. | 
| Min File Size | Minimum file size in KB. | 
| Max File Size | Maximum file size in KB. | 
| Backup Copy | When checked, backup triggered files. View under Logs → Document Operation Logs. | 
| Application | Specifies the application used for file transfer. Default is all. Can select individual apps or app categories. | 
| Copy to Removable Drive | Controls files copied to removable drives. | 
| Copy to Network Drive | Control file sending to network shared path; defaults to controlling all network shared paths, customizable support; | 
| Include Path | Network paths to include in scanning and policy control. Format: \\server\temp or \\server\temp\*. Do not end with \. | 
| Exclude Path | Network paths excluded from scanning and control. Multiple paths supported. | 
| IM Transfer | Controls documents sent via instant messaging tools. | 
| IM Tools | Supported tools: QQ, ICQ, MSNMessenger, YAHOO, TM, Lanxin, SKYPE, RTX, LSC, ALI, FETION, Google Talk, Baidu Hi, 263EM, FeiQiu, MSNLite, Marketing QQ, Enterprise QQ, Lianwo LINE, Qunying CC, LYNC, Enterprise WeChat, Activity Message, KK, IMO, DingTalk, Feishu, Zalo, WhatsApp, Microsoft Teams. | 
| IM Chat Messages | Controls the content of messages in IM tools. | 
| Supported IM Tools | Supported tools: QQ, ICQ, MSNMessenger, YAHOO, TM, Lanxin, SKYPE, RTX, LSC, ALI, FETION, Google Talk, Baidu Hi, 263EM, FeiQiu, MSNLite, Marketing QQ, Enterprise QQ, Lianwo LINE, Qunying CC, LYNC, Enterprise WeChat, Activity Message, KK, IMO, DingTalk, Feishu, Zalo, WhatsApp, Microsoft Teams. | 
| Send/Receive | Sets the message direction to monitor. Default is all, meaning both sent and received messages are checked. Can choose to monitor only sent or only received messages. | 
| Detection Scope | Determines the scope of messages to check: 
Single Session: Monitors each conversation for the same account individually.Merge All Sessions: Combines all conversations of the same account for detection. | 
| Record Context | When checked, records the context of sensitive information, viewable in the AnySecura sensitive information log. | 
| Max Context Entries | Maximum number of context entries recorded for sensitive information. Default is 5 for each context type; can be adjusted to a custom value. | 
| Sending Emails | Controls email content matching sensitive information. | 
| Sender | Specify email addresses to monitor. Can select from email classification library or enter manually. | 
| Recipient | Specify recipient addresses. Can select from email classification library or enter manually. | 
| Match Any Recipient | If checked, the policy applies if at least one recipient matches. If unchecked, all recipients must match to trigger the policy. | 
| Scan Email Body Only | If checked, only the email body is scanned; otherwise, both body and attachments are scanned. | 
| Upload Control | Controls documents uploaded via browsers, Baidu Netdisk, or Weiyun clients that match sensitive content. | 
| Websites / Network Addresses | Specify URLs to monitor browser uploads. Supports wildcard (*), e.g., *baidu.com. Multiple URLs can be separated by commas. |