An organization's security policy prohibits the use of Internet based file sharing and storage applications. To monitor violation of this policy, which rule can the DLP Endpoint administrator configure?
An organization is concerned that employees are using their personal web based email accounts to conduct work on internal documents after hours. Which of the following can the DLP Endpoint Administrator configure to mitigate this risk?