The console gives administrators lots of options regarding how to deal with attempts to exfiltrate protected data. It can be simply blocked, the fact that it was blocked can be recorded, users can be warned or kept in the dark, or everything that a user tried to illegally copy can be archived. One entire folder on our test network was protected against copying. When we tried to pull files from the network and save them on a key drive, not only was that transfer stopped, but a full archive of every file that we tried to copy was provided to the DLP administrator. Another nice feature of Comodo DLP is that it can scan endpoints to determine if any protected information has already left. Finally, Comodo DLP can be reversed to prevent certain types of information from entering a network. Here’s the main dashboard showing potential DLP policy breaches over time.