This defines the access privileges to configure
Enterprise DLP
data
patterns and profiles which define what is considered sensitive data that
must be blocked. Skip this step if you have already configured role-based
access to
Enterprise DLP
or do not want to configure access to
Enterprise DLP
for the user.