Insider threat investigation files

Identifies insider threat investigation files patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems.

Type
regex
Engine
boost_regex
Confidence
medium
Confidence justification
structural regex with domain-specific anchors and constrained context replaces phrase-only marker. Added context gating and exclusion rules improve precision and reduce incidental matches.
Detection quality
Mixed
Jurisdictions
global
Regulations
GDPR
Data categories
credentials, security
Scope
wide
Platform compatibility
Purview: Compatible, GCP DLP: Compatible, Macie: Compatible, Zscaler: Compatible, Palo Alto: Degraded, Netskope: Unsupported

Pattern

(?is)\b(?:insider\s+threat|employee\s+investigation|unauthorized\s+access|data\s+exfiltration|behavioral\s+analysis|user\s+activity\s+monitoring|privilege\s+abuse|investigation\s+report|disciplinary\s+action|HR\s+investigation)\b

Corroborative evidence keywords

insider threat investigation files, insider, threat, investigation, files, security, operations, data

Proximity: 300 characters

Should match

Should not match

Known false positives

References