Skip to main content

Who is this article for?

Incydr
Code42 for Enterprise
CrashPlan for Enterprise
CrashPlan for Small Business

Incydr, no.

CrashPlan for Enterprise, yes.

Code42 for Enterprise, yes.

CrashPlan for Small Business, no.

This article applies to on-premises authority servers.

Other available versions:

Cloud

HOME
GETTING STARTED
RELEASE NOTES
FAQs
APIs
SYSTEM STATUS
Code42 Support

Customize applications monitored for file exfiltration

Who is this article for?

Incydr
Code42 for Enterprise
CrashPlan for Enterprise
CrashPlan for Small Business

Incydr, no.

CrashPlan for Enterprise, yes.

Code42 for Enterprise, yes.

CrashPlan for Small Business, no.

This article applies to on-premises authority servers.

Other available versions:

Cloud

Overview

This article explains how to use the Code42 API to customize the list of applications monitored for file exfiltration. By default, Code42 monitors activity of applications typically used to upload and download files, such as web browsers, Slack, FileZilla, FTP, and cURL. 

The steps to modify the list of applications changed in Code42 server and Code42 app version 8.2. Follow the steps below for your version.

The examples in this article use curl, but the concepts apply to any tool you choose to interact with the Code42 API.

Considerations

  • Customizations added in version 7.x do not apply to version 8.2 and later. You must re-apply the customizations after upgrading to version 8.2.
  • You must have credentials for a Code42 user with the Org Admin, All Org Admin, or SYSADMIN role.
  • Activity monitoring is intended for applications typically used to move files over a network. Adding other types of applications may cause unexpected results.

Version 8.2 and later

Version 7.x

External resources

Related topics

  • Was this article helpful?