Knowledge Base
Browse Docs
  • Introduction
    1. DefensX
    2. DNS & Web Filtering
    3. Zero Trust Files
    4. Zero Trust Credentials
    5. ADWare Protection
    6. Remote Browser Isolation
    7. Secure Browser Extension
    8. Secure Mobile Browser
    9. System & Browser Requirements
  • Management
    1. Role-Based Access Control
    2. Message Templates
  • Deployment
    1. Deployment via RMM
    2. Operating System Agent
    3. Deployment via GPO
    4. Deployment via Intune
    5. VDI and Terminal Servers
    6. Windows Manual Deployment
    7. Mac MDM Deployment
    8. Mac Manual Deployment
    9. Network Deployment
    10. Secure Mobile Browser
    11. Bypass Option
    12. AI Protections
    13. SaaS Restrictions
    14. Bookmark Manager
  • Integrations
    1. Azure AD
    2. Identity Providers
    3. SIEM
  • Policy Management
    1. Configuring Policies
    2. Configuring Consents
    3. PII Protection
  • Secure Access (ZTNA)
    1. Introduction to ZTNA
    2. Configuration
  • Nexi AI
    1. Nexi AI
    2. Nexi AI for MSPs
    3. Nexi AI for End Users
  • Training Videos
    1. Onboarding Videos
    2. Attack Scenarios
    3. MSP Admin Training Series
  • Questions & Answers
    1. Licensing
    2. Incognito Mode
    3. Onboarding
    4. Active Directory
    5. Group Synchronization
    6. Agent
    7. Conflicting Softwares
    8. Reporting
    9. Virtual Desktops
    10. Using the Backend
    11. DNS & Web Filtering
  • MSP Automation
    1. Overview
    2. External Notifications
    3. Integrations
    4. Partner API
ONLINE DOCUMENTATION

PII Protection

In this document
  • Overview
  • How it works
  • PII Rules
  • Configuration
  • Summary

Overview

PII Protection helps organizations detect and protect sensitive personal data during user activity. It uses PII Rules to identify sensitive values and apply the selected protection method when a match is found.

PII Rules support both keyword-based and regex-based matching. This allows organizations to protect fixed terms as well as structured data such as credit card numbers, social security numbers, phone numbers, and other regulated information.

How it works

PII Protection evaluates content against configured PII Rules and protects matched values based on the selected settings.

Protection can be applied to both Data Entry and Content Display.

In Data Entry, DefensX inspects content as it is entered. When a protected value is detected, the user sees a Sensitive Data Blocked message and the matched value is protected based on the configured method.

Screenshot%202026 04 14%20at%2014.25.28

Asterisk replaces the matched value with asterisk characters, ensuring that no original data remains to be sent:

Screenshot%202026 04 14%20at%2014.26.36

In Content Display, DefensX protects matched sensitive values when they appear in displayed content.

Blur visually obscures the matched value:

4e53afc9 bc06 44da bc28 cc2b3a9ef4e1

PII Rules

PII Rules define the values and patterns that DefensX should detect and protect.

Keyword-based rules are used for known words, phrases, or fixed terms.


Regex-based rules are used for structured data patterns such as credit card numbers, social security numbers, and other formatted identifiers.

This allows organizations to configure detection based on their data protection requirements.

Configuration

To configure PII Protection, first create the required PII Rules by adding keyword or regex and selecting the required protection scope, such as Data Entry and Content Display.

Screenshot%202026 04 13%20at%2020.23.08

+New Keyword Rule:

Screenshot%202026 04 13%20at%2020.24.38

+New Regex Rule:

Screenshot%202026 04 13%20at%2020.23.51
Screenshot%202026 04 13%20at%2020.24.16

Next, create a Custom URL Group and add the relevant addresses.

Then apply the PII Protection Rules in the relevant policy. The policy action must be set to Allow, Isolate or ReadOnly as this is required for PII Protection enforcement.

Screenshot%202026 04 14%20at%2014.10.50

Once configured, addresses included in the Custom URL Group are evaluated against the assigned PII Rules.

Summary

PII Protection helps organizations protect sensitive personal data by detecting matched content and applying the configured protection method. With support for keyword and regex matching across Data Entry and Content Display, it provides flexible protection based on organizational requirements.

www.defensx.com
Secure Industries, Inc 101 Avenue of The Americas, Floor 9 New York, NY 10013