Endpoint Scanning : Rules and Actions : Importing and Exporting Rules
  
Importing and Exporting Rules
You can export all your current Discovery Rules and Actions to a .dra file that you can import and use on another computer. You can also import Discovery Rules and Actions from a .dra file, as well as import content-dependent detection rules from a Content-Aware Rules .cwl file. Exporting and importing can also be used as a form of backup.
You can export Discovery Rules and Actions by using the Save button in the Rules & Actions dialog box. The Load button in that dialog box imports Discovery Rules and Actions from either a .dra or .cwl file.
Another option is to use the Save and Load commands on the Rules & Actions node in the DeviceLock Management Console.
To export Discovery Rules and Actions
1. In the console tree, expand DeviceLock Content Security Server > Discovery Server > Rules & Actions, right-click the Rules & Actions node, and then click Save.
2. In the Save As dialog box that appears, specify the export file to hold the exported rules.
When you export rules, they are saved in a file with the .dra file name extension.
To import Discovery Rules and Actions
1. In the console tree, expand DeviceLock Content Security Server > Discovery Server > Rules & Actions, right-click the Rules & Actions node, and then click Load.
2. In the Open dialog box that appears, select the .dra or .cwl file that holds the exported rules.
You can import only one .dra or .cwl file at a time.
Content-dependent detection rules in .cwl format can be loaded from a file. When loading rules from a .cwl file, Log Event and Send Alert parameters are automatically converted into Log and Send Alert respectively. If the source rule does not have these parameters, you will need to specify the required action. Such rules will be displayed with an exclamation point icon as shown in the screen below.
 
Important: It is not possible to use a list of imported rules in which there is a rule marked with an exclamation point. Such rules must be re-configured by hand in order to assign an action or set up logging, alerting, or notification. Once all rules are correctly configured, the list is ready to use.