There are additional configuration options not enabled by default. These are currently enabled via a special anchor link and stored as a flag in local storage. They aren’t secret, but not usually needed unless advanced tuning is required.
Why do this instead of user flags? Because startup, that’s why.
Enter the following URL exactly.
https://useast.prompt.security/employees/manage/Employees%20Connector/policies#isAdvanced=true
…and you should see the following:
Enable that toggle, additional protections and thresholds will be available.
Previously 4.2.2.2 was not detected as an IP without the context word. Adjust the threshold until it is. Thresholds are available by expanding the ‘Sensitive Data’ protection and scrolling down.

In the default policy the following will be correctly detected as an Australian passport:
My passport number is E4729018
Adjust the threshold until it also catches the version with a typo:
My passprot number is E4729018
Exercise 2.3 - Detect ‘invisible characters’
Copy the following example EXACTLY. Find and enable a protection to detect and block some unwanted characters. (Try https://invisible-characters.com/view.html to see the actual message)
There are valid attacks using these methods to inject unwanted content into documents.
—---- Begin
This is a sample text with common invisible characters:
Here are some unusual characters: ㅤ⠀
—--- END
Hints:
Exercise 2.1 and 2.2 are entirely solvable within the ‘Sensitive Data’ protection. Keep scrolling, so long as Advanced Mode is enabled
Exercise 2.3 requires a separate protection. One code is all you need.