Chapter 15 Unified Threat Management for FortiOS 5.0 : Data leak prevention : DLP examples : Selective blocking based on a finger print : Configuration for the second sensor that allows transmission.
  
Configuration for the second sensor that allows transmission.
Use the following field values:
Name
allow_copyrighted
Comment
<optional>
Once the Sensor has been created a new filter will need to be added.
This will be identical to the filter in the block_copyrighted sensor except that the action will be Log Only.