[PDF] Forcepoint Web Security Cloud Help





Previous PDF Next PDF



Creative Cloud for enterprise

Creative Cloud for enterprise Architecture and Data Flow. 5. Creative Cloud for Proxy Connection* ... Sharing Options Whitelisted Domains. Selected.



Adobe Creative Cloud Network Endpoints

Auxiliary services do not have a dependency on any other service. Enable all Adobe services. Whitelist the following endpoints to enable access to all Adobe 



Adobe® Analytics Security Overview

Used alone or in conjunction with other Adobe Experience Cloud solutions Adobe Analytics turns vast streams of data from any channel into real-time



Forcepoint Web Security Cloud Help

18 Jul 2022 Forcepoint Cloud Security Gateway Portal Help ? i. Contents ... Distributing the endpoint via GPO (Classic Proxy Connect and Direct Con-.



Troubleshooting

Adobe has a tool you can download to remove all parts of your Creative Cloud An H.264 proxy file is generated via Adobe Media Encoder and emailed to the ...



ICT Design Models for Schools

Creative Cloud Apps & Design and Web K-12 Collection . School principals can authorise specialist technicians to 'whitelist' individual websites to suit ...



Deep Freeze Cloud User Guide

Getting Started if you are a New Deep Freeze Cloud User . 609 Granville Street Suite 1400 ... Adobe Creative Suite 6 Master Collection.



Compass for Windows User Guide

The IT Administrator can check and see if their locally installed version of the. Microsoft Office suite is compatible with the Compass for Windows software.



Panel for Adobe Premiere Pro - Version

16 Jun 2021 To playback the imported sequence and display thumbnails in MediaCentral Cloud UX a proxy needs to be created and the video analysis needs to ...



Panel for Adobe Premiere Pro - Version

29 Jul 2021 To playback the imported sequence and display thumbnails in MediaCentral Cloud UX a proxy needs to be created and the video analysis needs to ...

2023Forcepoint Web Security Cloud

Forcepoint Cloud Security Gateway

Portal Help

©2023, ForcepointForcepoint and the FORCEPOINT logo are trademarks of Forcepoint. All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information

in this documentation is subject to change without notice.

Last modified: May 24, 2023

Forcepoint Cloud Security Gateway Portal Help i

Contents

Chapter 1Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1

Initial steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2

Logging on and portal security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2

Cloud Web setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3

Configuring your firewall to connect to the cloud service . . . . . . . . . . . . . . . .4 Sending end user information to the cloud service. . . . . . . . . . . . . . . . . . . . . .5

Configuring SCIM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5

Configuring the Directory Synchronization Client . . . . . . . . . . . . . . . . . . .5

Adding users manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6

Setting up your first policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6

Configuring policy connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6

Adding end users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7

Directing user traffic to the cloud service . . . . . . . . . . . . . . . . . . . . . . . . . .7

Finishing the setup (next steps). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8

Using the Resource Center. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8

Navigating the cloud portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9

Cloud portal dashboards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11

Creating custom dashboards in the cloud portal. . . . . . . . . . . . . . . . . . . . . . .15

Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17

Chapter 2Account Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19

My Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20

Configuring SIEM storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20

Contacts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22

Adding a contact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22

Password settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26

Password policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

Password expiration limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28

User lockout. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28

Changing passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29

Forgotten passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30

Two-factor authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31

Login options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32

Terms of use. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33

Identity Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34

End Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34

Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35

Downloading and uploading groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36 ii Forcepoint Web Security CloudContents

Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37

Licenses page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38

License information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38

Accepting licenses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38

Administrator single sign-on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39

Privacy protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43

Data Protection Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44

Important rules for configuring accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .46

Chapter 3Working with External Directories. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49

What is SCIM?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50

How the service works with SCIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50

What is LDAP?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51

How the service works with LDAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51

Planning for your first synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53

Deciding what to synchronize. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54

Synchronizing with SCIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55 Synchronizing with the Directory Synchronization Client . . . . . . . . . . . .55

Basic steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56

Cloud portal tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57

Configure identity management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57

Set up authentication (Directory Synchronization only). . . . . . . . . . . . . . . . .59 Client tasks (Directory Synchronization only) . . . . . . . . . . . . . . . . . . . . . . .60

Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60

View and manage user data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .61

Assign a group to a different policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .61

View and print reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62

View recent synchronizations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62

Restore directories. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63

Troubleshoot synchronization failures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64

Turn off identity management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65

Chapter 4 Configuring Web Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67

Configure General settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68

Proxy auto-configuration (PAC). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68

Proxy query page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71

Web performance monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72

Roaming home page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73

Configure Remote Browser Isolation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74

Configure File Sandboxing settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76

Supported file types. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .77

What does a file sandboxing transaction look like? . . . . . . . . . . . . . . . . . . . .78 Configure End User Single Sign-On settings. . . . . . . . . . . . . . . . . . . . . . . . . . . .78 Forcepoint Cloud Security Gateway Portal Help iiiContents

Configure Bypass Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80

Bypassing authentication settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80

Adding and importing sites that bypass the proxy . . . . . . . . . . . . . . . . . . . . .84

Bypassing certificate verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86

Bypassing authentication decryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .87

Configure Domain settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88

Editing a domain. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90

Configure Endpoint settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90

Endpoint overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .91

Configure General endpoint settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96 Configure endpoint End User Control settings. . . . . . . . . . . . . . . . . . . . . . . .98 Windows operating system users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .99 Installing and uninstalling Neo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .100 Distributing the endpoint via GPO (Classic Proxy Connect and

Direct Connect) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .100

Installing the endpoint on a single machine (Classic Proxy Connect

and Direct Connect). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .101

Uninstalling the endpoint from Windows (Classic Proxy Connect and

Direct Connect) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .102

Mac operating system users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .103

Installing and uninstalling Neo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .103 Installing the endpoint (Classic Proxy Connect and Direct Connect) . . .103 Identifying Mac endpoint end users. . . . . . . . . . . . . . . . . . . . . . . . . . . . .105 Changing the policy of a Mac end user . . . . . . . . . . . . . . . . . . . . . . . . . .105 Uninstalling the endpoint from the Mac (Classic Proxy Connect and

Direct Connect) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .106

Updating the endpoint. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .107

Endpoint bypass . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .107

Configure protected cloud apps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .108

Configure Full Traffic Logging settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .111

Configure custom categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .111

Adding sites to custom categories. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .113

Time periods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .114

Configure custom protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .116

Adding or editing a custom protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .116

Configure block and notification pages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .117

Editing notification pages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .119

Notification page variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .121

Language support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .123

Configure Content Classifiers for Data Security (DLP Lite). . . . . . . . . . . . . . .124 Regular expression content classifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . .125

Key phrase content classifiers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .126

Dictionary content classifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .127

iv Forcepoint Web Security CloudContents

Chapter 5Managing Network Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .129

Managing edge devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .131

Adding or editing edge device information. . . . . . . . . . . . . . . . . . . . . . . . . .134 Import multiple edge devices via a CSV file . . . . . . . . . . . . . . . . . . . . . . . .137

Generating device certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .139

Managing EasyConnect services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .140

Adding or editing an EasyConnect service. . . . . . . . . . . . . . . . . . . . . . . . . .141

Managing I Series appliances. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .142

Optimizing appliance performance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .144 Adding or editing appliance information . . . . . . . . . . . . . . . . . . . . . . . . . . .145

Configure general settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .146

Configure a certificate authority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .147 Generating an appliance certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . .148 Define internal network settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .149 Configure advanced settings (if needed) . . . . . . . . . . . . . . . . . . . . . . . . .151

Chapter 6Defining Web Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .153

General tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .156

User and group exceptions for time-based access control . . . . . . . . . . . . . .160

Connections tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .161

Access Control tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .164

Pre-logon welcome page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .166

Session timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .166

NTLM identification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .167

NTLM registration page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .167

Setting authentication options for specific users. . . . . . . . . . . . . . . . . . . . . .169

Endpoint tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .170

End Users tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .173

Registering by invitation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .174

Bulk registering end users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .174

End user self-registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .176

Identity management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .177

NTLM transparent identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .177

Editing end-user registration pages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .178

Managing registered users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .178

Rules for policy association during end-user registration. . . . . . . . . . . . . . .179

Cloud Apps tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .180

Custom Categories tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .182

Adding sites to custom categories. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .183

Web Categories tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .185

Enabling SSL decryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .185

Managing categories, actions, and SSL decryption . . . . . . . . . . . . . . . . . . .186 Forcepoint Cloud Security Gateway Portal Help vContents

Policy enforcement actions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .188

Using quota time to limit Internet access . . . . . . . . . . . . . . . . . . . . . . . . . . .189

YouTube Restricted mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .190

Bypassing SSL decryption for specific sites. . . . . . . . . . . . . . . . . . . . . . . . .190

Exceptions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .191

Auto tunneling of WebSocket Traffic. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .193

Filtering action order. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .194

Category list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .196

Protocols tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .197

Protocol exceptions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .197

Application Control tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .198

Application control exceptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .199

File Blocking tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .201

Blocking by file type. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .202

Blocking by file extension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .203

Advanced options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .205

Data Protection tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .206

Data Security tab (DLP Lite) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .207

Web Content & Security tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .211

Configuring file analysis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .214

Analysis exceptions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .215

Chapter 7Report Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .217

Using the Report Catalog. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .218

Managing reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .219

Managing folders. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .222

Using the Report Builder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .224

Creating a report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .226

Viewing report results. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .227

Viewing detailed reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .228

Exporting a report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .229

Scheduling reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .229

Adding and editing scheduled jobs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .230

Exporting data to a third-party SIEM tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . .233

Running the SIEM log file download script for Forcepoint storage. . . . . . .236

Chapter 8Web Reporting Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .239

Using the Transaction Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .240

Using the Incident Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .242

Report attributes: Web and Data Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . .243

Report metrics: Web and Data Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .254

Web predefined reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .256

vi Forcepoint Web Security CloudContents

Chapter 9Account Reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .265

Endpoint Auditing Report (Classic Proxy Connect and Direct Connect) . . . . .266

Service reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .267

Downloading report results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .268

Saving reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .268

Scheduling reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .269

Chapter 10Audit Trails . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .271

Configuration audit trail. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .271

SCIM audit trail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .272

Chapter 11Standard Web Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .273

Appendix AUse Cases for Setting up User Provisioning. . . . . . . . . . . . . . . . . . . . . . . . . .279

New Web and/or email customers (LDAP) . . . . . . . . . . . . . . . . . . . . . . . . . . . .279

New Web customers (SCIM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .281

Existing Web and/or email customers (LDAP) . . . . . . . . . . . . . . . . . . . . . . . . .282 Considerations for existing customers (LDAP) . . . . . . . . . . . . . . . . . . . . . .284

Existing Web customers (SCIM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .285

Considerations for existing customers (SCIM). . . . . . . . . . . . . . . . . . . . . . .286

Appendix BData Security Content Classifiers (DLP Lite only). . . . . . . . . . . . . . . . . . . .287

Personally Identifiable Information (PII). . . . . . . . . . . . . . . . . . . . . . . . . . . . . .287

Protected Health Information (PHI). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .300

Payment Card Industry (PCI). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .303

Data Theft. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .303

1

Cloud Security Gateway Portal 1

Getting Started

Forcepoint Cloud Security Gateway | Forcepoint Web Security Cloud Help Cloud web protection products protect your organization against the threats of malware, spam, and other unwanted content in web traffic. The following web products are available in the cloud: content categories, enabling you to create highly granular acceptable use policies. security analysis, real-time content classification, detection of inappropriate content in dynamic websites, granular configuration for social web controls, and

SSL decryption by category.

The cloud service offers the following add-ons for web products: provides on-premises URL analysis and application/protocol detection for web traffic, along with centralized policy management and reporting capabilities in the cloud. When policy indicates that a request requires additional analysis, it is transparently routed to the cloud, where cloud analytics are applied and policy is enforced. suspicious files to a cloud-hosted sandbox for further analysis. You configure and administer these services using the Forcepoint Cloud Security Gateway Portal, also referred to in this Help as the Security Portal, or the cloud portal. The portal provides a central, graphical interface to the general configuration, policy management, and reporting functions of your web protection service, making it easy to define and enforce web security.

To get started, see:

Getting Started

2 Forcepoint Web Security Cloud

Initial steps

If you have not already done so, take the following steps to get started. If you are not able to complete all of the in-network configuration steps immediately, you can complete them after you perform the cloud portal configuration steps.

1. Configure your firewall to allow connectivity to the cloud service.

See Configuring your firewall to connect to the cloud service.

2. Log on to the Security Portal.

See Logging on and portal security, page 2, for instructions.

3. Add your Internet gateway IP addresses to your policy.

See Proxied connections, page 161, for instructions.

4. Configure end-user authentication (if required).

If you have not already completed these steps, please see the Getting Started Guide for detailed instructions.

Logging on and portal security

To access the portal, visit https://admin.forcepoint.net/portal. (For tips on navigation the portal, see Navigating the cloud portal, page 9.) The logon process uses cookies where possible. For the best user experience, we recommend that you accept cookies from the Security Portal. If your web browser is unable to, or is configured not to accept cookies from the portal, an additional screen appears during logon reminding you of the benefits of securing your session. If the portal cannot use cookies to secure the session, it falls back to ensuring that all requests for the session come from the same IP address. This may cause problems for you if your company has several load-balanced web proxies, because the portal perceives requests coming from several sources as a security breach. Companies with a single web proxy or a cooperating web proxy farm should not be affected. To avoid problems, we recommend enabling cookies on your web browsers.

Privacy statement

The portal uses 2 cookies during logon. The first is used to identify whether the user's web browser is willing to accept and store cookies for the portal; it contains no information. If the first cookie is successfully stored, a second cookie is stored Note To use the Security Portal, your browser must have JavaScript enabled.

Cloud Security Gateway Portal 3Getting Started

containing temporary information about the session. No personal information is stored in either cookie, and both cookies are used only for the duration of the session.

Idle timeout

For security reasons, if you are logged on to your cloud service account and are inactive for a pre-defined period, you are automatically logged off. When you next attempt to perform an action, you are asked to log on again. Once you have done so, you are taken to the area of the portal that you requested. The inactivity timer is between 30 and 60 minutes.

Customizable landing page

By default, administrators logging onto the portal are taken to the Account > Licenses page. To change your landing page:

1. Navigate to the page you would like to use as your portal landing page.

2. Click the arrow next to your logon account name in the banner at the top of the

page.

3. Select Set Landing Page.

Note that some pages have been deliberately excluded from supporting this option.

Cloud Web setup

Setting up cloud web involves a combination of steps performed in your network (to allow communication with the cloud service) and steps performed in the cloud portal (policy configuration). If you are not able to complete all of the in-network configuration steps immediately, you can complete them after you perform the cloud portal configuration steps.

Getting Started

4 Forcepoint Web Security Cloud

Configuring your firewall to connect to the cloud service In order for the cloud service to manage web traffic from your network, your firewall must allow TCP connections outbound to Forcepoint data centers on specific ports. The table below details the ports that may be used, depending on your configuration. In addition to the above, ports 80 and 443 can be used by: from a separate website used by the cloud infrastructure (not directly through the cloud proxy). Bypass setting are configured to route directly to the origin server. Browsers will connect directly via port 80 (or 443 for HTTPS). may choose to configure all browsers to use this as their home page. This page is always unproxied when using cloud service PAC files.

Port Required for

8081 Web browsing when using standard PAC file addresses.

8082
(default)Retrieving cloud service PAC files (standard PAC file address). 8087
(default)Retrieving cloud service PAC file over HTTPS (standard PAC file address).

8006 End user single sign-on authentication. See Configure End User Single Sign-

On settings, page 78.

8089 Secure form authentication. See Access Control tab, page 164.

file address. Tip To guarantee availability, Forcepoint Web Security Cloud uses global load balancing to direct traffic across multiple geographic locations. In the event of localized connectivity issues, data center load balancing automatically routes requests to the next closest location. To make the most of the resilience offered by this infrastructure, users must be allowed to connect to the entire cloud network. For details of the IP address ranges in use by cloud service data centers, see the article Cloud service IP addresses and port numbers in the Forcepoint Knowledge Base.

Cloud Security Gateway Portal 5Getting Started

browser settings are correct for accessing the proxy.

Sending end user information to the cloud service

End user information can be sent to the cloud service in one of 3 ways: using a cloud directory service) to provision user and group identity data from a cloud-based identity provider to the cloud service.

See Configuring SCIM.

or LDAP) involves installing the Directory Synchronization Client in your network and configuring it to synchronize user and group information from your

LDAP directory to the cloud service.

See Configuring the Directory Synchronization Client. to use in testing. User details are added to policies using the End Users tab options.

See Adding users manually.

Configuring SCIM

Your identity provider must be configured to work with the cloud service so that user and group data can be synchronized from the provider. See Configure identity management for more details.

Configuring the Directory Synchronization Client

To enable directory synchronization between your LDAP directory and the cloud service, start by creating a contact with Directory Synchronization permissions. The user name and password will be used by the Directory Synchronization Client to connect to the cloud service. Refer to the Directory Synchronization Client Administrator's Guide for further information, including how to download and configure the client software. Note Remote users should use the alternate PAC file addresses (using port 80 or 443) if requesting access from networks that may have port 8081, 8082, or 8087 locked down. Note Okta and Microsoft Azure Active Directory are the only identity provided currently supported.

Getting Started

6 Forcepoint Web Security Cloud

Adding users manually

User accounts that you plan to use for testing can be added when a new policy is added. See the step for Adding end users when setting up a policy.

Setting up your first policy

Use the Web > Policy Management > Policies page to create a basic policy to determine which websites can and cannot be accessed by users whose traffic is managed by the cloud service. This process walks you through creating a very basic policy that you can customize later if necessary. See Creating a new policy for complete instructions and details.

1. Click Add.

2. Enter a policy name and administrator email address. This email address is used

as the address from which system messages are sent.

3. Select a pre-defined policy template to use as the basis for your new policy:

Material, Gambling, and sites that present a security risk, while permitting access to sites commonly used for business or educational purposes. related sites or sites that host malware) and permits access to all others. in reporting.

4. Select a Time zone for this policy. This may be used both for time-based policy

enforcement and reporting log records.

5. When you are finished, click Save.

Configuring policy connections

When the page re-displays, click Connections and use the options on that page to identify the traffic originating from your organization that should be managed by the policy that you are creating. Each connection added to Proxied Connections is a public-facing IP address, range, or subnet for the gateway through which users' traffic reaches the Internet. To get started, click Add under Proxied Connections, then:

1. Enter a unique Name and Description for the connection.

2. Select a connection Type: IP address, IP address range, or subnet.

3. Enter the connection definition for the type that you selected.

4. Optionally, select a Time zone for this connection. If no time zone is selected, the

time zone defined for the policy as a whole is used.

5. Click Continue to save your change and return to the Connections tab.

Cloud Security Gateway Portal 7Getting Started

Repeat this process for each connection that you want to define for this policy.

Adding end users

The End Users tab is where all end-user registration configuration is performed. Registration is a method of getting user credentials into your cloud service account. To get started with this new policy, select Invite an end-user in the User Management section.

1. In the Name field, enter the user's display name (for example, Jane Doe).

2. Enter the user's Email address (for example, jdoe@mydomain.com).

3. Enter the user's NTLM identity (for example, mydomain/jdoe).

4. Click OK.

Repeat this process as needed.

To remove an account entry, mark the check box next to the user name and click

Delete.

Directing user traffic to the cloud service

Use the Default Pac file addresses on the Web > Settings > General page to get the information you need to use a PAC file to direct user traffic from your network to the cloud service. Perform the following steps on a machine that is inside the network that you defined as a connection in the previous step. This may optionally be the same machine thatquotesdbs_dbs5.pdfusesText_10
[PDF] adobe creative cloud revenue

[PDF] adobe creative cloud security issues

[PDF] adobe creative cloud security white paper

[PDF] adobe creative cloud sso url

[PDF] adobe creative cloud storage cost

[PDF] adobe creative cloud storage full

[PDF] adobe creative cloud storage login

[PDF] adobe creative cloud storage options

[PDF] adobe creative cloud storage requirements

[PDF] adobe creative cloud storage review

[PDF] adobe creative cloud storage upgrade

[PDF] adobe creative cloud student discount

[PDF] adobe creative cloud student free

[PDF] adobe creative cloud student free download

[PDF] adobe creative cloud student how many devices