Restoring your Forcepoint DLP configuration

Steps

  1. Make sure all Forcepoint DLP modules—servers, agents, protectors—are registered with the Forcepoint management server and the system is operating normally.
  2. On the management server, open the Windows Control Panel and select Programs > Uninstall a program.
  3. Select Forcepoint DLP, then click Uninstall/Change.
  4. When asked if you want to add, remove, or modify Forcepoint DLP, select Modify.
  5. Click Next until you get to the Restore Data from Backup screen.
    Note: Backups must be enabled in order to restore a backup from another DLP management server. See the DLP installation guide for instructions.
  6. Select the Load Data From Backup check box and click the Browse button to locate the backup file.
  7. Select the Clear Forensics since last backup check box if you want to use only the stored forensics from your backup file; this will remove all forensics gained since the last backup. (Leaving it unchecked means that your forensics data after the restore will include the backed-up forensics and the forensics added since that backup.)
  8. Click Next until you begin the restore procedure.
    • During the restore process, a command-line window appears; it may remain for some time, but it disappears when the recovery is complete.
    • The restore operation completely erases all policies and data (and, if checked, forensics) of the current system, and replaces them with the backed-up data.
  9. Complete the restore wizard.
  10. To review the restore activity, read the DataRestore.log file located in the backup folder (for example, MM-DD-YYYY-HH-MM-SS).
  11. Log onto the Data Security module of the Forcepoint Security Manager.
  12. To enable your crawlers to work with the newest encryption keys, open each discovery, fingerprint, and machine learning task in your system and edit it in some way, even just the description.
    • If you have Box discovery tasks, edit them and enter your Box credentials again.
    • If your fingerprint tasks were configured to be exported to a machine with credentials, edit them and reenter the machine credentials.
  13. Select Deploy.
    Note: If the backup system contains many policies, it may take a while to load the policies and deploy them.