Forcepoint ONE Data Security policies enable monitoring and control of the flow of sensitive data throughout an organization.
Policy elements are the building blocks which include the resources and classifiers.
Forcepoint ONE Data Security secures your data everywhere. It prevents sensitive data exfiltration across cloud, web, email, and endpoint with DLP (SaaS). Policies and incidents are managed from a single platform hosted in the cloud.
Details of new and updated features, as well as known issues.
Signing into the management portal with multi-factor authentication ensures that your account remains secure.
The Getting Started section, has links to download the agent, links to sections in documentation to get you started using Forcepoint ONE Data Security, and Before you begin information.
Dashboards provide overview on Users, Endpoints, and Devices.
Investigation tab displays a list of all your end-users, alerts or devices allowing you to view and filter related activities to drill down for further information.
Endpoint management enables organizations to centrally manage all their related endpoints through the a single portal, streamlining management and ensuring consistent security throughout the organization.
Data protection comes with a rich set of predefined policies that cover the data requirements for a wide variety of organizations. Policies can be customized to meet an organization's specific needs, ensuring that sensitive data is always protected from unauthorized access, use, and disclosure.
Device control is a measure of protection that restricts user access to removable storage devices.
Using the User activity monitoring tab, administrators can customize the IOBs (modify the IoB predefined severity and exclude or include certain users and groups).
Resources collectively define the data sources and destinations, endpoint device or application used, or policy action to take when a violation is detected (permit and audit, confirm or block).
Policies use content classifiers to describe the data that is being protected. Content can be classified according to file properties, file labeling, key phrases, regular expression (regex) patterns, and dictionaries. Administrators can access the Classifiers in the cloud portal by navigating to Policy > Policy Elements > Classifiers.
The Settings dashboard has configuration settings for the email connector, audits logs, and other settings for amazon web service provider.