Forcepoint ONE Data Security policies enable monitoring and control of the flow of sensitive data throughout an organization.
Device control is a measure of protection that restricts user access to removable storage devices.
Administrators can manage access rules from the Policy view and can create, delete, edit, duplicate, disable, and change rule priority from the Policy view.
Forcepoint ONE Data Security (FONE DS) secures your data everywhere. It prevents sensitive data exfiltration across cloud, web, email, and endpoint with DLP (SaaS). Policies and incidents are managed from a single platform hosted in the cloud.
Details of new and updated features, as well as known issues.
Signing into the management portal with multi-factor authentication ensures that your account remains secure.
The Getting Started section, has links to download the agent, links to sections in documentation to get you started using Forcepoint ONE Data Security, and Before you begin information.
Dashboards provide overview on Users, Endpoints, and Devices.
Investigation tab displays a list of all your end-users, alerts or devices allowing you to view and filter related activities to drill down for further information.
Endpoint management enables organizations to centrally manage all their related endpoints through the a single portal, streamlining management and ensuring consistent security throughout the organization.
Data protection comes with a rich set of predefined policies that cover the data requirements for a wide variety of organizations. Policies can be customized to meet an organization's specific needs, ensuring that sensitive data is always protected from unauthorized access, use, and disclosure.
The Default access rule displays information on the version of the current applied policy rule. The default access rule applies to all users and all removable storage devices.
Dynamically add protection for devices based on the current user risk level based on the risk score.
Create a copy of the specific rule.
Policy access rules can be imported and exported in JSON format.
Using the User activity monitoring tab, administrators can customize the IOBs (modify the IoB predefined severity and exclude or include certain users and groups).
Policy elements are the building blocks which include the resources and classifiers.
The Settings dashboard provides access to user configuration for your organization. Administrators can use this dashboard to set up accounts and view tenant information. Analysts or Helpdesk admins do not have access to this dashboard.
Select the specific rule from the list, to open the Edit access rule widget.