Create Profile

The Create Profile editor can be used to create custom profiles. If the administrator wants, then they can select the Inherit default profile option provided with each widget to apply the values from the default profile.

Profile details

Profile name: Each profile is stored using the provided name.

Description: Brief description of the profile.

Resources

Use Resources section to define the scope to exclude or include in the profile. The scope defines the endpoints or organizational units which should be subjected to this profile.

In the Search option, enter the resource name, then click to add to the list for either inclusion or exclusion. You can also use the Add all or Remove all options to remove or add multiple entries. Similarly, you can use the to remove entries that were added earlier for either exclusion or inclusion.

Also, from the Select OS: option select the operating system running on the endpoint machine.

General

Administrators can control all of the following from the General widget:
  • Displayed customer name: Set the customer name that is displayed on the Forcepoint agent console.
  • Default domain for local users: The endpoint uses the down-level logon name of the end user when determining which policy to enforce on web requests. When the end-user logs in as a local user (common in macOS), there is no domain part in the down-level logon that the endpoint uses. You must enter following:
    • Host name
    • Custom domain name
  • Endpoint connectivity to Neo cloud platform: Control the endpoint connectivity to the Forcepoint ONE Data Security cloud platform. Allows manual configuration of proxy settings for proxies that require authentication.

Currently, the values are inherited from the Default profile.

Over the air updates

Displays which agent software versions are pushed to the endpoints. Values are inherited from default profile settings. Over the air updates can be enabled or disabled from the Default profile. Also, administrators can either opt for automatic updates or select specific agent versions to update from the Default profile. If Update to a specific version is selected, then from the drop-down, can be used to select the exact agent version to update to.

Currently, the values are inherited from the Default profile.

Data Protection

The Data Protection toggle enables users that have Data Protection license to disable or enable it. Administrators can choose to enable the option Inherit default profile if they want to inherit the settings from the default profile. The data protection license applies both to On-Prem and SaaS DLP licenses. Those users who have only one of the licenses will see only the respective option (On-Premise or Cloud) under Managed by field. Users that have both the licenses will be able to select whether the profile is managed by On-Premise or Cloud.

The Endpoint Web Traffic Detection Mode sets whether to use Inline Proxy or Browser Extension. Since the Forcepoint agent currently supports only the Inline Proxy mode, the mode cannot be changed. When support for the Browser Extension mode is enabled for the agent, it will be possible to set the mode.

When the mode is set to Inline Proxy, the Inline Proxy JavaScript Injection Behavior attribute is displayed. Enable it to set the Javascript injection behavior.

Note: When the Inline Proxy is OFF, the JavaScript Injection Behavior is OFF, and no JavaScript Inspection is performed. The default setting for this attribute is OFF.

When the Inline Proxy JavaScript Injection Behavior attribute is ON, you can set a list of domains in which JavaScript inspection is applied, and a list of domains in which JavaScript inspection is bypassed. The options are:

  • If both lists are disabled, no JavaScript Inspection is applied (same behavior as when JavaScript Injection Behavior is OFF).
  • If only the Apply JS Injection only to the sites listed list is enabled, JavaScript inspection is applied only to the domains in the list.
  • If only the Apply JS Injection on all sites excluding those listed list is enabled, JavaScript inspection is applied to all domains except the domains in the list.
  • If both lists are enabled, JavaScript Injection is applied only to domains that are included in the Apply JS Injection only to the sites listed list and not included in the Apply JS Injection to all sites excluding those listed list.

In the following field, enter the domains that should be detecting file uploads by JavaScript injection.

In the following field, enter the domains that should not be detecting file uploads by JavaScript injection..

Products

Lists the features available and the license requirements.

Currently, the values are inherited from the Default profile.

Administrators can enable the following products on the endpoint:
  • Device Control: Needs license
  • User activity monitoring: Needs license
  • Neo web: Not licensed

Currently, the values are inherited from the Default profile.

Application Monitoring

Administrators can select applications whose traffic should be monitored for Windows or macOS endpoints. Currently, only the Forcepoint ONE agent is supported. Currently, supported only with Forcepoint ONE agent.

In the Search option, enter the application name, then click the Add <app> to list to add applications to the list.
  • For Windows, enter an executable name such as chrome.exe.
  • For macOS, enter an application name, for example Firefox.
  • Do not use wildcards.

Select the application name from the list and click Remove from list to remove the application.

Administrators can choose to enable the option Inherit default profile if they want to inherit the settings from the default profile.

Application Bypass

Administrators can exclude applications whose traffic should not be monitored for endpoints running Windows or macOS. Currently, supported only with Forcepoint ONE agent.

In the Search option, enter the application name, then click Add <app> to list to add applications to the list.

  • For Windows, enter an executable name such as chrome.exe.
  • For macOS, enter an application name, for example Firefox.
  • Do not use wildcards.

Select the application name from the list and click Remove from list to remove the application.

Administrators can choose to enable the option Inherit default profile if they want to inherit the settings from the default profile.

Traffic Monitoring

Administrators can control all of the following from the Traffic Monitoring widget.

Analyze web content: SSL decryption is required for inspecting text and files sent over web protocols and also for extracting URL path and headers to allow the Forcepoint Disposition Service to determine if web traffic should be allowed or blocked based on the URL domain as well as the URL path and headers.

Perform SSL decryption: The toggle button can be enabled or disabled for SSL decryption of web traffic.

Inspect web traffic for private networks: The endpoint will not perform SSL decryption and will not inspect text and files sent over web protocols to private IPv4 address: 10.0.0.0/8, 172.16.0.0/12 and 192.168.0.0/16.

Administrators can choose to enable the option Inherit default profile if they want to inherit the settings from the default profile.

SSL Inspection

Administrators can add domains that should not be SSL decrypted when endpoint inline proxy mode is enabled. Currently, supported only with Forcepoint ONE agent.

Use the toggle button to enable or disable the SSL Inspection Bypass.

Enter the domain name in the search option and click the search option and then click Add <domain> to list or you can drag and drop or browse a .txt file with comma-separated domains to add domains to the list.

Administrators can choose to enable the option Inherit default profile if they want to inherit the settings from the default profile.

Intercept web traffic

Intercept web traffic : The agent acts as a local proxy and must intercept web traffic for user activity monitoring and for redirecting traffic to the Forcepoint Cloud Security Gateway.

Manage system proxy: When enabled, the agent will manage the system proxy settings to forward traffic to the agent's proxy on localhost. It is recommended to set it to Enable when no other software manages system proxy settings.

Use Driver to capture Web Traffic: When enabled, the agent driver captures web traffic and forwards it to the agent local proxy on localhost. Set the IP or port number if the agent will forward traffic to the third-party agent running on the specified IP or Ports. Currently, supported only with Forcepoint ONE agent.

Forward Traffic to third-party agent: When set, the agent will forward traffic from its local proxy to the third-party agent running on the specified port. Currently, supported only with Forcepoint ONE agent.

Administrators can choose to enable the option Inherit default profile if they want to inherit the settings from the default profile.