IntroductionForcepoint ONE Data Security (FONE DS) secures your data everywhere. It prevents sensitive data exfiltration across cloud, web, email, and endpoint with DLP (SaaS). Policies and incidents are managed from a single platform hosted in the cloud.
Management portal The management portal provides a centralized location for configuring and managing your organization's data security policies. It also allows for reviewing and investigating any related data security incidents (alerts) and the visualization and management of user activity on related endpoint devices.
Data protectionForcepoint ONE Data Security includes best in class predefined compliance templates enabling simple single click compliance for PCI DSS, HIPAA, Intellectual Property, and PII.
Device Control Device Control enables organizations to manage the use of removable storage devices connected to user endpoints.
User Activity Monitoring User activity monitoring capability alerts organizations of risky user behavior so they can protect data and reduce risks.
Endpoint management Endpoint management enables organizations to centrally manage all their related endpoints through the Forcepoint ONE Data Security portal, streamlining management and ensuring consistent security throughout the organization.
Help and support Access Forcepoint help and support services for assistance and troubleshooting on support.forcepoint.com.
Product updates Details of new and updated features, as well as known issues.
Sign into the management portal Signing into the management portal with multi-factor authentication ensures that your account remains secure.
Supported browsers The management portal is supported only on certain web browsers.
Enabling multi-factor authenticationWhen you first sign in, you will be prompted to select an authentication method.
Changing the passwordYou can change your password at any time when you are signed into Forcepoint ONE Data Security portal.
SAML SSO ConfigurationForcepoint ONE Data Security portal supports login via SAML compliant identity providers. This helps the user to log in to the portal using SSO.
Login with SAML SSOThe cloud portal supports login via SAML identity providers like Okta and Azure.
Getting Started The Getting Started section, has links to download the agent, links to sections in documentation to get you started using Forcepoint ONE Data Security, and Before you begin information.
Dashboards Dashboards provide overview on Users, Endpoints, and Devices.
UsersUse the Users dashboard to gain a high-level view of user activities in your organization.
EndpointsUse the Endpoints dashboard to gain a high-level view on the status of agents in your organization.
Investigation Investigation tab displays a list of all your end-users, alerts or devices allowing you to view and filter related activities to drill down for further information.
Users In the Users panel, you can view per user details on risk level, most recent activity, alerts, and other details.
Alerts The Alerts tab displays detailed information on alerts recorded in the organization. For each alert the severity, reporting time, rule name, category, user, reporting products, and other details are displayed in a tabular view.
DevicesDevices investigation provides advanced tool to search, analyze, and obtain the device usage insights based on the correlation of users and endpoints.
Endpoint management Endpoint management enables organizations to centrally manage all their related endpoints through the a single portal, streamlining management and ensuring consistent security throughout the organization.
Policy Forcepoint ONE Data Security policies enable monitoring and control of the flow of sensitive data throughout an organization.
Data protectionData protection comes with a rich set of predefined policies that cover the data requirements for a wide variety of organizations. Policies can be customized to meet an organization's specific needs, ensuring that sensitive data is always protected from unauthorized access, use, and disclosure.
Device controlDevice control is a measure of protection that restricts user access to removable storage devices.
User activity monitoring Using the User activity monitoring tab, administrators can customize the IOBs (modify the IoB predefined severity and exclude or include certain users and groups).
Policy Elements Policy elements are the building blocks which include the resources and classifiers.
Settings The Settings dashboard provides access to user configuration for your organization. Administrators can use this dashboard to set up accounts and view tenant information. Analysts or Helpdesk admins do not have access to this dashboard.
Admins Three types of users have access to the cloud portal: administrators, analysts, and Helpdesk.
Email Forcepoint DLP for Cloud Email helps prevent data leaks via the email channel.
Audit log Audit logs are generated when any of the following happen: create, edit, or delete of a new user, password change, generation of master, endpoint, or bypass release code, deleting an endpoint, exporting data, changes to OTA update configurations, changes to device control policy etc.
Advanced The Advanced tab allows the administrators to integrate with Amazon Replication Service and External Identity Providers.
Download AgentThe Download Neo option on all Settings tabs allows administrators to download the specific agent versions.
Export data from Forcepoint ONE Data Security portalGenerate PDF or CSV reports on users, devices, alerts, and endpoints.
Backup ProcedureForcepoint ONE Data Security utilizes multiple availability zones for persistent storage of customer data.