Introduction
Forcepoint ONE Data Security secures your data everywhere. It prevents sensitive data exfiltration across cloud, web, email, and endpoint with DLP (SaaS). Policies and incidents are managed from a single platform hosted in the cloud.
Features and benefits
Management portal
The management portal provides a centralized location for configuring and managing your organization's data security policies. It also allows for reviewing and investigating any related data security incidents (alerts) and the visualization and management of user activity on related endpoint devices.
Data protection
Forcepoint ONE Data Security includes best in class predefined compliance templates enabling simple single click compliance for PCI DSS, HIPAA, Intellectual Property, and PII.
Device Control
Device Control enables organizations to manage the use of removable storage devices connected to user endpoints.
User Activity Monitoring
User activity monitoring capability alerts organizations of risky user behavior so they can protect data and reduce risks.
Endpoint management
Endpoint management enables organizations to centrally manage all their related endpoints through the Forcepoint ONE Data Security portal, streamlining management and ensuring consistent security throughout the organization.
Help and support
Access Forcepoint help and support services for assistance and troubleshooting on support.forcepoint.com.
Product updates
Details of new and updated features, as well as known issues.
Sign into the management portal
Signing into the management portal with multi-factor authentication ensures that your account remains secure.
Supported browsers
The management portal is supported only on certain web browsers.
Enabling multi-factor authentication
When you first sign in, you will be prompted to select an authentication method.
Changing the password
You can change your password at any time when you are signed into Forcepoint ONE Data Security portal.
SAML SSO Configuration
Forcepoint ONE Data Security portal supports login via SAML compliant identity providers. This helps the user to log in to the portal using SSO.
Login with SAML SSO
The cloud portal supports login via SAML identity providers like Okta and Azure.
Getting Started
The Getting Started section, has links to download the agent, links to sections in documentation to get you started using Forcepoint ONE Data Security, and Before you begin information.
Dashboards
Dashboards provide overview on Users, Endpoints, and Devices.
Users
Use the Users dashboard to gain a high-level view of user activities in your organization.
Endpoints
Use the Endpoints dashboard to gain a high-level view on the status of agents in your organization.
Devices
Investigation
Investigation tab displays a list of all your end-users, alerts or devices allowing you to view and filter related activities to drill down for further information.
Users
In the Users panel, you can view per user details on risk level, most recent activity, alerts, and other details.
Alerts
The Alerts tab displays detailed information on alerts recorded in the organization. For each alert the severity, reporting time, rule name, category, user, reporting products, and other details are displayed in a tabular view.
Devices
Devices investigation provides advanced tool to search, analyze, and obtain the device usage insights based on the correlation of users and endpoints.​
Endpoint management
Endpoint management enables organizations to centrally manage all their related endpoints through the a single portal, streamlining management and ensuring consistent security throughout the organization.
Policy
Forcepoint ONE Data Security policies enable monitoring and control of the flow of sensitive data throughout an organization.
Data protection
Data protection comes with a rich set of predefined policies that cover the data requirements for a wide variety of organizations. Policies can be customized to meet an organization's specific needs, ensuring that sensitive data is always protected from unauthorized access, use, and disclosure.
Device control
Device control is a measure of protection that restricts user access to removable storage devices.
User activity monitoring
Using the User activity monitoring tab, administrators can customize the IOBs (modify the IoB predefined severity and exclude or include certain users and groups).
Policy Elements
Policy elements are the building blocks which include the resources and classifiers.
Settings
The Settings dashboard has configuration settings for the email connector, audits logs, and other settings for amazon web service provider.
Admins
Three types of users have access to the cloud portal: administrators, analysts, and Helpdesk.
Email
Forcepoint DLP for Cloud Email helps prevent data leaks via the email channel.
Audit log
Audit logs are generated when any of the following happen: create, edit, or delete of a new user, password change​, generation of master, endpoint, or bypass release code​, deleting an endpoint​, exporting data​, changes to OTA update configurations​, changes to device control policy​ etc.
Advanced
The Advanced tab allows the administrators to integrate with Amazon Replication Service and External Identity Providers.
Download Agent
The Download Neo option on all Settings tabs allows administrators to download the specific agent versions.
Predefined policies and classifiers
Supported file formats and size limits
Export data from Forcepoint ONE Data Security portal
Generate PDF or CSV reports on users, devices, alerts, and endpoints.
Backup Procedure
Forcepoint ONE Data Security utilizes multiple availability zones for persistent storage of customer data.