Although configuration settings may be customized at any time, the default module configuration may be sufficient:
- Typically, in Forcepoint Web Security deployments, no additional configuration is needed.
- In full Forcepoint DLP deployments, in most cases, the only module that must be configured after installation is the protector. This is covered in Configuring the
protector.
To configure a Forcepoint DLP system module:
Steps
-
Go to the page in the Data Security module of the Forcepoint Security Manager.
-
Click a module.
-
Complete the fields as shown in the appropriate section below. Note that not all modules are available for all deployments.
- Configuring the Forcepoint DLP management server
- Configuring a supplemental Forcepoint DLP server
- Configuring the fingerprint repository
- Configuring the endpoint server
- Configuring the crawler
- Configuring the forensics repository
- Configuring the policy engine
- Configuring the OCR server
- Configuring the protector
- Configuring ICAP
- Configuring the Web Content Gateway module
- Configuring the Forcepoint Email Security module
- Configuring Forcepoint DLP Email Gateway
- Configuring the integration agent
- Configuring protector services
- Configuring the analytics engine