Configuring the protector

To begin monitoring the network for sensitive information loss, configure the protector in the Data Security module of the Forcepoint Security Manager, on the Settings > Deployment > System Modules page.

The basic steps are:

  1. Select the protector instance.
  2. Define the channels for the protector to monitor.
  3. Supply additional configuration parameters needed by the Forcepoint DLP server to define policies for unauthorized traffic.
  4. Click Deploy.

After making configuration changes, make sure the protector does not have the status

Disabled or Pending. (The status is displayed on the System Modules page.) For detailed configuration information, see: