Administrator Help
Search
Overview
Forcepoint DLP basics
Forcepoint DLP appliances
Forcepoint DLP databases
What can I protect?
Data classification
Managing Forcepoint DLP
DLP in Forcepoint Web Security and Forcepoint Email Security
Navigating the system
Main options
Settings options
Deploy button
Global and status icons
Initial Setup
Entering a subscription key
Defining general system settings and notifications
Configuring system modules
Configuring the protector
Viewing Status
Viewing the Dashboard
Monitoring system health
Viewing endpoint status
Changing table properties
Viewing mobile device status
Applying column filters
Viewing deployment status
Viewing Incidents and Reports
The report catalog
Viewing the incident list
Data Loss Prevention reports
Mobile devices reports
Discovery reports
Policies Overview
What’s in a policy?
Viewing policies
Selecting items to include or exclude in a policy
Configuring the Email DLP Policy
Configuring outbound and inbound email DLP attributes
Defining email DLP policy owners
Identifying email DLP trusted domains
Configuring the Web DLP Policy
Web DLP policy configuration overview
Configuring web DLP policy attributes
Selecting web DLP policy destinations
Defining web DLP policy owners
Configuring the Mobile DLP Policy
Mobile DLP policy configuration overview
Configuring mobile DLP attributes
Defining policy owners
Using Predefined DLP and Discovery Policies
Adding a predefined DLP or discovery policy
Changing the selected DLP or discovery policies
Changing policy industry or region settings
Creating Custom DLP Policies
Custom Policy Wizard - General
Custom Policy Wizard - Condition
Custom Policy Wizard - Severity and Action
Custom Policy Wizard - Source
Custom Policy Wizard - Destination
Rule Wizard - Finish
Selecting a content classifier
Managing rules
Managing exceptions
Classifying Content
Content classifier menu bar
Manually deleting fingerprinting classifiers
Details pane
Patterns & Phrases
File Labeling
File properties
Scripts
File fingerprinting
Database fingerprinting
Database Fingerprinting Wizard - Scheduler
Imported fingerprinting
Machine learning
Creating a rule from a content classifier
Defining Resources
General resources
Cloud resources
Endpoint resources
Remediation resources
User directory entries
Custom user directory groups
Custom users
Custom computers
Networks
Domains
URL categories
Business Units
Endpoint Devices
Endpoint Applications
Endpoint Application Groups
Endpoint Printers
Remediation
After defining which information can go where, identify the remediation steps or actions to perform when a policy breach is discovered.
Creating Discovery Policies
Creating a discovery policy
Scheduling the discovery scan
Performing file system discovery
Performing SharePoint discovery
Performing Domino discovery
Performing Box discovery
Performing database discovery
Performing Exchange discovery
Performing Outlook PST discovery
Performing endpoint discovery
Viewing discovery status
Viewing discovery results
Updating discovery
Configuring discovery incidents
Copying or moving discovered files
Scheduling Discovery Tasks
Sorting and filtering tasks
Scheduling network discovery tasks
Emailing discovery task status reports
Configuring cloud discovery scans
Adding or editing a cloud discovery scan
Scheduling endpoint discovery tasks
Viewing Forcepoint DLP Logs
Filtering log data
Printing and exporting logs
The Forcepoint DLP traffic log
The Forcepoint DLP system log
The Forcepoint DLP audit log
General System Settings
Setting reporting preferences
Backing up the system
Exporting incidents to a file
Configuring endpoint settings
Remediation
Mail servers
Alerts
Archive storage
Services
Analytics
User directory settings
Archiving incident partitions
Updating predefined policies and classifiers
Entering subscription settings
Configuring Authorization
Defining administrators
Working with roles
Customizing your own administrator account settings
Managing Forcepoint DLP System Modules
Adding Forcepoint DLP system modules
Configuring protector services
Removing Forcepoint DLP modules
Balancing the load
Configuring Endpoint Deployment
Viewing and managing endpoint profiles
Configuring encryption for removable media
Selecting endpoint destination channels to monitor
Bypassing endpoint clients
Rearranging and deploying endpoint profiles
Using the endpoint client software
Troubleshooting
Discovery
Endpoint
Fingerprinting
Incidents
Miscellaneous
Performance
Linking Service
Online Help
Technical Support
Appendix A: How Do I
Archive my incident data?
Configure a DLP policy?
This section explains about how to configure a DLP policy.
Define an exception?
Filter incidents?
To filter incidents in a report, edit the report filters or apply column filters.
Fingerprint data?
Ignore sections of my document when fingerprinting?
Fingerprint specific field combinations in a database table?
Mitigate false positives in pattern or dictionary phrases?
Move from monitor to protect?