Configuring Endpoint Deployment

Deploying endpoint client software for Forcepoint DLP requires a subscription to Forcepoint DLP Endpoint.

  • Endpoint client software resides on an endpoint machine (such as a laptop or workstation). It monitors real-time traffic and applies security policies to applications and storage media, as well as data at rest. The client software allows administrators to analyze content on endpoint machines and block or monitor policy breaches (defined in endpoint profiles). Administrators can create policies that allow full content visibility without restricting device usage.

    When endpoint client software is installed, it attempts to connect to a Forcepoint DLP server to retrieve policies and profiles. As soon as its settings are deployed, the endpoint client starts running according to its profile settings.

  • The endpoint server component is installed automatically on the management server and supplemental Forcepoint DLP servers. Endpoint servers receive incidents from, and send configuration settings to, endpoint clients.

The endpoint software deployment process includes the following basic steps:

  1. Install the Forcepoint DLP management server.
  2. Build a package for the endpoint client and deploy it on users’ computers (desktop and laptop machines), as described in the endpoint documentation.
  3. Add an endpoint profile in the Data Security module of the Forcepoint Security Manager, or use the default profile installed with the client package. See Adding an endpoint profile section and Rearranging and deploying endpoint profiles section.

    Endpoint profiles are templates that set service permissions. A profile describes the required behavior of an endpoint client: how it connects to endpoint servers, which user interface options are available on the client, and how it uses encryption to protect sensitive data. Each profile is deployed to selected endpoint clients.

  4. Configure endpoint settings. See Configuring endpoint settings section.
  5. Create endpoint resources. See Endpoint Devices, Endpoint Applications and Endpoint Application Groups sections.
  6. Create or modify a rule for endpoint channels. See Selecting endpoint destination channels to monitor section.
  7. Define the type of endpoint machines to monitor, and configure on- and off- network behavior. See Custom Policy Wizard - Source section.
  8. Deploy endpoint configuration settings.

Once endpoint client software has been deployed and configuration and profile creation is complete, administrators can:

  • Review the status of endpoint systems. See Viewing endpoint status section.
  • Review incidents detected by endpoint software, and take action on them, such as editing the incident details, changing the severity of the incident, or escalating the incident to a manager. See Viewing the incident list section.

In special circumstances, monitoring and protection can be bypassed for an endpoint client. See Bypassing endpoint clients section, for more information on this capability.

For information on what end users see on their machine when endpoint software is installed, see the Endpoint Solutions End User’s Guide on the Forcepoint Documentation page. This document can be distributed to end users, as needed.