Configuring the protector
To begin monitoring the network for sensitive information loss, configure the protector in the Data Security module of the Forcepoint Security Manager, on the
page.The basic steps are:
- Select the protector instance.
- Define the channels for the protector to monitor.
- Supply additional configuration parameters needed by the Forcepoint DLP server to define policies for unauthorized traffic.
- Click Deploy.
After making configuration changes, make sure the protector does not have the status
Disabled or Pending. (The status is displayed on the System Modules page.) For detailed configuration information, see:
- Configuring the Protector in the Forcepoint DLP Administrator Help
- “Configuring the Protector for Use with SMTP” in theForcepoint DLP Getting Started Guide.