Deploying Forcepoint DSPM
Describes how to deploy the Forcepoint DSPM.
Enable 2FA
Two-factor authentication (2FA) enhances security by requiring users to provide two forms of identification before they are granted access. This method adds a layer of protection to the standard username and password method, making it significantly more challenging for potential intruders to gain unauthorized access.
Quick start
This section describes how to configure the initial Key not found: prodname data visibility scans using the Quick Start wizard.
Configure countries
Choose the countries where the customer operates and where data is stored. This will recommend relevant use case patterns based on the selected countries.
Configure pattern matching
The pattern matching functionality allows users to identify particular pieces of information in a document. A pattern is considered as a RegEx that will be matched, and the rules may or may not apply once detected. 
Configure detectors
Detectors are features that allow users to set up alerts for certain parameters during a classification search. A user can set up a Detector to search for keywords within the entire contents of a document or file and search for keyword hits within the file's pathname.
Configure and review analytics
The Analytics page and its boards showcase various metrics, charts, and graphs that detail the findings from data scans, including overexposed files, sensitive data, and data at risk.
Configure data sources and scan
Configuring Forcepoint DSPM
Describes how to configure Forcepoint DSPM.
Identity and Access Management (IAM)
This section describes IAM for Forcepoint DSPM. Forcepoint DSPM uses Keycloak to manage administrator access to the administrator management console, allowing administrators to configure Forcepoint DSPM and use the product.
Mesh AI model tailoring
**In Development**
Forcepoint DSPM AI models
Endpoint
Analytics
Detailed description on dashboard widgets.
The boards
Forcepoint DSPM comes with 22 preconfigured boards out-of-the-box. Here are brief descriptions of the use cases they cover.
Editing Widgets Graphically
There are a number of widgets available and each of them have their own unique customization options.
Security Posture Policies
Security Posture Policies is a critical element of data governance within an organization. It involves creating a detailed representation of the data assets managed by different departments or business units.
Configuring Taxonomies & Labels
How to define a custom taxonomy.
DDR
Data sources
Pattern matching
The pattern matching functionality allows users to identify particular pieces of information in a document. This is implemented by using Regular Expressions (RegEx) that will try match content.
Live events
Detectors
Detector are features that allow users to set up alerts for certain parameters during a classification search. A user can set up a Detector to search for keywords within the entire contents of a document or file and search for keyword hits within the file's pathname.
AI Mesh
Forcepoint offers cybersecurity AI products, specifically aimed at Forcepoint DSPM. In a broader sense, we also provide solutions for Data Governance. Our flagship product, Forcepoint DSPM, is a sophisticated file classification pipeline.
Data Controls
Data Controls enable organizations to apply security and compliance conditions on the data assets in their systems and apply actions on those rules when they are identified.
Webhooks
How to configure a Webhook.
Import custom TLS certificate
GQL
GQL (Getvisibility Query Language) is a query language designed to enhance the flexibility and efficiency of querying data through the Forcepoint DSPM platform. It enables users to craft custom queries without the need for hard coding, significantly simplifying the process of filtering through and analyzing data.
Template Language
Template Language (GTL) allows using variables, functions and conditions in any report text input fields and compiles those expressions into resulting values.
Multi-Language Machine Learning
SIEM Integration
Google Drive Auto-labelling
FAQ
Deploying Forcepoint Data Classification
Describes how to deploy the Forcepoint Data Classification.