Configure common components

Describes how to configure common components such as login policies, various notifications, custom notification files and so on.

This chapter covers:
  • Configuring custom notification objects and custom locations that can be applied to policies.
  • Configuring login policies to contextually apply global login policies to users across all protected cloud applications based on several variables.
  • To gain insights into the activity on a weekly basis, Forcepoint recommends scheduling the Weekly Overview Report.
  • Setting up automatic log collection using a downloadable OVA, Syslog-ng relay, or Rsyslog to successfully stream logs to Forcepoint ONE SSE for Shadow IT discovery.
  • Configuring managed device identification methods.