Configure common components
Describes how to configure common components such as login policies, various notifications, custom notification files and so on.
This chapter covers:
- Configuring custom notification objects and custom locations that can be applied to policies.
- Configuring login policies to contextually apply global login policies to users across all protected cloud applications based on several variables.
- To gain insights into the activity on a weekly basis, Forcepoint recommends scheduling the Weekly Overview Report.
- Setting up automatic log collection using a downloadable OVA, Syslog-ng relay, or Rsyslog to successfully stream logs to Forcepoint ONE SSE for Shadow IT discovery.
- Configuring managed device identification methods.