IntroductionCASB provide data security and access management for SaaS applications, ensuring safe and compliant cloud usage. Security teams rely on CASB to perform the following types of functions:
Features and benefits Describes the key features of Forcepoint Data Security Cloud | SSE.
Product updatesExplore the details of newly introduced and updated features here, along with an overview of resolved and known issues.
What's New Describes the new features, enhancements, or fixes added to the current revision.
Sign into the Forcepoint Data Security Cloud | SSE portalSigning into Forcepoint Data Security Cloud | SSE to configure manage CASB, web and private application traffic.
Getting startedThis page helps the admins in setting up and configuring the Forcepoint Data Security Cloud | SSE for the first time and also explains the layout of Forcepoint Data Security Cloud | SSE.
Setup instructionsProvides instructions for first-time users on how to set up the Forcepoint Data Security Cloud | SSE.
HomeThe Home page provides a visually intuitive, data-driven dashboard that consolidates critical SaaS data discovery metrics, including Summary and Activity Log, along with quick access to key product updates.
Accessing Dashboards and Reports Describes how to access the Forcepoint Data Security Cloud | SSE Dashboards, Alerts, and Logs through the Insights.
Filtering logs in the activity log tabEvery log in the Activity Log tab can be filtered by selecting filters. You can add a filter by keyword or term across all columns or enter a column specific filter.
Understanding log detailsSelecting the file name under the Event Logs section in the Activity Log tab will bring up the details of the file.
Understanding API logs for Slack applicationSlack is logged similar to every other cloud application with one additional field in the details.
Understanding activity and action descriptions in API logsWhen viewing the Dashboard in the Audit View, you will see columns for Activity (the activity the user was doing that generated the event) and Action (the action Forcepoint Data Security Cloud | SSE took per policy match).
Applying manual cloud action in API logsIn addition to triggered cloud policy actions, Forcepoint Data Security Cloud | SSE provides the ability for admins to apply manual cloud actions to files through the API Logs.
Exporting logsThis functionality is used to export logs based on user-defined filter. This will allow you to filter down to interesting logs and export them for further analysis. The logs are exported in UTC time format.
AnalyzeThe Analyze section contains all of your log reports and alerts for visibility into user's activity and suspicious behavior.
CSPMThe CSPM Page will provide visibility into the audit scans of your IaaS systems to surface potentially misconfigured security settings to help you mitigate data loss and ensure you are maintaining compliance with frameworks such as the CIS Benchmark.
DevicesUnder Analyze > Devices, you can find information about devices utilizing SmartEdge Agents and Device Profiling Agents that are registered with Forcepoint Data Security Cloud | SSE.
ProtectThe Protect section is the primary area for adding and managing your applications you wish to protect.
Configure applicationsForcepoint Data Security Cloud | SSE supports various cloud applications so that Admins can monitor data which is in transit, in motion and at rest.
Configuring notificationsAdmins can create custom notification objects that can be applied to policies and reports. This will determine which admins or users are notified when a policy is violated and what the custom message says.
Setup traffic steeringForcepoint Data Security Cloud | SSE supports SmartEdge Agent and Cloud SWG traffic steering methods. This chapter describes steps to deploy each of those so that traffic can be forwarded to Forcepoint Data Security Cloud | SSE.
Configuring SWG policiesYou can configure SWG Connection Policy, Cloud SWG Authentication Policy and SWG Content Policy to manage traffic through Cloud SWG and SmartEdge agent.
Device Profiling ProxyThe Device Profiling Proxy page will allow you to both configure the means to distinguish between a managed and an unmanaged device as well as implement a forward proxy deployment for applying inline policy actions.
Configure Zero Trust Network AccessForcepoint Data Security Cloud | SSE's Agentless and Agent-based Zero Trust Network Access (ZTNA) provides an alternative to VPNs allowing admins to provide inline protection to internal apps without the need for VPN service to be running on the user's local machine.
Configuring Advanced Threat ProtectionForcepoint Data Security Cloud | SSE provides Advanced Threat Protection (ATP) via partnerships with Bitdefender.
Encrypting dataForcepoint Data Security Cloud | SSE enterprise edition allows users to encrypt data at rest in cloud applications for both file and field level data. Keys can be managed in the Forcepoint Data Security Cloud | SSE Keystore or customers can add their own KMIP Key Store to utilize existing key management appliance/servers (KMS or HSM).
IAMThe IAM section contains the configuration pages used for maintaining your organization in Forcepoint Data Security Cloud | SSE (adding your domain, managing users/devices/etc).
Understanding User and GroupsYou can configure user identity settings and synchronize user information from your directory in order to assign policies to users or groups.
Adding external IdPs in Forcepoint Data Security Cloud | SSEYou can configure various applications to support Forcepoint Data Security Cloud | SSE as a SAML Service Provider.
Understanding Admin RolesThe Admin Roles page is where Forcepoint Data Security Cloud | SSE admins can create different and unique admin roles to assign to users or groups. The role permissions can allow users to Edit, View, or Disabled (hidden) to each individual tab and the sub-component within the tab.
Configuring Multi-Factor AuthWhen configuring the global login policies, Admins can enforce two-factor authentication (MFA) for admins and users when logging into any application or as part of a policy action when suspicious login behavior is detected.
SettingsThe Settings section contains the majority of your setting configurations to be used in policies or integrations.
AppearanceIf Forcepoint Data Security Cloud | SSE is being used as the IdP (as in users will land on a Forcepoint Data Security Cloud | SSE log in page to authenticate to their apps) you have the option to customize the UI of the login page.
REST APIsRest APIs enable you to programmatically access data and configuration from your Forcepoint Data Security Cloud | SSE instance.
CertificatesThe Certificates page allows you to generate a Certificate Signing Request (CSR), upload a Certificate Authority (CA), or a server certificate and private key.
SupportThe Support section contains links to Admin guide, URL Lookup page, and Forcepoint Customer Hub.
Understanding URL Lookup pageUse the inbuilt tool to review the category of a URL or IP entered. This is helpful in finding equivalent ThreatSeeker URL Categories, Enterprise App Categories, Web Browsing Categories along with their respective reputation scores for the entered URL or IP.
Admin GuideThe admin guide is your resource for learning how to setup and deploy Forcepoint Data Security Cloud | SSE.
Building Complex PoliciesCustomers sometime require the ability to control access to application with granularity. For example, a customer may want to allow usage of the standard mobile email client, but block usage of the Outlook mobile application.
M365 DeploymentThis article will cover the steps that administrators must take to complete a successful M365 setup.
Download AgentsConsolidates download links for all available agents such as the SmartEdge agent or AD sync agent.
Download CertificatesConsolidates download links for Syslog OVA and Certificate ISO.
Supported Apps and BrowsersList of supported cloud apps, thick client apps, and browsers.
Forcepoint Data Security Cloud Bypass Lists for Firewalls and Security SoftwareEnsure the following domains/URLs are permitted through your firewall to guarantee seamless service and functionality while using Forcepoint Data Security Cloud | SSE services. Unless explicitly specified, most requests are made to Forcepoint Data Security Cloud Cloud Services via HTTPS on port 443.
Forcepoint Data Security Cloud | SSE datacenters and IPsThis article will provide details on the AWS servers from which Forcepoint Data Security Cloud | SSE will send the traffic to your internal applications and servers.
Data Retention PolicyProtecting sensitive customer data is a core aspect of the Forcepoint Data Security Cloud | SSE solution. Forcepoint Data Security Cloud | SSE only sits in front of applications that house or assist in the transfer of corporate data. Forcepoint Data Security Cloud | SSE provides IT with visibility and control over these applications.
Release NotesReleases include new features as well as bug fixes.
Known LimitationsLists the known limitations.
App Supported FeaturesThis page will walk you through which features are support by Application.