Introduction
CASB provide data security and access management for SaaS applications, ensuring safe and compliant cloud usage. Security teams rely on CASB to perform the following types of functions:
Features and benefits
Describes the key features of Forcepoint Data Security Cloud | SSE.
Help and support
Product updates
Explore the details of newly introduced and updated features here, along with an overview of resolved and known issues.
What's New
Describes the new features, enhancements, or fixes added to the current revision.
Sign into the Forcepoint Data Security Cloud | SSE portal
Signing into Forcepoint Data Security Cloud | SSE to configure manage CASB, web and private application traffic.
Getting started
This page helps the admins in setting up and configuring the Forcepoint Data Security Cloud | SSE for the first time and also explains the layout of Forcepoint Data Security Cloud | SSE.
Setup instructions
Provides instructions for first-time users on how to set up the Forcepoint Data Security Cloud | SSE.
Home
The Home page provides a visually intuitive, data-driven dashboard that consolidates critical SaaS data discovery metrics, including Summary and Activity Log, along with quick access to key product updates.
Accessing Dashboards and Reports
Describes how to access the Forcepoint Data Security Cloud | SSE Dashboards, Alerts, and Logs through the Insights.
Filtering logs in the activity log tab
Every log in the Activity Log tab can be filtered by selecting filters. You can add a filter by keyword or term across all columns or enter a column specific filter.
Understanding log details
Selecting the file name under the Event Logs section in the Activity Log tab will bring up the details of the file.
Understanding API logs for Slack application
Slack is logged similar to every other cloud application with one additional field in the details.
Understanding activity and action descriptions in API logs
When viewing the Dashboard in the Audit View, you will see columns for Activity (the activity the user was doing that generated the event) and Action (the action Forcepoint Data Security Cloud | SSE took per policy match).
Applying manual cloud action in API logs
In addition to triggered cloud policy actions, Forcepoint Data Security Cloud | SSE provides the ability for admins to apply manual cloud actions to files through the API Logs.
Exporting logs
This functionality is used to export logs based on user-defined filter. This will allow you to filter down to interesting logs and export them for further analysis. The logs are exported in UTC time format.
Analyze
The Analyze section contains all of your log reports and alerts for visibility into user's activity and suspicious behavior.
Discovery
CSPM
The CSPM Page will provide visibility into the audit scans of your IaaS systems to surface potentially misconfigured security settings to help you mitigate data loss and ensure you are maintaining compliance with frameworks such as the CIS Benchmark.
Devices
Under Analyze > Devices, you can find information about devices utilizing SmartEdge Agents and Device Profiling Agents that are registered with Forcepoint Data Security Cloud | SSE.
Protect
The Protect section is the primary area for adding and managing your applications you wish to protect.
Add Applications
Configure applications
Forcepoint Data Security Cloud | SSE supports various cloud applications so that Admins can monitor data which is in transit, in motion and at rest.
Application Controls
Configuring notifications
Admins can create custom notification objects that can be applied to policies and reports. This will determine which admins or users are notified when a policy is violated and what the custom message says.
Setup traffic steering
Forcepoint Data Security Cloud | SSE supports SmartEdge Agent and Cloud SWG traffic steering methods. This chapter describes steps to deploy each of those so that traffic can be forwarded to Forcepoint Data Security Cloud | SSE.
Configuring SWG policies
You can configure SWG Connection Policy, Cloud SWG Authentication Policy and SWG Content Policy to manage traffic through Cloud SWG and SmartEdge agent.
Device Profiling Proxy
The Device Profiling Proxy page will allow you to both configure the means to distinguish between a managed and an unmanaged device as well as implement a forward proxy deployment for applying inline policy actions.
Configure Zero Trust Network Access
Forcepoint Data Security Cloud | SSE's Agentless and Agent-based Zero Trust Network Access (ZTNA) provides an alternative to VPNs allowing admins to provide inline protection to internal apps without the need for VPN service to be running on the user's local machine.
Configuring Advanced Threat Protection
Forcepoint Data Security Cloud | SSE provides Advanced Threat Protection (ATP) via partnerships with Bitdefender.
Encrypting data
Forcepoint Data Security Cloud | SSE enterprise edition allows users to encrypt data at rest in cloud applications for both file and field level data. Keys can be managed in the Forcepoint Data Security Cloud | SSE Keystore or customers can add their own KMIP Key Store to utilize existing key management appliance/servers (KMS or HSM).
Integration
IAM
The IAM section contains the configuration pages used for maintaining your organization in Forcepoint Data Security Cloud | SSE (adding your domain, managing users/devices/etc).
Understanding User and Groups
You can configure user identity settings and synchronize user information from your directory in order to assign policies to users or groups.
Adding external IdPs in Forcepoint Data Security Cloud | SSE
You can configure various applications to support Forcepoint Data Security Cloud | SSE as a SAML Service Provider.
Understanding Admin Roles
The Admin Roles page is where Forcepoint Data Security Cloud | SSE admins can create different and unique admin roles to assign to users or groups. The role permissions can allow users to Edit, View, or Disabled (hidden) to each individual tab and the sub-component within the tab.
Configuring Multi-Factor Auth
When configuring the global login policies, Admins can enforce two-factor authentication (MFA) for admins and users when logging into any application or as part of a policy action when suspicious login behavior is detected.
Settings
The Settings section contains the majority of your setting configurations to be used in policies or integrations.
Appearance
If Forcepoint Data Security Cloud | SSE is being used as the IdP (as in users will land on a Forcepoint Data Security Cloud | SSE log in page to authenticate to their apps) you have the option to customize the UI of the login page.
REST APIs
Rest APIs enable you to programmatically access data and configuration from your Forcepoint Data Security Cloud | SSE instance.
Certificates
The Certificates page allows you to generate a Certificate Signing Request (CSR), upload a Certificate Authority (CA), or a server certificate and private key.
Support
The Support section contains links to Admin guide, URL Lookup page, and Forcepoint Customer Hub.
Understanding URL Lookup page
Use the inbuilt tool to review the category of a URL or IP entered. This is helpful in finding equivalent ThreatSeeker URL Categories, Enterprise App Categories, Web Browsing Categories along with their respective reputation scores for the entered URL or IP.
Admin Guide
The admin guide is your resource for learning how to setup and deploy Forcepoint Data Security Cloud | SSE.
Building Complex Policies
Customers sometime require the ability to control access to application with granularity. For example, a customer may want to allow usage of the standard mobile email client, but block usage of the Outlook mobile application.
M365 Deployment
This article will cover the steps that administrators must take to complete a successful M365 setup.
Download Agents
Consolidates download links for all available agents such as the SmartEdge agent or AD sync agent.
Download Certificates
Consolidates download links for Syslog OVA and Certificate ISO.
Supported Apps and Browsers
List of supported cloud apps, thick client apps, and browsers.
Forcepoint Data Security Cloud Bypass Lists for Firewalls and Security Software
Ensure the following domains/URLs are permitted through your firewall to guarantee seamless service and functionality while using Forcepoint Data Security Cloud | SSE services. Unless explicitly specified, most requests are made to Forcepoint Data Security Cloud Cloud Services via HTTPS on port 443.
Forcepoint Data Security Cloud | SSE datacenters and IPs
This article will provide details on the AWS servers from which Forcepoint Data Security Cloud | SSE will send the traffic to your internal applications and servers.
Data Retention Policy
Protecting sensitive customer data is a core aspect of the Forcepoint Data Security Cloud | SSE solution. Forcepoint Data Security Cloud | SSE only sits in front of applications that house or assist in the transfer of corporate data. Forcepoint Data Security Cloud | SSE provides IT with visibility and control over these applications.
Release Notes
Releases include new features as well as bug fixes.
Known Limitations
Lists the known limitations.
App Supported Features
This page will walk you through which features are support by Application.
Viewing Forcepoint Data Security Cloud | SSE supported file MIME types