Forcepoint Data Security Cloud Bypass Lists for Firewalls and Security Software

Ensure the following domains/URLs are permitted through your firewall to guarantee seamless service and functionality while using Forcepoint Data Security Cloud | SSE services. Unless explicitly specified, most requests are made to Forcepoint Data Security Cloud Cloud Services via HTTPS on port 443.

Forcepoint Data Security Cloud login and administrative pages

Both administrators and users traverse portal.bitglass.com (Commercial Cloud) to different sub-sites, domains listed below are relevant for anyone logging into Forcepoint Data Security Cloud. Only administrators will have access to the Forcepoint Data Security Cloud support portal.

Table 1. Portal Page - Commercial Cloud
URL/Domain Description
portal.bitglass.com Login page
looker.bitglass.com Analytics page

d35yjcem1gita5.cloudfront.net

dmksmfp72wh99.cloudfront.net

CSS/scrips for portal.bitglass.com

ajax.aspnetcdn.com

cdnjs.cloudflare.com

Scripts for portal.bitglass.com
s3.us-west-2.amazonaws.com Images for custom apps
*.sso.bitglass.com Login client cert check
www.btglss.net Agentless / reverse proxied app access

cdn.walkme.com

s3.walkmeusercontent.com

ec.walkme.com

Walk-Me Portal Assistance

Forcepoint Security Manager DLP to Forcepoint Data Security Cloud | SSE

Each of the below domains will resolve to multiple IP addresses, and all should be included in any firewall Access Control Lists (ACLs).

Table 2. Commercial Cloud
Domain/URL
portal.bitglass.com
proxyapi.bitglass.com

ZTNA

Table 3. Commercial Cloud
URL/Domain Description
ZTNA OVA:
ztnarouter.bitglass.com OVA management connection
bg-prod-ova.s3.amazonaws.com ZTNA ISO
github.com GitHub
download.docker.com Docker
cv.bitglass.com Agent Configuration
HTTP ZTNA:
www.ztna.bitglass.com HTTP ZTNA
<domain>-<id>.ztna.bitglass.com HTTP ZTNA
TCP ZTNA (SmartEdge Agent):
ztnarouter.bitglass.com ZTNA Router
ztnahaproxy-*.bitglass.com ZTNA Load Balancer

Reverse Proxy

Reverse proxy involves users logging into an application and being directed back through Forcepoint Data Security Cloud proxies via a dashified domain. Application configuration is done in the admin portal. User traffic will be directed to the dashified domain after logging into the portal. For example:
Domain/URL Description
<tenant domain>.btglss.net Dataplane for Commercial Cloud - Proxied app traffic domain
Admin Portal All portal page domains listed at the beginning of this article.

Cloud API

Cloud API communication occurs between Forcepoint Data Security Cloud Analytics/dataplane nodes to the application and is not initiated from on-premise. No special considerations are required for Firewall bypass lists aside from the portal page domains listed at the beginning of this article.

URL/Domain Description
Admin Portal All portal page domains listed at the beginning of this article.

CSPM

CSPM communication occurs between Forcepoint Data Security Cloud Analytics/dataplane nodes to the application and is not initiated from on-premise. No special considerations are required for Firewall bypass lists aside from the portal page domains listed at the beginning of this article.

URL/Domain Description
Admin Portal All portal page domains listed at the beginning of this article.

Discovery

Discovery involves navigation of the Forcepoint Data Security Cloud portal page as well as uploading logs, or downloading an OVA to stream logs out.

Table 4. Commercial Cloud
URL/Domain Description
bg-prod-ova.s3.amazonaws.com Discovery OVA and ISO downloads
syslog.bitglass.com (TCP port 1999) Syslog
*.dkr.ecr.us-west-2.amazonaws.com Container download
Admin Portal All portal page domains listed at the beginning of this article.
Table 5. EU Cloud
URL/Domain Description
bg-prodeu-ova.s3.amazonaws.com Discovery OVA and ISO downloads
096923413011.dkr.ecr.us-west-2.amazonaws.com OVA docker download
prod-us-west-2-starport-layer-bucket.s3.us-west-2.amazonaws.com OVA docker container
syslog.bitglass.eu (TCP port 1999) Syslog
Admin Portal All portal page domains listed at the beginning of this article.

IAM

Depending upon your unique deployment, you may need to allow a Forcepoint Data Security Cloud AD Agent or calls to create users in the Forcepoint Data Security Cloud cloud. See the information below on specific user source/destinations for bypasses.

AD Agent

Table 6. Commercial Cloud
Domain/URL
cv.bitglass.com
dirsync.bitglass.com

SCIM

SCIM uses communicates directly between Forcepoint Data Security Cloud servers in the cloud to Applications (Microsoft/Google/etc.) Servers to gather users and are not impacted by on-premise network firewalls.

User API

Requests to create a user via the Forcepoint Data Security Cloud user API are made using resources on portal.bitglass.com.

MFA

Requests from a user device to Forcepoint Data Security Cloud initiated MFA are done using resources on portal.bitglass.com and do not require additional bypass domains. If an administrator has selected third-party MFA such as Google or Duo and so on relevant domains for those entities will need to be allowed as needed.

Log Poll API

Requests to fetch log data are made to resources at portal.bitglass.com.

IP API

Requests to fetch Bitglass IP lists are made to resources at portal.bitglass.com.

ICAP

ICAP DLP initiates connections from Forcepoint Data Security Cloud Data planes to a server defined in the admin portal. The server listed will have to allow connection from external sources. These sources are listed in the Forcepoint Data Security Cloud | SSE datacenters and IPs.

Remote Browser Isolation (RBI) Exclusions

Environment Exception URL Outbound Ports for Connection
Commercial Cloud *.rbi.forcepoint.com 30000 – 32767