Configure remote access

Configure remote access to private applications using the endpoint client. The process for configuring remote access to your private applications varies depending on whether you are using Forcepoint Cloud Security Gateway, or Private Access as a standalone solution.

  • Private Access with Cloud Security Gateway: if you are using Private Access alongside a Cloud Security Gateway/Web Security Cloud deployment:
    • Configure proxy bypass settings for each private application.
    • Deploy the endpoint client to end user machines using the endpoint installation settings in the Cloud Security Gateway portal. The endpoint client identifies users and directs private application traffic to your application hosting sites, while outbound web traffic is directed to the Web Security Cloud proxy service.
    • Install the Forcepoint root certificate.
  • Private Access as a standalone solution: if you are using Private Access as a standalone solution:
    • Deploy endpoint using the installation settings in the Private Access management portal. The endpoint client identifies users and directs private application traffic to your application hosting sites.
    • Install the Forcepoint root certificate.