Forcepoint Private Access is a cloud-based zero trust network access solution that provides secure, authenticated remote access to internal applications.
Details of new and updated features, as well as known and resolved issues for Private Access.
Several features and product updates were added during the previous months.
Subscribe to service updates and access Forcepoint help and support services.
Overview of key concepts within Forcepoint Private Access.
Administrators manage their Private Access service using the management portal.
Several new features and product updates were added during the past month.
Added 22-Feb-2021 The Administration menu has been updated.
Added 22-Feb-2021 The View details table maximum row display has been reduced.
Added 22-Feb-2021 Related events filtering has been added to the View details page.
Added 22-Feb-2021 The Private Access welcome email has been updated.
Forcepoint Private Access can be used to provide secure remote access to internal applications located on customer premises or in private cloud services, either as part of a Forcepoint Cloud Security Gateway deployment, or as a standalone solution.
The Administration > Connectivity section provides options to configure your sites, the private applications that hosted at your sites, and to deploy the endpoint client for Private Access standalone end users.
The dashboard displays a summary of service activity over time.
The Administration tab provides access to configuration settings for your organization. Use this tab to set up connectivity, authentication, administrators, log management, and resources.
The Administration > Authentication section provides settings to support end-user provisioning and authentication via integration with your SAML (Security Assertion Markup Language) compliant Identity Provider (IdP).
The Private Access policy tab is used to configure the processing rules that are used to control access to resources, and to inspect and secure traffic that is routed through the service. Private applications policy controls and secures remote access to internal applications.
Reference information including a list of fields included in the traffic log export, and details of domains that are never decrypted.