Next steps
After completing the basic setup, you have all that is needed to test and begin deploying Forcepoint Web Security Cloud. Your account has a single policy that controls and secures your organization’s web traffic, and traffic is directed to the service via your browser’s PAC file configuration. By default, the service applies your policy settings to all traffic from the IP address defined in the policy.
To get the most out of the solution, you may wish to implement a different traffic forwarding method, enable end-user authentication, tailor your policies, and view and create reports. The rest
of this document guides you through these more advanced topics as you continue to roll out your deployment. The remainder of the document is organized into the following topics:
- Forwarding traffic
- Identifying users
- Next steps: configuring advanced features
The appendix provides sample communications you can use to educate your users about your Forcepoint web protection solution (see Preparing end users for deployment).