Limited Availability Features

The table below lists Forcepoint Web Security Cloud features that are in a limited availability status. Limited availability features may have been released recently, or may need to be approved by your account manager before being added for your organization, due to additional configuration requirements, or other considerations.

If you are interested in enabling any of these features for your account, please contact Technical Support.

Feature Description

Acceptable use policy

Allows administrators to require that end users periodically accept the terms of an acceptable use policy (AUP) before continuing to browse via the proxy. The feature can be set per policy, and users are required to accept the AUP every 1, 7, or 30 days. The AUP confirmation screen can be customized under Web > Policy Management > Block & Notification Pages.

For further information, see the Forcepoint Security Portal Help.

Password policy for end users

Allows you to apply the same password policy requirements both for administrators accessing the cloud portal, and end users manually authenticating with the proxy. Password policy settings are configured on the Account > Contacts page.

For further information, see the Forcepoint Security Portal Help.

Full traffic logging

Allows administrators to download full fixed format web traffic logs for retention and analysis, which can be useful for integration with third-party SIEM tools. Logs can be downloaded for 14 days and are provided in JSON format. For further information, see Configuring Full Traffic Logging on the Forcepoint Support website.

Forcepoint recommends using the more recent and more flexible SIEM Integration option. Take advantage of Bring your own storage for closer SIEM tool integration or switch between Forcepoint storage and your own See Configuring SEIM storage in Web Security Cloud Help.

Remote Browser Isolation

Send blocked web requests to a third-party remote browser isolation provider, allowing the web page to be viewed outside of the organization's network.

For further information, see Configure Remote Browser Isolation in the Security Portal Help.