Protocol-based policy enforcement
The Forcepoint URL database includes protocol definitions used to manage Internet protocols other than HTTP, HTTPS and FTP. These definitions include Internet applications and data transfer methods such as those used for instant messaging, streaming media, file sharing, file transfer, Internet mail, and other network and database operations.
These protocol definitions can even be used to manage protocols or applications that bypass a firewall by tunneling through ports normally used by HTTP traffic. Instant messaging data, for example, can enter a network whose firewall blocks instant messaging protocols by tunneling through HTTP ports. Web protection software accurately identifies these protocols, and filters them according to policies you configure.
- With Forcepoint Web Security, Content Gateway can be configured to detect non- HTTP protocols that tunnel over HTTP ports. See Configuring tunneled protocol detection for more information. Network Agent can also be used to manage non-HTTP protocols.
- In Forcepoint URL Filtering deployments, Network Agent must be installed to enable protocol-based policy enforcement.