Configuring forensics data storage
In Forcepoint Web Security deployments, threat-related forensic data can include:
- Information about the source (IP address, device name, and user) attempting to send the data.
- Information about the target (IP address, URL, and geographic location) to which the data is being sent.
- Header information associated with the attempt to send the data.
- A copy of the actual data being sent (such as a text file, spreadsheet, ZIP file).
If you enable storage of forensics data, also specify where the forensics repository (a specialized database) is stored, the maximum size to which the database can grow, and how long to store forensics data.