Application reporting
With Forcepoint Web Security or standalone Forcepoint URL Filtering, you can use the
page to review the client apps, operating systems, and cloud applications used in your network. You an also use the User Agents tab to investigate activity based on user agent strings. (The user agent string is an HTTP header that identifies the client software from which a request originates.)- Find instances of older client apps that may present a security vulnerability.
- Identify which machines in your network may be vulnerable when a zero-day exploit is discovered.
- Track adoption of new client apps and operating systems.
- Investigate which cloud apps are being used from within your network, and find out who is using them.
- Use the user agent string associated with an application to identify the machines in your network on which that application is running.
- Search for user agent strings associated with malware or suspicious activity to identify machines that may be at risk.
When Forcepoint URL Filtering is integrated with a third-party proxy, cache, firewall, or other device, the integration product does not send application data to Filtering Service. As a result, no browser or platform data is available on the Applications page.
See How is user agent data collected? for more information about how user agent data is logged, processed, and made available for use in reports.
The Applications page is made up of 4 tabs:
- Reports on the Cloud Apps tab show which cloud applications are being used by users within your network.
The Cloud Apps tab is selected by default when you navigate to the Applications page.
- Reports on the Client Apps tab show which supported client apps (including browsers, social media apps, and productivity tools like Outlook) and versions are being used to access the Internet from your network.
- Reports on the Operating Systems tab show which supported operating systems (including Windows, Linux, UNIX, OS X, iOS, Android, BlackBerry, Symbian, and Java ME) the browsers accessing the Internet are running on.
- The User Agents tab lets you search for specific strings in user agent headers detected in your network. The search results show the top qualifying user agents by requests or bandwidth.