Web Security On-prem | Administrator Help
Search
Getting Started
Introduction
Overview
Working in the Forcepoint Security Manager
Your subscription
The Forcepoint URL Database
Forcepoint Technical Support
The Status Dashboards
Introduction
Threats dashboard
Risks dashboard
Usage dashboard
System dashboard
Adding elements to a dashboard
Status Monitor mode
Internet Usage Filters
Introduction
Managing access to categories, protocols, and cloud apps
Actions
Search filtering
Working with filters
Configuring filtering settings
Web Protection Clients
Introduction
Working with clients
Working with computers and networks
Working with users and groups
Working with custom LDAP groups
Adding a client
Changing client settings
Moving clients to roles
Working with hybrid service clients
Web Protection Policies
Introduction
The Default policy
Working with policies
Enforcement order
Content Gateway Analysis
Introduction
Configuring Content Gateway analysis
Configuring exceptions to Content Gateway analysis
Data files used with Content Gateway analysis
Reporting on advanced real-time analysis
Bypass options
The bypass options available with Forcepoint Web Security are used to configure settings that force site requests to bypass specific Content Gateway functionality.
Use Reports to Evaluate Internet Activity
Introduction
What is Internet browse time?
Presentation reports
Investigative reports
Accessing self-reporting
Report Center
Application reporting
Advanced File Analysis report
Real-Time Monitor
Exceptions to Web Protection Policies
Introduction
Managing exceptions
Exception shortcuts
What is a referer?
Block Page Management
Introduction
Secure block pages
Blocking graphical advertisements
Blocking embedded pages
Creating alternate block messages
Using an alternate block page on another machine
Determining why a request was blocked
Configure the Hybrid Service
Introduction
Activate your hybrid service account
Specify sites not managed by the hybrid service
Configure user access to the hybrid service
Send user and group data to the hybrid service
Schedule communication with the hybrid service
Define custom authentication settings for the hybrid service
Monitor communication with the hybrid service
Configuring Hybrid Settings in the Cloud Portal
File Sandboxing for Hybrid
Neo Endpoint for Hybrid
Data Protection Service for Hybrid
Manage Off-site Users
Introduction
Hybrid service management of off-site users
Using remote filtering software
Combine Web, Data, and Mobile Protection
Introduction
Protecting against data loss
Protecting end users’ devices
Integrating web and mobile protection solutions
Refine Your Policies
Introduction
Restricting users to a defined list of URLs
Copying filters and policies to roles
Building filter components
Working with categories
Prioritizing security risk categorization
Blocking posts to sites in some categories
Protocol-based policy enforcement
Using Bandwidth Optimizer to manage bandwidth
Managing traffic based on file type
Using regular expressions
Using the Toolbox to verify policy enforcement behavior
User Identification for Policy Enforcement
Introduction
Identifying on-premises users transparently
Manual authentication
Configuring user identification and authentication
DC Agent
Logon Agent
Configuring RADIUS Agent
Configuring eDirectory Agent
Identification and authentication of hybrid users
Delegated Administration and Reporting
Introduction
The fundamentals of delegated administration
Preparing for delegated administration
Managing delegated administration roles
Updating delegated administration roles
Managing Super Administrator clients
Performing delegated administrator tasks
Reviewing administrator accounts
Enabling network accounts
Server Administration for Web Protection Solutions
Introduction
Web protection components
For a description of the components that make up your web protection solution, see:
Reviewing your web protection deployment
Understanding Policy Broker
Working with Policy Server
Working with Filtering Service
Policy Server, Filtering Service, and State Server
Filtered locations
Integrating with a third-party SIEM solution
Working with Content Gateway
Viewing and exporting the audit log
Stopping and starting web protection services
Installation directories for web protection solutions
Protected cloud apps
Alerting
Reviewing current system status
Reporting Administration
Introduction
Assigning categories to risk classes
Configuring reporting preferences
Configuring how requests are logged
Configuring Log Server
Introducing the Log Database for web protection solutions
Log Database administration settings
Configure Network Agent
Introduction
Configuring Network Agent global settings
Configuring Network Agent local settings
Adding or editing IP addresses during Network Agent configuration
Troubleshooting
Introduction
Web protection installation and subscription issues
Web protection database issues
Filtering Service alert messages
Network Agent issues
User configuration and identification issues
Health alerts and Usage Monitor issues
Policy Server and Policy Broker issues
Log Server and Log Database issues
Investigative report and presentation report issues
Other reporting issues for web protection solutions
Forcepoint Web Security interoperability issues