Getting Started Guide: Forcepoint Web Security Cloud
Getting Started Guide: Forcepoint Web Security Cloud
2021
2021, Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. All other trademarks used in this document are the property of their
respective owners.
Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation
and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for
incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information
in this documentation is subject to change without notice.
Forcepoint Web Security Cloud is a flexible web protection solution that provides
fine-tuned control over your users’ web access, while providing comprehensive
protection against web threats such as viruses, malware, data loss, and phishing
attacks.
Forcepoint Web Security Cloud is intuitive to use and works out of the box with a
default policy that applies common web filters. To make full use of its features, you
can customize this default policy and configure your own policies to meet the needs of
your organization.
This guide outlines the setup tasks required to get Forcepoint Web Security Cloud
managing your web traffic. It also contains information on how to work with roaming
users, and tips on tailoring policies for your organization. In the appendix you can find
tips for preparing your end users for their new web protection system.
Detailed configuration information for Forcepoint Web Security Cloud is available in
the Forcepoint Web Security Cloud Help. This can be accessed from within the cloud
portl, or online at here.
Note
This guide covers deploying the service as a purely cloud-
based solution. If you are deploying with an I Series
appliance, refer to the guide Deploying an I Series
Appliance on the Forcepoint Support site.
Technical Support
If you have any questions during the set up phase, please contact your service provider
or Forcepoint Technical Support. Technical information about Forcepoint products is
available at the Forcepoint Support website:
https://support.forcepoint.com/
This site includes product documentation, release information, and a Knowledge Base
detailing common configuration scenarios. Some material requies a Forcepoint
Support login.
For additional questions, the support portal offers an online support form. Just click
Contact Support.
Tip
Create your support account when you first set up
Forcepoint Web Security Cloud, so that access is readily
available whenever you need support or updates.
Getting help
To get additional help while setting up the service, access the administrator help and
other reference materials on the Forcepoint Support website, or from the Help menu
in the cloud portal.
Forcepoint Web Security Cloud operates as a proxy server for HTTP and HTTPS
traffic, as well as FTP over HTTP. When users request a web resource, their browsers
do not connect directly to Internet web servers (shown in the following diagram as
origin servers), but instead connect to the cloud proxy, which in turn relays requests to
the origin server. This allows the cloud service to apply filtering rules and perform
content scanning, providing protection against security threats, data loss, and
inappropriate content.
The service can use various methods to identify and authenticate users: a Forcepoint
Endpoint client, a third-party single sign-on identity provider, NTLM transparent
identification, or manual authentication with a user name and password. Roaming
users (those connecting from an unknown IP address) can be identified via the
Forcepoint Endpoint client, via a single sign-on provider, or they are required to
authenticate.
Optional SSL decryption allows the content of HTTPS sessions to be scanned, and
allows the service to show the correct notification page to users (for example, a block
page if the SSL site is in a category that is blocked). Content is re-encrypted after
inspection.
The following diagram shows a basic overview of web traffic protected by Forcepoint
Web Security Cloud.
4. When policy decisions have been applied, web requests are then forwarded to the
origin server, and content is served to the user’s browser. If content is blocked, or
security threats are detected, configurable notification pages are shown, informing
the user of the reason why access to the resource is not allowed.
5. Some web requests can go directly to the origin server, if the address is defined as
a proxy bypass destination.
Secure (HTTPS) sessions are forwarded over a tunneled connection. If you enable
SSL decryption, the content of these sessions can be scanned and policy settings
applied, before the traffic is re-encrypted. This feature requires you to install a root
certificate on end-users’ machines, allowing clients to connect securely to the cloud
proxy. (See Enabling SSL decryption in the Forcepoint Web Security Cloud help for
more information.)
Key concepts
In order to get started with the service, you must arrange to forward your web traffic to
the service, add users to the service (if required), and create policies to control web
access (a default policy is pre-configured). A setup wizard is available when you first
log on, to guide you through the setup process.
Traffic forwarding
In order for the service to perform filtering, you must redirect web traffic to the cloud
service, and configure your firewall to allow access to the service on specific ports.
Traffic can be directed to the cloud service in a number of ways:
● A Forcepoint Endpoint: a lightweight software client that runs on end user
devices, providing policy enforcement for web browsing.
● A browser PAC (proxy auto-config) file: a configuration script that can be
configured in your users’ browsers (via GPO or similar) to redirect browser
requests to the service
● Firewall redirection: a simple method implemented on your firewall to redirect all
HTTP/HTTPS traffic to the service
● Tunneling: IPsec or GRE connectivity to forward traffic to the service from a
supported edge device.
Alternatively, a Forcepoint I Series appliance can be deployed in order to provide fast,
flexible on-premises traffic analysis. If you have an existing on-premises proxy, this
can be connected to the service via proxy chaining.
For more information about forwarding traffic, see Forwarding traffic, page 15.
User synchronization
The service can identify and authenticate users against your directory service in order
to provide user and group-specific policy enforcement, and detailed user activity
reporting. Users can be added manually, or using a directory synchronization client
that automatically adds and updates user details from your directory.
This step is optional; some organizations apply the same policies to all users based
solely on IP address, without requiring users to authenticate.
Note: if your organization has roaming users (those who connect from locations
outside of your network), those users must be registered and must identify themselves
in order to use the service remotely. See User registration methods, page 20.
Policies
Policies allow or block access to web resources, and control your authentication,
content filtering, security, and data loss prevention (DLP) settings. Exceptions can be
configured to override or bypass policy settings per user or group.
Filtering is based on a set of web categories drawn from the Forcepoint Master
Database, constantly updated by Forcepoint Security Labs, with security threats
identified in real time by Forcepoint ThreatSeeker Intelligence.
A default policy is available, providing a set of standard web filtering settings. Once
you are up and running with the service, you can edit this policy and create new ones,
providing differing levels of access for different users and departments. (See Tailoring
your policies, page 27.)
This chapter covers logging on to the Forcepoint Cloud Security Gateway Portal, also
referred to as the cloud portal, and getting started with Forcepoint Web Security
Cloud. When you first access your account, a wizard guides you through the initial
setup process.
First-time logon
If you are logging on for the first time, a short first-time logon wizard will prompt you
to:
1. Accept the license agreement for your product.
2. Select a primary and backup cloud data center for storing your reporting data.
Note
In most cases, the default data center locations should be
used. These are chosen based on the location of your
connection. They can be changed if your organization has
localization or data sovereignty requirements.
When you first log on to a new account, a setup wizard is displayed, guiding you
through the initial setup process. The wizard helps you to configure your firewall to
access Forcepoint Web Security Cloud, set up end-user registration and directory
synchronization, set up your first policy, and test your configuration.
If you are not able to complete each step immediately, you can skip to the next step
and complete any missed items later. Any items that have not been completed are
displayed with an exclamation mark icon shown in the progress panel on the left of the
screen. The wizard is available each time you log on, until all steps have been
completed.
To begin, you will need to have:
● Your organization’s external IP addresses
● Knowledge of your organization’s directory infrastructure or NTLM domains.
The stages of the setup wizard are:
● Step 1: Firewall Setup
● Step 2: End Users
● Step 3: Adding users
● Step 4: Policy Setup
● Step 5: Review
Perform the following steps on a machine that is inside the network that you defined
as a connection in the previous step. (This may be the same machine that you are using
to access the cloud portal.)
When you are finished, return to the setup wizard and click Next.
The next step is Testing your policy settings.
Note
We recommend that cookies are enabled in your browser
to use the service. If cookies are not enabled, some
features cannot work.
Step 5: Review
The Review page provides a summary of the steps you have completed, as well as a
reminder of any steps that remain incomplete.
For steps that are incomplete, you can click the link to return to the corresponding
page in the wizard.
If you are not ready to complete any outstanding steps, you can go to the next page to
finish the wizard and start using the cloud portal. (You can return to the wizard later
by navigating to Web > Setup Wizard.)
When you are finished, click Next to close the wizard.
Next steps
After completing the setup wizard, you have the basic setup needed to test and begin
deploying Forcepoint Web Security Cloud. Your account has a single policy that
controls and secures your organization’s web traffic, and traffic is directed to the
service via your browser’s PAC file configuration. By default, the service applies your
policy settings to all traffic from the IP address defined in the policy.
To get the most out of the solution, you may wish to implement a different traffic
forwarding method, enable end-user authentication, tailor your policies, and view and
create reports. The rest of this document guides you through these more advanced
topics as you continue to roll out your deployment. The remainder of the document is
organized into the following topics:
● Forwarding traffic
● Identifying users
● Next steps: configuring advanced features
The appendix provides sample communications you can use to educate your users
about your Forcepoint web protection solution (see Preparing end users for
deployment, page 35).
In order for Forcepoint Web Security Cloud to filter your traffic, web requests must be
redirected to the cloud service. There are a number of methods available to redirect
traffic.
During the initial stages of an evaluation or while testing a deployment, we
recommend that you manually configure a number of web browsers to use the
Forcepoint Web Security Cloud PAC file to forward traffic to the service. This is
described in PAC file, page 16.
The following table outlines all the traffic redirection methods available, which may
be suitable for different organizations and different network environments.
Endpoint client A lightweight software application installed on end-user Most scenarios where
devices. The endpoint client seamlessly authenticates software can be
users, and provides policy enforcement for web installed on end user
browsing. Further detail is given below (see Endpoint). devices.
Firewall Transparently redirect all web traffic by configuring Networks with
redirection redirection rules on your firewall. unmanaged devices,
For details on this connectivity method, see Firewall such as a guest Wi-Fi
Redirect: Forwarding Traffic to the Cloud Service. network or BYOD
networks.
IPsec tunneling Securely forward traffic over a virtual private network Networks with
(VPN) using a supported firewall or router. unmanaged devices,
For details on this connectivity method, see the such as guest Wi-Fi
Forcepoint IPsec Guide. networks or BYOD
networks.
Organizations that
require increased
security for web traffic.
PAC file
Endpoint
Forcepoint Endpoint clients run in the background on end user devices, providing a
seamless browsing experience. Endpoint automatically authenticates users with the
service, and provides policy enforcement and data security features. The endpoint
client has been designed to consume minimal CPU, memory, and disk resources, and
has tamper controls to prevent users disabling the software.
The endpoint client allows administrators to create policies that provide user-specific
policy enforcement, with seamless authentication, full visibility of inbound and
outbound traffic, and that don’t restrict use of the device.
There are three versions of the endpoint client, each suited to different sets of end user
needs:
● Neo: this endpoint client can be used in either proxy connect mode or direct
connect mode, and can automatically switch from one to the other when
necessary.
● Proxy Connect: also known as Classic Proxy Connect endpoint, this endpoint
client redirects all traffic to the cloud proxy for analysis. Proxy Connect is
recommended for most scenarios, and supports the widest set of security features.
● Direct Connect: also known as Classic Direct Connect endpoint, this endpoint
client contacts the cloud service for each request to determine whether to block or
permit a website, but routes the web traffic itself directly to the Internet. Direct
Connect also routes traffic to the cloud service to perform content analysis, if
configured in your policy. Direct Connect is recommended for scenarios in which
proxy connections may be problematic, and in some circumstances can improve
content localization.
The following diagram illustrates the connectivity for Proxy Connect (through Neo or
the Classic Proxy Connect endpoint) and Direct Connect (through Neo or the Cassic
Direct Connect endpoint).
The diagram shows the two different endpoint versions servicing a web request:
1. In the first scenario, Neo or the Classic Proxy Connect endpoint directs all web
traffic via the cloud proxy. If the request is permitted, the proxy connects to the
requested website and sends content back to the end-user client. (If the request is
blocked, the user is shown a block page.)
2. In the second scenario, a web request via Neo or the Classic Direct Connect
endpoint consists of two stages:
a. The endpoint connects to the cloud service to look up the user’s policy
settings for the requested site.
b. If the request is permitted, the client then redirects the request directly to the
Internet. (If the request is blocked, the user is redirected to a block page.)
If required, you can deploy a combination of Proxy Connect and Direct Connect
endpoints in your organization. However, only one classic endpoint instance (Classic
Proxy Connect or Classic Directory Connect) can be installed on a client machine at
any one time. The Neo endpoint agent includes both proxy connect and direct connect
modes.
For more information about Forcepoint Endpoint software, including deployment
options and configuration settings, see Web endpoint overview in the Web Security
Cloud help.
Once you have completed the setup wizard, a single policy applies enforcement to all
traffic from your organization’s egress IP. In order to implement per-user or per-group
policy enforcement, Forcepoint Web Security Cloud must identify specific users. User
identification also allows the service to log individuals’ internet usage and provide
user-based and group-based reporting.
This section discusses the options available for registering users with the service and
identifying users when they access the proxy.
When the cloud service receives a web request, it first identifies the source of the
request in order to find the user’s account. If the request comes from an IP address that
is defined as a connection in a policy, the service identifies the account, and, by
default, applies the settings in that policy.
If you wish, you can define additional policies with different connection addresses,
which can apply enforcement to different parts of your organization (as identified by
egress IP). This is an easy way to apply different policy settings to different
geographical offices, or network segments.
Tip
Using IP-based policy selection also allows users to
browse anonymously, without having to authenticate. If
user authentication is not required by the policy,
enforcement actions are applied to all traffic coming from
the egress IP, but users are not individually identified, and
user-specific reporting data will not be available.
User authentication is always required for roaming users (those connecting from an
unknown IP address), in order to identify the user’s account and ensure that the user is
entitled to access the service.
Add IP addresses to your policies in the cloud portal via Web > Policy
Management > Policies, using the Connections tab.
You can register users with the service, and assign those users to policies, in a number
of ways. User registration methods are as follows:
● Directory synchronization
● By invitation
● Self-registration
These methods are outlined below.
Directory synchronization
Registering your users via directory synchronization is the most flexible and scalable
option for user management.
We recommend that your synchronization includes:
● Users’ NTLM IDs: these can be used to transparently identify users without the
need for users to manually log on. (Note: if NTLM IDs are not included in the
synchronization, users must perform a one-time self-registration process when
they first connect to the cloud service.)
● Groups that will be useful for policy enforcement purposes - for example, if
members of different departments will have different policy settings. You can
configure the cloud service to assign users to policies based on group
membership, allowing you to manage policy assignment via your directory. You
can also configure policy exceptions based on group membership.
Note
Forcepoint recommends that you include the minimum
number of groups required for policy enforcement.
Including more groups than necessary can impact
performance.
For advice on configuring directory synchronization, see Planning for your first
synchronization in the Web Security Cloud help.
Once you have synchronized your users and groups, assign groups to the relevant
policy via the End Users tab of the policy.
Registering by invitation
If you cannot use directory synchronization, you can invite users to register via an
option on the End Users tab of a policy. Users can be invited individually by email
address, or in bulk via a CSV file. This option may be useful for users on your
network who do not appear in your directory, such as third-party contractors.
When end users are invited, an email is sent inviting the user to create a password
before using the service. Users are added to the policy after completing registration.
For further information, see Registering by invitation in the Web Security Cloud help.
Self registration
You can add email domains to your policies in order to allow users to self-register
with the service using their email address. For example, if your users have email
addresses in the form ‘[email protected]’, add ‘yourcompany.com’. Add
domains on the End Users tab of your policy, under Self Registration. Users
registering using an email address at this domain will be assigned to the policy.
Domains can also be added at the account level, via Web > Settings > Domains. This
allows you to associate the domain with all policies, allowing users to self-register to
any policy in your account. The actual policy the user is assigned depends on the
connection from which they connect - if this matches a proxied connection in a policy,
the user is registered to that policy. Users connecting from unknown IP addresses are
added to a default policy you can select. (See Configure Domain settings in the Web
Security Cloud help.)
Users can self-register by clicking Register on the default logon page shown when
they first attempt to browse, or by navigating directly to the self-registration URL:
www.mailcontrol.com/enduser/reg/index.mhtml
For further information, see End user self-registration in the Web Security Cloud
help.
You can enable various methods to identify and authenticate users. User
authentication is used if it is required by your policy, or if the user is accessing a
website for which a policy exception is configured. Authentication is always required
for roaming users connecting from an unknown IP address.
Tip
User authentication allows policy enforcement actions and
policy exceptions to be applied to individual users or
groups, as well as user-specific reporting data to be logged.
User authentication settings are configured on the Access Control tab of a policy.
Authentication methods are listed below, in the order in which they are used by the
service, if enabled in a policy.
● Forcepoint Web Security Endpoint: always used to identify the user, if installed on
an end-user’s machine.
● Single sign-on: if you have configured a supported third-party identity provider to
authenticate your users, this provider is queried to identify and authenticate the
user.
● NTLM identification: identifies users connecting from a known IP address via
their NTLM credentials. (NTLM is not used for roaming users.)
● Secure form: if the user agent supports secure forms, users can enter their logon
credentials if already registered, or choose to register with the service.
● Basic authentication: a user logon page is shown by default if the above options
are not available. Users can enter their logon credentials if already registered, or
choose to register with the service. Use the Welcome page setting to display a
configurable welcome page before users are presented with the authentication
dialog box.
Note: basic authentication uses the HTTP authentication standard. While this is
available as a default fall-back, Forcepoint recommends that you do not rely on
this option, and enable at least one of the other authentication options.
Note
For secure form-based authentication and single sign-on,
an authentication cookie is placed on the user’s machine.
Users do not need to re-authenticate for subsequent web
browsing sessions, for a period of time defined by the
Session Timeout option on the Access Control tab. For
basic authentication, users are asked to authenticate
whenever opening a new browser session.
Forcepoint Web Security Cloud can protect and monitor users even when they are not
in their typical office location, such as when working from home, connecting from a
public access point, or using a third-party network. This section describes how
Forcepoint Web Security Cloud handles roaming users connecting from a location
other than their network domain.
When the cloud service receives a URL request, it first checks the source IP address of
the request and searches all customer policies for a matching address. (The source IP
address is configured as a connection in a policy’s Connections tab in the cloud
portal.) For roaming users, no match will be found. In this situation, the roaming user
encounters one of the following scenarios:
● If the user’s device has Neo, Classic Proxy Connect endpoint, or Classic Direct
Connect endpoint installed, the endpoint client sends account and user
information, allowing the service to identify the user seamlessly.
● If you have deployed single sign-on for your users, the roaming user is first asked
to enter an email address, in order to identify the user’s account, and is then
authenticated by the identity provider. (Users are typically only required to enter
an email address once; following a successful authentication, a long-lived cookie
is set, allowing the service to recognize the user's account.)
● If neither Forcepoint Web Security Endpoint nor single sign-on is in use, and the
service cannot find the source IP address in a policy, it responds with a logon page
that states: “You are connecting from an unrecognized location.” The user has to
log on with their cloud service details. The service then searches for the user in its
policies. When it finds the user, the appropriate policy settings are applied.
In order to log on, the user has to be registered. If they have not already set a
password to access the service, roaming users can go through a one-time self-
registration process. See User registration methods, page 20.
Note
Some browsers can exhibit inconsistent behavior in certain
circumstances, such as when used in public Internet access
points in hotels and airports. For more information on
configuring and troubleshooting access for roaming users,
see Using cloud web protection from public Internet
access points on the Forcepoint Support website.
If you are not using the Forcepoint Web Security Cloud proxy (for example, you have
lost your proxy connection or you are using Neo in direct connect mode or the Classic
Direct Connect endpoint), it looks like this:
You can customize the remote user home page, if required. The URL for the resulting
account-specific page is available on the Web > Settings > General page in the
portal. It looks like the URL above, but has an account-specific identifier appended.
Forcepoint Web Security Cloud includes many advanced features that allow you to
configure your web protection product to meet the needs of your organization. This
section covers some of the next steps you can take to help you get the most out of the
service.
● Tailoring your policies
● Customizing notification pages
● Adding non-proxied destinations
● Adding administrators
● Privacy protection
● Cloud service reporting
● Optional add-on modules
Configuration advice for all of these features can be found in the Forcepoint Web
Security Cloud Help. Some basic steps for configuring the service are outlined in the
sections that follow.
The default policy you configured using the setup wizard applies a standard set of
enforcement actions to all users in your organization. (For reference, the standard
default web configuration is summarized in the topic Standard Web Configuration in
the Web Security Cloud help.)
Forcepoint Web Security Cloud also allows you to create more granular policy
configuration on an IP address, user or group basis. For example, specific users or
departments may be permitted to access particular web resources, or you may define
times of day when certain resources are restricted or permitted for some users. For
data security, some users may be permitted to share sensitive information, while it is
restricted for others.
There are a number of ways to make your web policies more granular:
● Create different policies to control traffic from different egress IP addresses that
you manage (for example, different branch locations).
● Assign users and groups to specific policies, allowing you to create separate
policies for different departments. By default, user and group policy assignment
overrides connection-specific policy assignment.
● Create category exceptions for specific users and groups, defining override
settings for some users within the policy.
The approach you take depends on the scale and complexity of your setup. You may
deploy a combination of the above methods.
Tip
As a best practice, Forcepoint recommends that you keep
the number of policies to the minimum necessary to
provide granular protection across your organization. This
helps to lower the administration overhead when making
changes across multiple policies.
by default), the user can visit any site that requires confirmation without receiving
another block page. Once the time period ends, browsing to these sites requires
the user to click Confirm again.
● Use Quota means that users receive a block page, asking them whether to use
quota time to view the site. If users click Use Quota Time, they can view the site
for a configurable period.
Clicking Use Quota Time starts two timers: a quota session timer and a total quota
allocation timer. The session length and total quota time available for each
category depend on the options selected on the General tab.
● Block access blocks access to websites in this category unless they exist in
another category with the Allow access action. When a site is blocked, you can
choose a notification page to be displayed.
For more information, see Web Categories tab in the Web Security Cloud help.
Category exceptions
Exceptions allow the default action for a web category to be overridden for specified
users and groups of users, and for defined time periods. For example, you can allow
users to access certain categories outside of working hours, or apply a time quota
between certain hours.
Define exceptions for a policy under Category Exceptions on the Web Categories tab.
You can click a category to view the exception rules that apply to it.
Click Add to add a new exception.
Tip
Category exceptions are an easy way to apply more
granular policy configuration for specific users and
groups, without creating different policies.
For more information, see Exceptions in the Web Security Cloud help.
File blocking can be configured per web category, or per user and group. For example,
you can enable the Sports category, but prevent users from downloading multimedia
files from sites in that category.
Important
Archived/compressed files are not extracted to determine if the contents contain a
file that should be blocked based on the type or extension. However, they are
inspected for malware. Archived and compressed files can be blocked, if needed, in
which case, all files contained in those archived files are blocked.
Configure file blocking via the File Blocking tab of your policy. For more
information, see File Blocking tab in the Web Security Cloud help.
When a policy denies access to a resource or needs to inform the user of an event, it
serves a block or notification page, with a message informing the user of the action it
has taken. Forcepoint Web Security Cloud comes with a standard set of notification
pages covering all scenarios.
Notification pages are provided as editable templates. You can modify these to suit
your needs, or add your own pages. You can then configure your policies to use your
custom notification pages for a given action.
You can also create multiple language versions of your notification pages that will be
displayed to a multi-national user base. The most appropriate language page is
displayed based on the user’s browser language settings.
Configure block and notification pages via Web > Block & Notification Pages. For
more information, see Configure block and notification pages in the Web Security
Cloud help.
You can define destinations that will bypass the cloud service, and that users will be
able to access directly. Bypass destinations can be added per policy, or at the account
level, applying to all policies.
Sites that you should add as bypass destinations can include, for example:
● Trusted services, such as organizational webmail
● Antivirus update servers
● Internal destinations that are not accessible to the cloud service
(Note: the cloud service PAC file bypasses private address blocks by default.).
To add a bypass destination to a policy, navigate to Web > Policies > [policy name] >
Connections tab. Add bypass destinations under Proxy Bypass. See Connections tab
in the Web Security Cloud help.
To add a bypass destination that applies to all policies, navigate to Web > Bypass
Settings > Proxy Bypass tab. See Adding and importing sites that bypass the proxy
in the Web Security Cloud help.
Adding administrators
Configure password policy settings for your account that require passwords to expire
automatically after a set number of days, and that lock users out after a number of
incorrect login attempts.
Tip
For further security, enable two-factor authentication,
requiring the administrator to use a supported authenticator
app (such as Google Authenticator) to access the portal.
See Two-factor authentication in the Web Security Cloud
help.
For more information on securing administrator access, see Adding a contact in the
Web Security Cloud help.
Privacy protection
The cloud portal provides options to prevent end-user identifying information and
data security incident trigger values from appearing in logs and reports. If required,
you can collect this information for security threats, even when it is not collected for
other web traffic.
Review and configure privacy options on the Account > Privacy Protection page in
the cloud portal. Here, you can anonymize selected end user attributes for all policies,
or specific policies, and define whether data security incident triggers are stored and
displayed in reports.
The available reports for web traffic and analysis are located in the navigation pane
under Reporting.
The Report Catalog contains a number of predefined reports that cover common
scenarios, available in bar chart, trend chart, and table formats. You can copy any
predefined report to apply your own filters to create a custom report, and share your
reports with other administrators. Custom reports appear in the Report Catalog in a
folder called “My Reports”.
The Report Builder offers an enhanced model for creating multi-level, flexible
reports that allow you to analyze information from different perspectives and gain
insight into your organization’s Internet usage. If a high-level summary shows areas of
potential concern, you can drill down to find more details and use Transaction
Viewer for granular reports on individual transactions.
The following optional licenses are available as add-on modules for Web Security
Cloud.
Module Description
Advanced Malware Advanced cloud-hosted file sandboxing capabilities,
Detection for Web providing detailed analysis of suspicious files.
See the Advanced Malware Detection product page on the
Forcepoint website.
Cloud App Control Integration with Forcepoint CASB, providing granular
control and protection of the cloud apps used in your
organization.
See the Forcepoint Cloud Security Gateway Integration
Guide on the Support site.
Web Data Retention The base reporting data retention period is 90 days. Extended
data retention is available, to extend this to a total duration
of:
● 6 months
● 12 months
● 18 months
Please contact your account manager for further information about purchasing these
modules.
Before deploying Forcepoint Web Security Cloud, you should inform your users what
the service does and how it impacts them. This may be a legal requirement in some
countries. Below is some sample text that you can use as a model for an initial
communication. You can also customize the registration email templates and pre-
logon welcome page, if you are going to use them.
Introduction to the Forcepoint Web Security Cloud service
Forcepoint Web Security Cloud is an advanced web protection service that we
have deployed to protect Internet users from computer viruses and other web-
based threats such as spyware. All of our Internet traffic is directed to data centers
where these threats are filtered out and our Internet acceptable use policy is
enforced.
Many websites contain viruses or inappropriate and potentially offensive content.
Links to these sites may show up in search results, and the type of content may not
be obvious until it is too late. Forcepoint Web Security Cloud allows us to block
these sites.
Internet acceptable use policy
We have published an Internet acceptable use policy that outlines your
responsibilities as an individual when using company resources to access the
Internet. Forcepoint Web Security Cloud allows us to enforce this policy, report
on web usage, and block inappropriate downloads. In the event that a website is
blocked, you are presented with a page explaining why.
We recognize that different people need to access different types of websites to
perform their jobs, so if sites that you are trying to access are being blocked,
please email XXXX, include the website address and the reason why you need to
access it. The full website address can be copied from your browser address bar.
Please click the link below to access our corporate Internet acceptable use policy.
Note
For information about acceptable use policy notices, see
Notification pages in the cloud portal Help.
This feature is not available for I Series appliance
deployments.
End-users who must self-register to connect to the Internet through the cloud service
should have the following instructions:
Registering to use Forcepoint Web Security Cloud
To use the Forcepoint Web Security Cloud service, you first need to complete a
simple, one-time registration process:
If not using bulk registration
1. Click the link below. It takes you to the end-user registration portal. https://
www.mailcontrol.com/enduser/reg/index.mhtml
2. Enter your name and email address and click Submit.
3. When you receive an email from Forcepoint, click the link it contains.
If using bulk registration
You will receive an email containing a link that you should click.
If using basic authentication:
This takes you to the end-user registration portal. Enter the password that you
want to use when you access the web (twice), and click Submit.
Registration is now complete, and you are not required to register again. To check
that you are correctly registered, shut down all browsers and open a new one.
When you try and access a website, you are first asked to log in. Type the email
address and password that you used to register with Forcepoint Web Security
Cloud and click OK. You may want to check the box that invites you to save these
login details to simplify future logins.
If using NTLM transparent identification without directory synchronization:
This takes you to the end-user registration portal. Enter the password that you
want to use when you access the web (twice), and click Submit.
Now enter a URL, such as www.forcepoint.com, into your browser address bar
and you are presented with the final registration page.
Type the email address and password that you used to register with Forcepoint
Web Security Cloud into the appropriate boxes.
If using basic authentication:
Logging in when you access the web
You need to log in every time you open a new browser to access the Internet. If
you leave your browser open, you are not required to log in again. If you need a
second browser window, do not launch a new browser. In your existing one, click