Wsop 85x Wpfaq En-Us
Wsop 85x Wpfaq En-Us
v8.5.x
Revision A
Forcepoint Web Security On-prem v8.5.x | Web Protection FAQ
Contents
■ Introduction on page 2
■ How is a policy or exception assigned to a request? on page 3
■ How do I know which policy is being applied to a client’s requests? on page 4
■ What do I do when the wrong policy is being applied to requests? on page 6
■ How do keywords and regular expressions work? on page 8
■ Can I exclude specific traffic from logging? on page 9
■ How do I create exceptions and how do they work? on page 12
■ How do I create policies? on page 13
■ How do block pages work? on page 14
■ How is quota time configured and used? on page 16
■ What are filters, and how do they work? on page 16
■ What are custom URLs, and how do they work? on page 17
■ How do I back up and restore my policy and configuration data? on page 19
■ What is my subscription level and what happens if it’s exceeded? on page 19
Introduction
This collection includes answers to the following frequently asked questions about Forcepoint Web Security and
Forcepoint URL Filtering:
For answers to common reporting questions, see the Web Protection Reporting FAQ.
Related concepts
Introduction on page 2
How do keywords and regular expressions work? on page 8
Can I exclude specific traffic from logging? on page 9
How do I create exceptions and how do they work? on page 12
How do I create policies? on page 13
How do block pages work? on page 14
How is quota time configured and used? on page 16
What are filters, and how do they work? on page 16
What are custom URLs, and how do they work? on page 17
How do I back up and restore my policy and configuration data? on page 19
What is my subscription level and what happens if it’s exceeded? on page 19
Related tasks
How do I know which policy is being applied to a client’s requests? on page 4
What do I do when the wrong policy is being applied to requests? on page 6
2
Forcepoint Web Security On-prem v8.5.x | Web Protection FAQ
For more information about configuring the Filtering Service precedence order, see “Prioritizing group and
domain policies” in Administrator Help.
■ The hybrid service always uses the following policy precedence order:
User > Group > OU > IP address (filtered location)
Exceptions take precedence over policies. The general rules for determining which exception to apply are:
■ Super Administrator exceptions take precedence over exceptions created by delegated administrators,
unless the Super Administrator has configured an option to allow delegated administrator exceptions take
precedence.
■ Exceptions that apply to one or more individual clients take precedence over exceptions applied to an entire
delegated administrator role.
■ If multiple equivalent exceptions could be applied (for example, 2 Super Administrator exceptions applied to
the same group):
■ Blocked takes precedence over permit.
■ If there are multiple blocked exceptions, the first one found is applied.
■ If there are multiple permitted exceptions and no blocked exceptions, the first permitted exception found is
applied.
If no applicable exceptions are found, the service determines which policy to apply:
■ When on-premises components respond to a request, by default, a computer or network policy takes
precedence over a group policy.
■ When the hybrid service enforces policy, a group policy takes precedence over a computer or network policy.
■ A policy assigned to a computer (single IP address) takes precedence over a policy assigned to a network (IP
address range).
■ If multiple group policies apply to the same user, and no higher-priority policy applies, precedence is applied
based on the Use most restrictive group policy setting set on the Settings > General > Filtering page in
the Web module of the Forcepoint Security Manager.
■ If the option is selected, the request is blocked if any of the applicable policies blocks the URL category.
3
Forcepoint Web Security On-prem v8.5.x | Web Protection FAQ
■ If the option is not selected, the request is permitted if any of the applicable policies permits the URL
category.
■ If all groups have the same policy, that policy is used.
■ Custom protocols take precedence over pre-defined protocols.
■ Custom categorization take precedence over pre-defined categories.
■ The Manage Role Priority option in Delegated Administration sets precedence when a user is in multiple
groups managed by different delegated administrator roles.
■ If no other policy is found, the Default policy is applied.
Steps
1) Log on to the Web module of the Forcepoint Security Manager.
If your organization uses an LDAP-based directory service, you can also click Find User to search the
directory.
■ An IP address
4) Click Go.
Next steps
The tool displays the name of one or more policies. The tool returns multiple policies when all of the following are
true:
■ The user belongs to multiple groups or OUs
■ Different policies are assigned to each group or OU
■ No policy is assigned specifically to the user
This can also occur when an IP address is included in more than one network range.
4
Forcepoint Web Security On-prem v8.5.x | Web Protection FAQ
If the Check Policy tool returns an unexpected result, and client requests are being blocked, you can use
information provided in a block page to determine what policy is being applied and how the user has been
identified.
Related concepts
How is a policy or exception assigned to a request? on page 3
Steps
1) Have the user browse to a blocked URL.
3) When the category information displays at the top of the block page, right-click within the section containing
the category information and select View Source (Internet Explorer) or T his Frame > View Frame Source
(Mozilla Firefox).
4) Scroll down to the bottom of the HTML output. The information includes:
■ User name and IP address
Next steps
If a customized block page does not contain the More Information option, you can still generate a blocked
request, then change the block URL to retrieve the additional information. The block page URL looks something
like this:
http://<ipaddress>:15871/cgi-bin/blockpage.cgi?ws- session=.....
Replace blockpage with moreBlockInfo as follows
http://<ipaddress>:15871/cgi-bin/moreBlockInfo.cgi?ws- session=.....
Follow steps 3 and 4 in the procedure above to find user and policy information.
If the user is not correctly identified and there is no policy assigned to the user’s IP address, the Default policy is
used.
5
Forcepoint Web Security On-prem v8.5.x | Web Protection FAQ
Steps
1) In the Web module of the Security Manager, go to Main > Policy Management > Clients page.
2) Expand the Directory tree and verify that the LDAP path displayed matches what is currently configured on
the Settings > General > Directory Service page.
3) If necessary, delete, re-add, and save the user or group objects. When re-adding clients, make sure to
assign them the correct policy.
Steps
1) Verify your subscription key.
a) In the Web module of the Security Manager, go to the Main > Status > Alerts page and make sure
there are no subscription-related alerts in the Health Alerts Summary.
b) Navigate to the Settings > General > Account page and verify that your subscription key appears, the
expiration date has not passed, and the number of subscribed network users is greater than 0.
b) If no alerts appear, click Database Download in the toolbar at the top of the dashboard, and make sure
all Filtering Service instances show a successful last download, and that all downloads happened within
the last 2 weeks (14 days).
If there are any messages, or if the database is outdated, click Update to initiate a manual update.
6
Forcepoint Web Security On-prem v8.5.x | Web Protection FAQ
4) Use the TestLogServer utility to verify that Filtering Service is receiving URL requests. For instructions, see
Using TestLogServer for Web Protection Troubleshooting.
■ If Filtering Service is not receiving Internet traffic, verify that Content Gateway, Network Agent, or your
third-party integration product has been properly configured to communicate with Filtering Service.
■ If you have a standalone Forcepoint URL Filtering deployment, verify that Network Agent is able to see all
traffic (incoming and outgoing) and that port spanning is configured.
5) Run the WebsensePing utility to see what happens when a user requests a site.
a) Open a command prompt on the Filtering Service machine and navigate to the appropriate directory ( C:
\Program Files\Websense\Web Security\bin or /opt/Websense/ , by default).
Here, <username> is the name of the user and <IPaddress> is the client IP address, depending on
whether the policy is user-based or IP address- based.
A user name can be entered in Windows NT format (winNT://Test/jdoe) or LDAP format (LDAP://GC
OU=Technical Support,OU=US Technical Services,DC=Test,DC=com/John Doe).
Both user name and client IP address can be entered in the same command to help make sure the
information provided by WebsensePing is based on the policy that would be applied.
c) Review the output of the command to determine what action (disposition) would be applied and confirm
the category of the URL is what you expected.
6) Verify that connections to the client and origin server are being closed by running a packet capture on the
Filtering Service machine and on the client.
7) Refresh the Filtering Service user/group cache. By default, Filtering Service caches user and group
information for 2 hours. The cache needs to be updated when any changes are made to users or groups.
To update the cache, go to the Settings > General > Directory Services page in the Web module of the
Security Manager, then click Clear Cache.
7
Forcepoint Web Security On-prem v8.5.x | Web Protection FAQ
8) Make sure the client machine can communicate with the Filtering Service machine.
a) On the client machine, open a Command Prompt and ping the Filtering Service machine.
b) If the ping succeeds, on the Filtering Service machine, make sure that Filtering Service (EIMServer) is
listening on port 15871.
c) From the client, open a telnet session to the Filtering Service machine on port 15871.
If telnet fails, ensure there are no local firewalls or devices between the client and Filtering Service that
are blocking the port.
9) To make sure the client machine can receive a block page, go to the client machine and enter the following
URL:
http://<Filtering_Service_IP_address>:15871/cgi-bin/ blockpage.cgi?
■ If you see an Invalid Request message, Filtering Service is active and listening. This means that the
client can reach Filtering Service but there may be DNS issues.
■ If you see a Page Cannot be Displayed message, there are connectivity issues between the machines.
8
Forcepoint Web Security On-prem v8.5.x | Web Protection FAQ
Once keyword-based blocking is enabled, web protection software tries to match the keyword against each
requested URL as follows:
■ If the keyword contains only ASCII characters, the keyword is matched against the domain, path, and query
(CGI) portions of a URL. The match is case independent.
For example, if you associated the keyword “nba” with the permitted Sports category, the following URLs are
blocked:
■ sports.espn.go.com/nba/
■ modernbakery.com
■ fashionbar.com
■ If the keyword contains characters outside the ASCII character set, the keyword is matched against only the
path and query (CGI) portions of the string. The match is case independent.
For example, if you associated the keyword “fútbol” with the permitted Sports category:
■ “www.fútbol.com” is permitted (the domain portion of the URL is not matched).
■ “es.wikipedia.org/wiki/Fútbol” is blocked (the path portion of the URL is matched).
When web protection software identifies a keyword in a URL:
■ The URL is recategorized according to the keyword match.
■ Reports show the keyword category, rather than the Forcepoint URL Database category, for the URL.
■ The block page the user receives shows that the URL was blocked by keyword.
For more information on using and defining keywords see your Administrator Help.
9
Forcepoint Web Security On-prem v8.5.x | Web Protection FAQ
■ Requests for the categories or protocols are stilled managed by policies (permitted, blocked, and so on).
■ No record of any requests for the categories is included in the Log Database, so the traffic does not appear in
reports.
■ Usage alerts can not be generated for the non-logged categories and protocols.
Steps
1) Go to the Settings > General > Logging page in the Web module of the Security Manager.
2) Use the Selective Category Logging list to identify all categories that should not be logged. By default,
requests are logged for all categories.
■ Expand parent categories to configure subcategories.
■ Clear the check box next to a category name to stop logging the category.
■ You must select or deselect each category separately. Selecting a parent category does not automatically
select its subcategories. Use Select All and Clear All to assist with selections.
3) Click OK to cache your changes. Changes are not implemented until you click Save and Deploy.
Next steps
To exclude a specific URL from logging, add it to a custom category, then omit that category from logging as
described above. See “Editing categories and their attributes” in the Administrator Help.
Steps
1) Go to the Main > Policy Management > Filter Components page in the Web module of the Security
Manager and click Edit Protocols.
4) If the protocol is currently set for logging by default, click Change Settings, then clear the Log protocol
data check box.
10
Forcepoint Web Security On-prem v8.5.x | Web Protection FAQ
5) Click OK to return to the Edit Protocols page. When you are finished making changes, click OK again to
cache the changes, then click Save and Deploy to implement them.
Next steps
The changes that you made are applied to all active protocol filters in your delegated administration role.
Administrators can override the change in individual protocol filters.
See “Editing custom protocols” in the Administrator Help for more information.
Steps
1) Go to the Settings > Network Agent > Global page in the Web module of the Security Manager.
2) Check the IP address ranges listed in the Ignore Internal Traffic list.
■ Click an IP address or range to edit it.
■ Click Add to add missing IP addresses or ranges to the list.
■ Click Delete to remove entries.
■ If the client machines whose traffic you don’t want logged do not have a static IP address, ensure that
they resides in a DHCP range that can be added to this list.
Network Agent ignores traffic between these machines, monitoring only traffic that leaves the defined
network.
3) If you want to monitor, block, or permit traffic to some internal machines, add those IP addresses to the
Internal Traffic to Monitor list.
■ By default, this traffic is both monitored and logged.
■ If you want to be able to block traffic to these machines, but don't want the blocked requests logged, you
can configure that later.
4) When you are finished making changes, click OK, and then click Save and Deploy to implement the
change.
Next steps
If you are managing traffic to one or more of your internal machines, add the IP addresses of those machines
(or the URLs used to access the machines) to a custom category. Then, use the Settings > General > Logging
page to exclude the custom categories from logging (see Excluding categories from logging).
Related tasks
Excluding categories from logging on page 10
11
Forcepoint Web Security On-prem v8.5.x | Web Protection FAQ
12
Forcepoint Web Security On-prem v8.5.x | Web Protection FAQ
■ By default, Super Administrator exceptions take precedence over exceptions created by delegated
administrators.
■ A delegated administrator exception takes precedence when the Super Administrator exception has been
defined to allow delegated administrator override.
■ If multiple equivalent exceptions could be applied:
■ Blocked takes precedence over permit.
■ If there are multiple blocked exceptions, the first one found is applied.
■ If there are multiple permitted exceptions and no blocked exceptions, the first permitted exception found is
applied.
■ If there are multiple referer exceptions and no blocked exception, and one of the referer exceptions
includes no specific URLs or regular expressions, the referer exception that lists the URL is applied.
■ Client exceptions (that apply to one or more individual clients) take precedence over role exceptions.
Use the Test Filtering tool in (under Toolbox in the Web module of the Forcepoint Security Manager) to verify that
client requests will be blocked or permitted as expected.
2) Enter a unique Policy name. The policy name must be between 1 and 50 characters long, and cannot
include any of the following characters:
*<>{}~!$%&@#."|\&+=?/;:,
Policy names can include spaces, dashes, and apostrophes.
3) Enter a Description for the policy. The description should be clear and detailed to help with policy
management in the long term.
The character restrictions that apply to policy names also apply to descriptions, with 2 exceptions:
descriptions can include periods (.) and commas (,).
13
Forcepoint Web Security On-prem v8.5.x | Web Protection FAQ
4) To use an existing policy as the foundation for the new policy, mark the Base on existing policy check box,
and then select a policy from the drop-down list.
To start with an empty policy, leave the check box unmarked.
Next steps
In order for the policy to take effect, you must both apply it to clients (to determine who is governed by the policy)
and click Save and Deploy to implement your changes.
For a quick but thorough introduction to creating and editing policies and applying them to clients, see the “Policy
Management” section of the New Admin Quick Start tutorial.
1) The header explains that the site or cloud application has been blocked.
2) The top frame contains the actual block message, including the requested URL or cloud application, and the
reason it was blocked.
3) The bottom frame provides any options that are available to the user, based on the way the site or cloud
application has been blocked. The user may be presented with an option to Go Back to the previous page,
Continue to the site or cloud application, or Use Quota Time to view the site.
A slightly different block page is presented if the URL is blocked because its category is in the Security Risk
class. In this case, the header information indicates that a security risk has been blocked, with an explanation that
the URL may pose a security threat.
When a user clicks the More Information button, additional information is displayed on the block page to explain
why the request was blocked.
In addition to the visible details displayed on the More Information page, hidden information is added to the block
page source code. Administrators can use this data to help with troubleshooting if a user’s requests are being
blocked unexpectedly.
14
Forcepoint Web Security On-prem v8.5.x | Web Protection FAQ
2) Scroll down to the bottom of the resulting HTML output. The information includes:
■ User name and IP address
■ The policy that was applied
■ The delegated administrator role associated with the policy
■ How the categorization was done
For example:
User name: LDAP://10.203.128.200 OU=UA,DC=ua-
ux,DC=forcepoint,DC=com/Chinua Achebe Source IP address: 10.203.128.45 Current time: 10:42
This user receives policy: role-8**Security Only. The policy includes a category or limited
access filter for the current time.
This client is associated with role: Super Administrator.
The request was categorized by: Master Database.
Next steps
If a customized block page does not contain the More Information option, the URL that generates the page can
be edited. A block page URL looks something like this:
http://<ipaddress>:15871/cgi-bin/blockpage.cgi?ws- session=...
Replace blockpage with moreBlockInfo:
http://<ipaddress>:15871/cgi-bin/moreBlockInfo.cgi?ws- session=...
The page that displays contains the information described in the procedure above. Note that this information is
viewable only if your browser supports iframes.
For information about customizing block pages, see Creating Custom Block Pages.
15
Forcepoint Web Security On-prem v8.5.x | Web Protection FAQ
16
Forcepoint Web Security On-prem v8.5.x | Web Protection FAQ
■ The action (like permit, block, confirm, or quota) assigned to each category.
Each category filter can assign a different action to each category. Your software includes 5 sample category
filters that can be customized and used in policies, as well as a set of templates that you can use to create
new filters.
■ Protocol filters list:
■ All non-HTTP protocols, including both Forcepoint URL Database protocols and custom protocols.
■ The action (like permit, block, or limit by bandwidth) assigned to each protocol.
Each filter can assign a different action to each protocol. Your software includes 3 sample protocol filters
that can be customized and used in policies, as well as a set of templates that you can use to create new
filters.
The components required for protocol management vary based on your subscription level:
■ (Forcepoint Web Security) Content Gateway offers protocol management for protocols that tunnel over
HTTP. It can be used in conjunction with Network Agent to provide full protocol management.
The hybrid service does not enforce protocol filters.
■ (Forcepoint URL Filtering) Network Agent is required to enable protocol management.
Web protection software can block TCP-based protocol requests, but not UDP- based protocol requests.
If an application uses both TCP- and UDP-based messages, and the original network request is made via
TCP, any subsequent data sent using UDP is blocked since the initial TCP request is blocked.
■ Limited access filters are a restrictive list of permitted URLs that can be used in place of a category filter in
web protection policies.
When a limited access filter is in effect, users can visit only the URLs in the list. All other sites are blocked.
If a URL that is permitted by a limited access filter becomes infected with malicious code, user requests to that
URL are blocked as long as Security Risk categories are blocked in the Default policy. Check the category
filter currently used by the Default policy to verify that all security-related categories are blocked.
■ Cloud App filters assign an action (like permit or block) to cloud applications that are specified in the filter.
This is the action that web protection components take in response to a client’s Internet request.
See the Administrator Help for more information.
17
Forcepoint Web Security On-prem v8.5.x | Web Protection FAQ
■ Add one or more URLs to an existing category, using the Recategorized URLs list.
Enter each URL on a separate line.
To ensure that sites are managed correctly, enter both their URL and their IP address to the Recategorized URLs
list. In addition:
■ If a site can be accessed via multiple URLs, define each as a custom URL to ensure it is filtered as intended.
■ Include the protocol for any non-HTTP site.
■ If an HTTP redirect is used to send users to a new URL when a site is moved to a new domain, the new URL
is not filtered the same way as the redirecting site. Create a new custom URL to ensure the site is filtered
appropriately at its new address.
■ Include the port number for HTTPS sites.
■ Filtering Service performs a string match, recognizing URLs exactly as they are entered.
For example, if the Search Engines and Portals category is blocked, but you recategorize www.yahoo.com in
a permitted category, a user who accesses the site using images.search.yahoo.com or just yahoo.com will be
blocked. If however, you recategorize yahoo.com, those sites will be permitted.
An implicit wildcard is assumed at the end of all recategorized URLs. That is, if www.domain2.com is added to
a blocked category, the following will also be blocked:
■ www.domain2.com/product
■ www.domain2.com/services
■ Regular expressions can be used to define a recategorized URL. See How do keywords and regular
expressions work?.
Use the URL Category tool in the Toolbox on the Web tab of the Forcepoint Security Manager to verify that
recategorized sites are being assigned to the correct category.
Related concepts
How do keywords and regular expressions work? on page 8
18
Forcepoint Web Security On-prem v8.5.x | Web Protection FAQ
2) Use the Print Policies to File option on the Policies page to generate a Microsoft Excel spreadsheet that
includes custom URLs. This option gives a comprehensive list of all of your policy-related information, so the
resulting file may be quite large.
a) Navigate to the Policy Management > Policies page.
3) Use the See custom URLs in this category option on the Edit Category Filter page to open a pop-up
window that lists the recategorized URLs assigned to a selected category.
a) Navigate to the Policy Management > Filters page.
c) Select a category that has been assigned to recategorized URLs and click the See custom URLs in
this category link in the right column.
19
Forcepoint Web Security On-prem v8.5.x | Web Protection FAQ
■ The subscription type (Forcepoint Web Security or Forcepoint URL Filtering) determines what features are
available to configure and use.
■ Subscriptions are issued on a per-client (IP address) basis.
After installation, the first time you log on to the Forcepoint Security Manager, you are prompted to enter your
subscription key. This prompts your web protection solution to verify the key, confirm your subscription type,
and start downloading the Forcepoint URL Database. This verification and download process enables policy
enforcement.
Your software maintains a subscription table that keeps track of the number of clients managed each day. The
subscription table is cleared each night. The first time a client makes an Internet request after the table has been
cleared, its IP address is entered in the table.
The client count includes:
■ Any client who makes an Internet (HTTP/HTTPS/FTP) request that is passed to your web protection software
by Content Gateway, Network Agent, or a third- party integration product
■ If Network Agent is used for protocol management, any client who makes a non- browser-based Internet
request (for example, an IM connection)
■ Any client machine running software that connects to the Internet
To help ensure that each computer is counted only once per day, use static IP addresses.
■ If you have a DHCP environment, consider setting your IP address leases to last more than 1 day. An
increase to the user count may occur if your current configuration assigns multiple IP addresses to a machine
in a given day.
■ Laptop computers using wireless connections may be counted multiple times.
When the number of clients listed in the table reaches the subscribed maximum, any previously-unlisted client
that requests Internet access exceeds the subscription.
■ In Forcepoint Web Security deployments, there is no change in policy enforcement. Full security protection
capabilities are maintained even after the licensed IP levels are exceeded.
■ In Forcepoint URL Filtering deployments, when the number of subscribed users is exceeded, requests
from users who exceed the subscription count are permitted or blocked based on the setting Block users
when subscription expires, found on the Settings > General > Account page in the Web module of the
Forcepoint Security Manager.
In all deployments, if your subscription were to expire, all requests are permitted or blocked, depending on
the same configurable setting. Whether requests are permitted or blocked depends on the Block users when
subscription expires selection, configured on the Settings > General > Account page in the Forcepoint
Security Manager. Note that expiration notices are provided in advance of a possible subscription expiration.
Occasionally, the subscription count may be set to zero. If that happens, try one of the following:
■ Initiate a manual database update.
1) Navigate to the Settings > Dashboard page and click the Database Download button in the toolbar.
■ Remove and re-add your subscription key on the Settings > General > Account page. This also initiates a
database download.
For subscription-related troubleshooting information, see “Installation and Subscription Issues” in the
Administrator Help.
20
© 2024 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.
All other trademarks used in this document are the property of their respective owners.
Published 02 September 2024