getting_started_guide
getting_started_guide
DLP
9.0
Revision A
© 2022 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.
All other trademarks used in this document are the property of their respective owners.
Every effort has been made to ensure the accuracy of this document. However, Forcepoint
makes no warranties with respect to this documentation and disclaims any implied
warranties of merchantability and fitness for a particular purpose. Forcepoint shall not
be liable for any error or for incidental or consequential damages in connection with the
furnishing, performance, or use of this manual or the examples herein. The information in
this documentation is subject to change without notice.
Forcepoint DLP 9.0 | Getting Started Guide
Contents
1 Getting Started with Forcepoint DLP................................................................................................................ 5
Entering a subscription key........................................................................................................................... 5
9 Configuring Labels............................................................................................................................................ 47
Import and enable Boldon James Classifier labels..................................................................................... 47
Import and enable Microsoft Information Protection labels......................................................................... 48
Configure an action plan to apply labels.....................................................................................................49
3
Forcepoint DLP 9.0 | Getting Started Guide
4
Chapter 1
Getting Started with Forcepoint
DLP
Contents
After installing Forcepoint DLP, log on to the Forcepoint Security Manager and enter a subscription key (see Entering a
subscription key). Next, follow the initial configuration instructions in the related topics to configure the software.
Related concepts
Configuring the Data Protection Service on page 7
Configuring the Protector for Use with SMTP on page 9
Configuring Third-Party Proxies on page 19
Configuring Labels on page 47
Getting Started with the REST API Service on page 51
Related tasks
Entering a subscription key on page 5
Configuring the Analytics Engine on page 17
Related reference
Configuring the Web Content Gateway on page 13
Configuring User Directory Integration on page 21
Getting Started with File Discovery on page 25
Steps
1) Open a browser and enter the Security Manager URL: https://<IP_address_or_hostname>:9443
2) Enter the User name admin and the password configured during installation, then click Log On.
3) If the Data Security module of the Security Manager is not displayed by default, select Data from the Product
Module drop-down menu to open it.
■ Until a subscription key is entered, a subscription prompt appears automatically.
■ Once a key has been entered, administrators can review subscription information on the Settings >
General > Subscription page.
When the protector is used for monitoring or protecting data transfer in email (SMTP) traffic, it can be configured in
monitoring or MTA mode.
More information about configuring the protector to monitor other protocols can be found in the Forcepoint DLP
Administrator Help.
For initial SMTP configuration instructions, go through the following tasks:
Related tasks
Set up SMTP in monitoring mode on page 9
Set up SMTP in MTA mode on page 10
Steps
1) Go to the Settings > Deployment > System Modules page.
4) On the Local Networks tab, select Include specific networks, then add all of the internal networks for all
sites.
■ This list is used to identify the direction of the traffic.
■ The mail servers and mail relays should be considered part of the internal network.
d) Click OK.
8) Connect the protector to the outgoing connection and to the organization’s internal network.
This should be done last, after the protector is fully configured.
Steps
1) Go to the Settings > Deployment > System Modules page.
4) On the Local Networks tab, select Include specific networks, then add all of the internal networks for all
sites.
■ This list is used to identify the direction of the traffic.
■ The mail servers and mail relays should be considered part of the internal network.
b) On the General tab, set the Mode to Mail Transfer Agent (MTA).
c) On the Mail Transfer Agent (MTA) tab, set the Operation Mode to Blocking and select the behavior
desired when an unspecified error occurs during analysis.
e) Set the next hop MTA (for example, the organization’s mail relay), if needed.
f) Set the addresses of all networks that are permitted to relay email messages through the protector.
■ This is required, as it is important that not all networks have permission to send email via the
protector’s SMTP service. Otherwise, the protector can be used as a mail relay.
■ This list should include the addresses of any previous hops, such as the mail server.
8) Select a policy rule to use for email management, then click Edit.
b) Select Severity & Action, then select an action plan that includes notifications.
Note
For more information about action plans, see the Forcepoint DLP Administrator Help.
2) If a next hop server exists (for example, a company mail relay), add the protector’s IP address to its allowed
relay list
3) (Optional) Set the mail server’s next hop (smart host) to the protector’s IP address.
After installing the Web Content Gateway module, configure it in both the Content Gateway manager and the
Forcepoint Security Manager. Refer the following tasks to configure the gateway:
Related concepts
Register Content Gateway with Forcepoint DLP on page 14
Related tasks
Enter a subscription key in the Content Gateway manager on page 13
Configure the Content Gateway policy engine on page 15
Set up Content Gateway on page 16
Steps
1) Open a web browser and enter the Content Gateway manager URL: https://<ip_address>:8081
2) If Content Gateway is deployed as a transparent proxy, ensure that traffic to and from the communication
interface (“C” on a V Series appliance) is not subject to transparent routing. If it is, the registration process
will be intercepted by the transparent routing and will not complete properly.
3) Make sure that the IPv4 address of the eth0 NIC on the Content Gateway machine is available (not required
if Content Gateway is located on a V-Series appliance). This is the NIC used by the management server
during the registration process.
Steps
1) Go to the Configure > My Proxy > Basic > General page.
2) In the Networking section, enable Web DLP > Integrated on-box if needed. If a change was made, restart
Content Gateway when prompted.
3) Go to the Configure > Security > Web DLP page and enter the IP address of the management server.
4) Enter a user name and password for a Forcepoint Security Manager administrator with Deploy Settings
privileges in the Data Security module.
5) Click Register.
6) Go to the Configure > My Proxy > Basic page and click Restart to restart the Content Gateway machine.
Steps
1) Go to the Configure > Security > Web DLP page.
2) Enable Analyze FTP Uploads to send FTP uploads to web DLP components for analysis and policy
enforcement.
3) Enable Analyze Secure Content to send decrypted HTTPS posts to web DLP components for analysis and
policy enforcement.
This option requires that SSL Manager be enabled. See the Content Gateway Manager Help for details.
Steps
1) Log on to the Data Security module of the Security Manager.
3) Select the Web Content Gateway module in the tree view (click the module name itself, not the plus sign next
to it).
It will be listed as “Forcepoint Web Security Server on <FQDN> (<PE_version>),” where <FQDN> is the fully-
qualified domain name of the Content Gateway machine and <PE_version> is the version of the Content
Gateway policy engine.
Important
Even if the default configuration is not changed, it is still necessary to click Deploy to finalize
the Content Gateway deployment process.
Steps
■ Log onto Content Gateway Manager and run a basic test (Getting Started).
■ If there are multiple instances of Content Gateway, consider configuring a managed cluster.
■ Configure protocols to proxy in addition to HTTP:
■ HTTP (SSL Manager)
■ FTP
■ Complete the explicit or transparent proxy deployment.
■ Content Gateway explicit and transparent proxy deployments
■ Explicit proxy
■ Transparent proxy
■ If proxy user authentication will be used, configure user authentication.
■ If content caching was enabled during installation, configure content caching.
After the base configuration has been tested, consider these additional activities:
■ In explicit proxy deployments, customize the PAC file.
■ In transparent proxy deployments, use ARM dynamic and static bypass, or use router ACL lists to bypass
Content Gateway (see the router documentation).
Configure the analytics engine, incident risk reporting, and risk-related policies in the Data Security module of the
Forcepoint Security Manager.
Steps
1) Go the Settings > Deployment > System Modules page.
2) Make sure the analytics engine module appears in the tree, then:
a) Click the module to view details.
3) Go to the Settings > General > Reporting page to configure the Top Risks report derived from the user analytics.
a) Specify the risk scores to show in the report and on the dashboard.
b) Define the organization’s typical work week to help identify aberrant behavior.
4) For optimal accuracy and efficacy, go to the Main > Policy Management > DLP Policies page and add the
following policies:
■ Disgruntled Employee
■ Self CV Distribution
■ Password Files
■ PKCS #12 Files
■ Deep Web URLs
■ Email to Competitors
Be sure to provide the competitors’ domain names (case-insensitive, separated by semicolons).
■ Suspected Mail to Self
Add or edit the sources to monitor via the possible_sources_domains
parameter in the Email Similarity script classifier.
5) Click Deploy.
Next steps
Refer the following task for information about the reports that the analytics engine enables.
Related tasks
Reporting and health monitoring options on page 18
Forcepoint DLP Network deployments include the Forcepoint web proxy, Web Content Gateway.
Forcepoint DLP can additionally be configured to integrate with third-party proxies via ICAP.
This chapter assumes a forward proxy deployment, where the third-party proxy connects to a Forcepoint DLP
protector.
Instructions for two sample third-party proxies are provided. These are not the only proxies that can be used with
Forcepoint DLP. See your proxy’s documentation for more detailed information about ICAP integrations.
The protector configuration steps apply regardless of which third-party proxy is used.
A reference of error and response codes is also available at the end of this chapter. Refer to the following topics for
proper configuration:
Related concepts
Configuration example: Squid on page 19
Related tasks
Configure the protector for ICAP on page 20
Related reference
ICAP server error and response codes on page 20
icap://<protector_IP>:1344/reqmod
icap://<protector_IP>:1344/reqmod
Steps
1) Go to Settings > Deployment > System Modules page.
Import information from a supported directory server, such as Microsoft Active Directory or IBM Domino, into
Forcepoint DLP in order to:
■ Allow administrators to use their network credentials to log on to the Forcepoint Security Manager.
■ Include user details in analysis.
■ Enhance the incident details displayed to administrators. For configuration instructions, refer to the following topics:
Related tasks
Define user directory settings on page 21
Configure the directory import on page 23
Rearrange user directory servers on page 23
c) Select the directory Type from the drop-down list: Active Directory, Domino, or Comma-Separated
Values (CSV) File.
1) The IP address or hostname and Port to use to connect to the user directory server.
2) Enter the User distinguished name and Password for an account with directory server access.
3) To secure the connection to the directory server, mark Use SSL encryption.
4) To prompt Forcepoint DLP to follow server referrals, if they exist, mark Follow referrals.
2) Enter the User name and Password for an account with at least read permissions to the file.
3) Click Test Connection to verify that Forcepoint DLP can read the file.
4) Click OK.
Steps
1) Mark Get user attributes to retrieve specified user attributes from the directory server.
2) Use the Attributes to retrieve field to enter the user attributes that should be collected for all users. Use
commas to separate entries.
3) If the directory includes user photos, enter the photo attribute name in the User’s photo attribute field.
4) Under Test Attributes, enter a Sample email address to use to perform an import test. Use a valid email
address from the directory.
5) Click Test Attributes to retrieve user information that corresponds to the sample email address.
6) Click OK.
Result
The server is listed on the User Directories page.
1) In the Security Manager, go to the Settings > General > User Directories page.
2) Click the Import daily at... link (to the left of the page, above the list of directories).
In addition to the scheduled import, user directory information can also be imported manually. To start the import
process at any time:
Steps
1) Go to the Settings > General > User Directories page.
3) Select a server and use the arrow buttons to move it up or down the list.
4) Click OK.
Discovery is the act of determining where sensitive content is located in the organization. If the network includes
Windows or Micro Focus shared drives, administrators can create a data discovery task that describes where and
when to discover content on the drives. Discovery can also be performed on Exchange servers and IBM Domino and
Notes.
For more information, follow the below topics to start and perform file discovery:
Related concepts
Performing discovery on Micro Focus file systems on page 25
Performing discovery on Windows NFS shares on page 27
Related tasks
Performing discovery on IBM Domino and Notes on page 45
Related reference
Performing discovery on Exchange servers on page 40
2) Make sure the newly created user has at least “Read” permissions on all files and folders on which discovery
will be run.
3) Make sure Distributed Print Services is not selected, then click Next.
4) Make sure NetIdentity Agent and NMAS are selected, then click Next.
2) On the eDirectory tab, select the tree and its relevant context for the folders on which discovery will be run.
3) Right-click the Micro Focus icon in the task bar and select Properties.
4) Click Cancel.
5) Ensure the files on which discovery will be run are accessible from Windows by UNC (for example, \\FileSrv
\vol1\Data).
5) Click Advanced, then add the Micro Focus access port number 524.
6) On the Scanned Folders page, use the Forcepoint DLP service account for authentication.
Steps
1) To activate Network File System (NFS) on the Forcepoint DLP server, open the Server Manager.
2) Select Server > Role Services > Add Role > Services for Network File System.
3) Go to Start > Administrative Tools > Services for Network File System (NFS).
5) On the Client Settings tab, set the Transport protocol to TCP and the Default mount type to Use hard
mounts.
6) On the File Permissions tab, set all file permissions to Read, Write, and Execute.
7) Click OK.
9) Mark the Active Directory domain name check box and enter a Active Directory domain name.
2) Remove any installed NIS tools under Server Manager > Features.
3) Click Add Role Services to launch the Add Role Services wizard.
Result
Identity Management for UNIX is now installed.
2) Navigate to the Organization Unit (OU) that will contain the group, then select Action > New > Group.
5) Click OK.
7) On the UNIX Attributes tab, select the NIS Domain from the drop-down menu and accept the default Group
ID (GID), then click OK.
Note
If the GID is not 10000, there is already a UNIX-enabled group in the directory. The GID must
be unique and match the GID of the UNIX Group.
Steps
1) Still in the Active Directory Users and Computers tool, select the OU that will hold the UNIX Service Account,
then Action > New > User.
5) On the Member Of tab, click Set Primary Group and add the group created in the previous section.
b) Enter the UID on the UNIX computer that matches the UID of the user on the UNIX machine.
2) Create a data discovery policy. (See Creating a data discovery policy for instructions.)
3) On the Main > Policy Management > Discovery Policies page, select Add network task > File System
Task.
4) On the General page, add a name and description for the discovery task and select the crawler hosted on
the machine that also hosts the NFS client.
This is the crawler that will perform the file system discovery.
5) On the Networks page, click Advanced and add port 2049 to the existing list of scanned ports.
6) On the Scanned Folders page, specify the shares to scan and the user name and password of the Windows
user mapped to the UNIX account as follows:
Note
Network discovery has a limit of 255 characters for the path and file name. Files contained in
paths that have more than 255 characters are not scanned.
b) Select the Method to use when scanning network shares: TCP or ICMP.
c) Enter the User name and Password of the Windows user that was previously mapped to a UNIX
account.
Related tasks
Prepare to run discovery on Exchange Online 365 on page 41
Prepare to run discovery on Exchange 2013 on page 43
2) Grant the account one of the following roles to allow the Forcepoint DLP crawler to discover messages and
display results:
■ Organization Management
■ View Only Organization Management
The crawler account should now be able to access Exchange via Outlook Web App (OWA) and move
between the mailboxes intended to be scanned during the discovery.
Log onto OWA with this account, and try switching between mailboxes as shown below:
3) Configure Exchange impersonation for the service account used for discovery:
a) Open the Windows PowerShell as administrator.
c) When prompted for credentials, enter the user name (email address) and password for the Exchange
365 account to be used for discovery.
Set-ExecutionPolicy RemoteSigned
Here, “Impersonation-Forcepoint” is the name of the administrator role being created for the Exchange
365 account and “user@mydomain” is the user name that will be used for the discovery task.
b) Go to the Main > Policy Management > Discovery Policies page, then click Add network task >
Exchange Task.
c) Complete the wizard as explained in the Forcepoint DLP Administrator Help. On the Exchange Servers
page, enter the credentials set up above.
c) Click Save.
2) Grant the account one of the following roles.This is necessary so that the system can discover messages
and display results.
■ Organization Management
■ View Only Organization Management
The service account should now be able to access Exchange via Outlook Web App (OWA) and move
between the mailboxes intended to be scanned during the discovery. Log onto OWA with this account, and
try switching between mailboxes as shown below:
3) Configure Exchange impersonation for the service account used for the discovery:
a) Open the Exchange Management Shell.
b) Run the New-ManagementRoleAssignment cmdlet to add the permission to impersonate to the specified
user.
For example, to enable a service account to impersonate all other users in an organization, enter the
following:
New-ManagementRoleAssignment -
Name:impersonationAssignmentName -
Role:ApplicationImpersonation -User:ServiceAccount
b) Go to the Main > Policy Management > Discovery Policies page, then click Add network task >
Exchange Task.
c) Complete the wizard as explained in the Forcepoint DLP Administrator Help. On the Exchange Servers
page, enter the credentials set up above.
5) Check that Integrated Windows authentication is turned on (it should be on by default). If it is not:
a) In the Exchange admin center, go to servers > virtual directories > EWS (Default Web Site).
4) Complete the steps in the wizard as described in the Forcepoint DLP Administrator Help. Select dictionary,
RegEx, fingerprinting, or other classifiers as needed.
7) Complete the steps in the wizard as described in the Forcepoint DLP Administrator Help.
8) To deploy the policy and task to the Domino server, click Deploy.
9) The Domino server will be crawled for sensitive data at the next scheduled time. Incidents are reported in
Main > Reporting > Discovery reports.
Use the Forcepoint Security Manager to import labels from labeling systems and apply them on files in endpoint
discovery scans (available on Windows operating systems only). Refer to the following tasks:
Related tasks
Import and enable Boldon James Classifier labels on page 47
Import and enable Microsoft Information Protection labels on page 48
Configure an action plan to apply labels on page 49
Steps
1) Log into the Data Security module of the Security Manager.
2) Go to Settings > General > Services and select the File Labeling tab.
4) On the Boldon James Classifier Properties page, in the Imported Labels section, click Import Labels. The
Import Labels dialog box appears.
6) Browse to the Boldon James configuration file, and click OK to import it.
The file is usually called spif.xml. If the file is not found, contact Boldon James technical support.
7) When the importation is successfully completed, the time and date of the process and a list of imported
labels appear in the Last import field.
Configuring Labels | 47
Forcepoint DLP 9.0 | Getting Started Guide
8) Select the Apply file labels check box. You can now define DLP action plans that use Boldon James
Classifier file labels.
When this box is unchecked, Boldon James Classifier labels are used only for detection.
9) In the Guidelines section, mark one or more check boxes to specify when Forcepoint DLP should add or
modify a label. Note the following aspects of the guidelines:
■ If a file does not meet a specified condition, its labeling remains unchanged.
■ Incident reports provide detailed information about whether labels were found on files and whether they
were changed.
Steps
1) Log into the Microsoft Office 365 Admin Consent page, using your Microsoft Office 365 admin credentials for
authentication.
Next steps
Next, to import enable Microsoft Information Protection labels, first ensure that the labeling system is installed on
the network, and then do the following:
2) Go to Settings > General > Services and select the File Labeling tab.
4) On the Microsoft Information Protection Properties page, in the Imported Labels section, enter your Microsoft
Office 365 admin credentials, and then click Import Labels.
Configuring Labels | 48
Forcepoint DLP 9.0 | Getting Started Guide
Note
We recommend that you enter credentials for an administrator who has visibility to all Microsoft
Information Protection labels used in the organization. User credentials are not stored
on Forcepoint servers. You should also ensure that your web browser does not store this
information.
5) Click OK to start the import process. Note that if the consent process was not completed, this step generates
an error. Complete the consent process, and then try again.
6) When the importation is successfully completed, the time and date of the process and a list of imported
labels appear in the Last import field.
7) Select the Apply file labels check box. You can now define DLP action plans that use Microsoft Information
Protection file labels.
When this box is unchecked, Microsoft Information Protection labels are used only for detection. Configuring
Labels
Note
Files that are protected by Microsoft Information Protection can be decrypted automatically during
DLP analysis (see “Configuring MIP for endpoint decryption” in the Forcepoint DLP Administrator
Guide).
Steps
1) Log into the Data Security module of the Security Manager.
2) Go to Policy Management > Resources > Action Plans and select the Discovery tab.
3) In the Endpoint Discovery section, select a labeling system from the drop-down menu.
4) Select the labels you want to apply. Make sure they are from the labeling system you chose.
5) Click OK to save.
Configuring Labels | 49
Forcepoint DLP 9.0 | Getting Started Guide
Configuring Labels | 50
Chapter 10
Getting Started with the REST API
Service
The REST API service allows customers to remotely pull and manage incident data from Forcepoint Security Manager
to integrate with SOAR, SIEM, BI and other solutions.
The REST API service allows to get Discovery and DLP incidents by verifying optional filters like policy, department,
or the Risk Level. In addition, the REST API allows customers to update incidents’ Status, Severity, assigned
administrator, and more.
The following REST APIs are available:
■ Get Incidents API
■ Update Incidents API
Make sure you create a Local Account of Administrator from type Application on the Forcepoint Security Manager and
apply the authentication process before using the service.
To connect an application to Forcepoint DLP through a REST API connection, you need to create an Application
administrator in the Forcepoint Security Manager on the Global Settings > General > Administrators settings page.
For more information, see the Enabling access to theSecurity Manager topic in the Forcepoint Security Manager Help.
The Application administrator type is only supported for Local accounts. Please note that Network accounts cannot be
configured as an Application type.
For more information about the Authentication process and using the REST API service, see the Forcepoint DLP REST
API Guide.