Wsop 85x Nadmin-Qs En-Us
Wsop 85x Nadmin-Qs En-Us
v8.5.x
Revision A
© 2023 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.
All other trademarks used in this document are the property of their respective owners.
Every effort has been made to ensure the accuracy of this document. However, Forcepoint
makes no warranties with respect to this documentation and disclaims any implied
warranties of merchantability and fitness for a particular purpose. Forcepoint shall not
be liable for any error or for incidental or consequential damages in connection with the
furnishing, performance, or use of this manual or the examples herein. The information in
this documentation is subject to change without notice.
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
Contents
1 Welcome................................................................................................................................................................ 5
Introduction..................................................................................................................................................... 5
Super Administrator........................................................................................................................................6
Delegated Administrator.................................................................................................................................7
Reporting Administrator..................................................................................................................................8
2 Navigation Tips.................................................................................................................................................... 9
Introduction..................................................................................................................................................... 9
Lesson 1: Using the Forcepoint Security Manager....................................................................................... 9
Lesson 2: Accessing Help........................................................................................................................... 14
3 Initial Setup.........................................................................................................................................................15
Introduction................................................................................................................................................... 15
Lesson 3: Downloading the Forcepoint URL Database.............................................................................. 15
4 Policy Management............................................................................................................................................19
Introduction................................................................................................................................................... 19
Lesson 4: The Default policy.......................................................................................................................20
Lesson 5: Working with clients.................................................................................................................... 21
Lesson 6: Using the sample policies...........................................................................................................22
Lesson 7: Managing URLs by category...................................................................................................... 24
Lesson 8: Creating custom policies.............................................................................................................25
Lesson 9: Managing URLs with exceptions................................................................................................ 27
5 Reporting.............................................................................................................................................................29
Introduction................................................................................................................................................... 29
Lesson 10: Dashboard reports.................................................................................................................... 30
Lesson 11: Presentation Reports.................................................................................................................34
Lesson 12: Investigative Reports................................................................................................................ 36
Lesson 13: Real-Time Monitor.....................................................................................................................41
Lesson 14: Improving web protection software...........................................................................................43
6 Where Do I Go Next?........................................................................................................................................ 45
Overview.......................................................................................................................................................45
3
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
4
Chapter 1
Welcome
Contents
■ Introduction on page 5
■ Super Administrator on page 6
■ Delegated Administrator on page 7
■ Reporting Administrator on page 8
Introduction
Welcome to Forcepoint™ web protection solutions.
Use this quick start tutorial to learn the basics of Internet policy management and reporting. The tutorial is made
up of a series of short lessons, divided into 4 sections:
■ Initial Setup
■ Policy Management
■ Navigation Tips
■ Reporting
Each lesson requires between 5 and 10 minutes to complete.
To get started, first click on your role below.
■ If your organization does not use or has not yet configured delegated administration roles, click Super
Administrator.
■ If you manage policies for a specific set of clients, click Delegated Administrator.
■ If you have permission to run reports on managed clients, but the clients’ policies are managed in another
role, click Reporting Administrator.
Super Administrator (including admin)
Delegated Administrator
Reporting Administrator
Related concepts
Super Administrator on page 6
Delegated Administrator on page 7
Reporting Administrator on page 8
Welcome | 5
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
Super Administrator
If you are a Super Administrator (or logging on as admin), all of the tutorial’s lessons apply:
■ Use the Navigation Tips section to become familiar with the Forcepoint Security Manager and its Web Security
module.
■ Lesson 1: Using the Forcepoint Security Manager
■ Lesson 2: Accessing Help
■ Use the Initial Setup section to verify that the Forcepoint URL Database is downloaded.
If another Super Administrator has already configured your web protection software, skip to the next section.
■ Use the Policy Management section to learn to create and modify Internet access policies, and to apply
policies to clients.
■ Lesson 4: The Default policy
■ Lesson 5: Working with clients
■ Lesson 6: Using the sample policies
■ Lesson 7: Managing URLs by category
■ Lesson 8: Creating custom policies
■ Lesson 9: Managing URLs with exceptions
■ Use the Reporting section to understand the available reporting options, and to enable a reporting option used
to continually improve policy enforcement.
■ Lesson 10: Dashboard reports
■ Lesson 11: Presentation Reports
■ Lesson 12: Investigative Reports
■ Lesson 13: Real-Time Monitor
■ Lesson 14: Improving web protection software
At the end of the tutorial, Where Do I Go Next?, provides pointers to additional topics and resources, including
the Knowledge Base and online video tutorials.
To find this tutorial again later, click the Help button from any page in the Security Manager and expand the
Getting Started option.
Related concepts
Lesson 1: Using the Forcepoint Security Manager on page 9
Lesson 4: The Default policy on page 20
Lesson 5: Working with clients on page 21
Lesson 6: Using the sample policies on page 22
Lesson 7: Managing URLs by category on page 24
Lesson 8: Creating custom policies on page 25
Lesson 9: Managing URLs with exceptions on page 27
Lesson 11: Presentation Reports on page 34
Lesson 12: Investigative Reports on page 36
Lesson 13: Real-Time Monitor on page 41
Lesson 14: Improving web protection software on page 43
Welcome | 6
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
Related reference
Lesson 2: Accessing Help on page 14
Lesson 10: Dashboard reports on page 30
Related information
Navigation Tips on page 9
Initial Setup on page 15
Policy Management on page 19
Reporting on page 29
Where Do I Go Next? on page 45
Delegated Administrator
The topics covered in lessons 1-2 and 4-9 require policy permissions. Not all administrators with policy
permissions can create exceptions (covered in lesson 9).
The topics covered in lessons 10-13 require reporting permissions. Not all administrators with reporting
permissions can access dashboard charts, presentation reports, or Real-Time Monitor (covered in lessons 10, 11,
and 13).
■ Use the Navigation Tips section to become familiar with the Security Manager and its Web Security module.
This section shows you how to configure policies and reporting, and identify methods of obtaining assistance,
when needed.
■ Lesson 1: Using the Forcepoint Security Manager
■ Lesson 2: Accessing Help
■ Use the Policy Management section to learn to create and modify Internet access policies, and apply them to
clients. The final lesson in this section explains how to create exceptions that permit or block listed URLs for
specified clients.
■ Lesson 4: The Default policy
■ Lesson 5: Working with clients
■ Lesson 6: Using the sample policies
■ Lesson 7: Managing URLs by category
■ Lesson 8: Creating custom policies
■ Lesson 9: Managing URLs with exceptions
■ Use the Reporting section to understand the reporting tools that your permissions allow you to access.
■ Lesson 10: Dashboard reports
■ Lesson 11: Presentation Reports
■ Lesson 12: Investigative Reports
■ Lesson 13: Real-Time Monitor
At the end of the tutorial, Where Do I Go Next?, provides pointers to additional topics and resources, including
the Knowledge Base and online video tutorials.
To find this tutorial again later, click the Help button from any page in the Security Manager and expand the
Getting Started option.
Welcome | 7
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
Related concepts
Lesson 1: Using the Forcepoint Security Manager on page 9
Lesson 4: The Default policy on page 20
Lesson 5: Working with clients on page 21
Lesson 6: Using the sample policies on page 22
Lesson 7: Managing URLs by category on page 24
Lesson 8: Creating custom policies on page 25
Lesson 9: Managing URLs with exceptions on page 27
Lesson 11: Presentation Reports on page 34
Lesson 12: Investigative Reports on page 36
Lesson 13: Real-Time Monitor on page 41
Related reference
Lesson 2: Accessing Help on page 14
Lesson 10: Dashboard reports on page 30
Related information
Navigation Tips on page 9
Policy Management on page 19
Reporting on page 29
Where Do I Go Next? on page 45
Reporting Administrator
If you are an administrator in one or more investigative reporting roles, with permission to report on managed
clients whose policies are managed in other roles, the following lessons apply:
■ Lesson 1: Using the Forcepoint Security Manager
■ Lesson 2: Accessing Help
■ Lesson 12: Investigative Reports
To find this tutorial again later, click the Help button from any page in the Forcepoint Security Manager and
expand the Getting Started option.
Related concepts
Lesson 1: Using the Forcepoint Security Manager on page 9
Lesson 12: Investigative Reports on page 36
Related reference
Lesson 2: Accessing Help on page 14
Welcome | 8
Chapter 2
Navigation Tips
Contents
■ Introduction on page 9
■ Lesson 1: Using the Forcepoint Security Manager on page 9
■ Lesson 2: Accessing Help on page 14
Introduction
The Forcepoint Security Manager is the management interface for web protection solutions. It provides access to
configuration options, policy management features, and reporting tools.
This section includes 2 lessons to guide you through the Forcepoint Security Manager:
■ Lesson 1: Using the Forcepoint Security Manager introduces the Forcepoint Web Security module of the
Forcepoint Security Manager, emphasizing useful tools and shortcuts.
■ Lesson 2: Accessing Help provides an overview of the user assistance resources available to Web Security
module administrators.
Related concepts
Lesson 1: Using the Forcepoint Security Manager on page 9
Related reference
Lesson 2: Accessing Help on page 14
There are 3 Forcepoint Security Manager modules: Web, Data, and Email. Each contains configuration settings,
policy management features, and reporting options for a security solution. Administrators can be granted access
to one or more of the modules, and be given specific permissions within each module.
Navigation Tips | 9
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
The default administrative account for the Security Manager is admin. The initial password for this account is
set during installation. The admin account has full access to all security modules. In the Forcepoint Web Security
module, full access is equivalent to unconditional Super Administrator permissions.
If you are logged on as a delegated administrator with more limited permissions, some features (indicated below)
may not be visible.
The Web Security module of the Security Manager is divided into 4 main areas:
Section 1: The Security Manager toolbar (banner) and Web Security toolbar:
The features that you see when you log on to the Web Security module of the Security Manager are dependent
on your administrative role.
The v8.5 Security Manager toolbar displays the user name for the account used to log on. If your organization
does not use delegated administration, the account name is always admin, and has full access to all
management functions.
The toolbar also includes a Log Off button, for when you’re ready to end the session.
The Security Manager toolbar contains a tab for each security module. The current module is highlighted. The
toolbar also includes the following icons:
■ Appliances, used to view a list of appliances in your network.
■ GLobal Settings, used to perform configuration tasks that affect all of the installed modules, like creating
administrator accounts.
■ Help, used to access context-sensitive instructions and troubleshooting materials, tutorials, and online
Support tools. More information is available in Lesson 2: Accessing Help.
Navigation Tips | 10
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
The Web Security toolbar provides information and access to features that apply to all pages in the Web Security
module of the Security Manager:
■ The current Policy Server IP address.
When you open the Web Security module of the Security Manager, you connect to a component called Policy
Server. By connecting to a specific Policy Server, you determine which segment of your deployment to
manage.
■ Your current delegated administration Role.
When delegated administration roles are defined, administrators who manage multiple roles can use this list to
change between roles. Super Administrators can use the list to switch to any role that has been defined.
■ A View Pending Changes button that is enabled when changes have been cached, but not changed.
Use this button to review a summary of cached changes before saving them, or to discard all pending
changes.
■ A Save and Deploy button, whose color indicates whether there are cached changes waiting to be saved
Each time you perform a task, and then click OK, your changes are cached. You must click Save and Deploy
to save and implement the changes.
Section 2: The left navigation pane:
The left navigation pane is grouped into 2 sections: Main and Settings.
Navigation Tips | 11
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
■ The options under Main provide access to system status information, reporting functions, and policy
configuration and management tools. The options are available to all administrative users, but some
navigation links are hidden for conditional Super Administrators and delegated administrators.
■ The options under Settings provide access to account management functions, as well as global and local
system administration tasks. The entire Settings group is hidden from some administrators. For others, it
offers different options based on the administrator’s permissions.
A small icon is associated with each of the options. Hover the mouse over an icon or option to display a menu of
features in that group.
Section 3: The right shortcut pane:
Navigation Tips | 12
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
Expand the right shortcut pane by clicking the left arrow icon (<<) at the upper right of the content pane. Minimize
it by clicking the right arrow icon (>>) at the top of the pane.
The default admin account and unconditional Super Administrators can use all of the tools in the right shortcut
pane. For other administrators, some options may be hidden.
■ Find Answers provides links to relevant information to help you complete your management tasks.
■ Top Picks provides links to articles, papers, worksheets, videos, and webinars.
■ Search lets you locate additional articles, forum posts, videos, and other content on the eSupport website.
■ The Toolbox contains quick lookup tools that you can use to verify your configuration.
■ Click URL Category to quickly determine how a URL is categorized.
■ Click Check Policy to find out which policy is currently being applied to a user.
■ Click Test Filtering to see how a specific URL is currently being handled (permitted, blocked, etc.) for a
user.
■ Click URL Access to create an investigative report showing whether a site has been accessed from your
network within the past 14 days.
■ Click Investigate User to create an investigative report showing which sites a user has visited in the past
14 days.
Section 4: The content pane:
The content pane appears in the middle of the Security Manager. When you connect to the Web Security module,
the Threats dashboard appears in the content pane, showing information about advanced malware threat activity
detected in your network.
When you click a link in the left navigation pane or the right shortcut pane, the content pane changes to display
options appropriate to your selection.
Most of the remaining lessons in this quick start tutorial demonstrate how to use options in the content pane.
Navigation Tips | 13
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
Related reference
Lesson 2: Accessing Help on page 14
To help you get the most from your web protection software, the Forcepoint Security Manager includes several
types of user assistance:
You have completed the Navigation Tips section of this quick start tutorial. Continue with Initial Setup.
Related information
Initial Setup on page 15
Navigation Tips | 14
Chapter 3
Initial Setup
Contents
■ Introduction on page 15
■ Lesson 3: Downloading the Forcepoint URL Database on page 15
Introduction
This section includes 1 lesson:
Lesson 3: Downloading the Forcepoint URL Database explains the role of the Forcepoint URL Database in policy
enforcement, and provides instructions for configuring and initiating database downloads.
If you have already downloaded the Forcepoint URL Database, and set up a download schedule, you can skip
this lesson.
When you are finished with this section, continue with Policy Management.
Related concepts
Lesson 3: Downloading the Forcepoint URL Database on page 15
Related information
Policy Management on page 19
Before this tutorial can be completed, an administrator must enter the subscription key used to activate your web
protection software. Entering a subscription key:
1) Activates a partial version of the Forcepoint URL Database installed with your product.
Initial Setup | 15
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
3) Initiates the download of the Forcepoint URL Database, which contains the category and protocol definitions
that provide the foundation for policy enforcement.
Exercise 1: Enter your subscription key and configure database download settings:
2) If the subscription key has not been entered, the Initial Setup Checklist prompts you to enter the key:
a) Enter any required proxy settings (if the machine running Filtering Service must go through a proxy to
connect to the Internet).
If Filtering Service is able to connect to the Internet and validate the key, a success message is displayed
and the database download begins.
3) Click Settings on the left navigation pane, and then go to the Account page (selected by default when you
select Settings). Information about your subscription appears near the top of the page.
Complete subscription information is not displayed until the first database download is complete.
4) Click Settings > Database Download in the left navigation pane. Forcepoint URL Database configuration
information appears in the content pane.
5) Use the Download days check boxes and Download timeframe drop-down lists to establish a schedule for
downloading the Forcepoint URL Database.
By default, your web protection software is configured to attempt a download every day, some time between
9:00 p.m. and 6:00 a.m. Daily downloads ensure that you are always using current information for policy
enforcement. Database downloads should occur at least once a week.
Note
If you do not download the Forcepoint URL Database for 14 days, policy enforcement stops.
If no download days are selected on the Database Download page, your web protection
software attempts to download the database every 7 days.
6) If your network requires authentication to a proxy server or firewall, do the following. Otherwise, skip to step
7.
a) In the Authentication area at the bottom of the screen, check Use Authentication.
b) Enter the User name and Password required by the proxy server or firewall.
You may also need to configure the proxy server or firewall to accept clear text or basic authentication.
7) If your network requires that browsers use an upstream proxy server to reach the Internet, do the following.
Otherwise, skip to step 8.
a) In the Proxy Server area, check Use proxy server or firewall.
b) Enter the name or IP address of the proxy server or firewall machine in the Server IP or name field.
c) Use the Port field to enter the port used by the proxy server or firewall (the default is 8080).
Initial Setup | 16
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
8) Click OK to cache your settings, and then click Save and Deploy in the toolbar to implement them.
After you enter a subscription key, the Forcepoint URL Database begins to download in the background.
Exercise 2: Verify Forcepoint URL Database download status
To view database download status, or to manually initiate a download at any time:
1) In the Main section of the left navigation pane, select Status > Dashboard.
3) Click Database Download (in the toolbar at the top of the page) for detailed download information.
■ By default, the Database Download page displays a summary of all Filtering Service machines, listing the
Forcepoint URL Database version currently in use on each, as well as the status of the last download.
■ You can manually initiate a database download from this page by clicking the Update button for a
Filtering Service instance. If a download attempt is in progress, the button is disabled.
4) Click a Filtering Service IP address in the list on the left to see detailed download information, including
progress information for ongoing downloads.
5) Click Close to return to the Dashboard page. Closing the Database Download page does not interfere with
any updates that may be in progress.
Important
If you have the Forcepoint Web Security Hybrid Module, after your first successful Forcepoint URL
Database download is complete, log off of the Security Manager and log back on. This allows
several hybrid-specific pages to be displayed.
When a database update adds or removes pre-defined categories and protocols, you must log off of the Security
Manager and log on again to see the updated category and protocol lists. This protective measure ensures that
database updates do not interfere with any policy updates that administrators may be making.
A database update that adds or removes categories and protocols is likely to occur:
■ When you first enter your subscription key and download the Forcepoint URL Database.
■ After you have moved from Forcepoint URL Filtering to Forcepoint Web Security.
Typically, category and protocol additions or removals are rare, and generally publicized several weeks before
the update takes place. If you have configured your web protection software to notify administrators of systems
alerts, you will also receive notification when new categories and protocols have been added or removed.
You have completed the Initial Setup section of this quick start tutorial. Continue with Policy Management.
Related information
Policy Management on page 19
Initial Setup | 17
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
Initial Setup | 18
Chapter 4
Policy Management
Contents
■ Introduction on page 19
■ Lesson 4: The Default policy on page 20
■ Lesson 5: Working with clients on page 21
■ Lesson 6: Using the sample policies on page 22
■ Lesson 7: Managing URLs by category on page 24
■ Lesson 8: Creating custom policies on page 25
■ Lesson 9: Managing URLs with exceptions on page 27
Introduction
This section includes 6 lessons:
■ Lesson 4: The Default policy introduces the policy that acts as a safety net, governing Internet access for any
client not explicitly assigned another policy.
■ Lesson 5: Working with clients describes how to add users, groups, and computers as clients for use in
applying policies.
■ Lesson 6: Using the sample policies reviews the pre-defined policies included with your web protection
software, and takes you through the process of editing policies.
■ Lesson 7: Managing URLs by category introduces the concept of category filters and guides you through the
process of creating your own, custom filters.
■ Lesson 8: Creating custom policies shows how you can build your own policies and apply them to clients.
■ Lesson 9: Managing URLs with exceptions explains how to create exceptions that permit one or more specific
URLs for clients that you select.
Related concepts
Lesson 4: The Default policy on page 20
Lesson 5: Working with clients on page 21
Lesson 6: Using the sample policies on page 22
Lesson 7: Managing URLs by category on page 24
Lesson 8: Creating custom policies on page 25
Lesson 9: Managing URLs with exceptions on page 27
Policy Management | 19
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
Your web protection software uses policies to determine how and when Internet requests are handled for users
and devices. Each policy includes information about which websites, Internet communication protocols, and cloud
applications are blocked or permitted, and the days and times to enforce those rules.
As a safety net, the Default policy is in effect 24 hours a day, 7 days a week. This policy is used to handle
requests whenever no other policy applies. Initially, the Default policy monitors requests without blocking.
Note
If your organization uses delegated administration, each role has its own Default policy. A role’s
Default policy is enforced for any clients in the role who do not have another policy assigned to
them.
1) In the Forcepoint Web Security module of the Forcepoint Security Manager, use the left navigation pane to
select Main > Policy Management > Policies.
A list of existing policies appears in the content pane.
Policy Management | 20
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
A cloud app filter provides a way to explicitly block or permit a specific list of cloud applications or to
block any applications that are considered high risk.
5) Three tabs appear beneath the policy schedule. Examine the Category Filter tab.
■ The name of the current category filter appears next to the column description.
■ You can scroll through the list to see which categories are permitted and blocked. A legend at the bottom
of the page explains the icons that appear next to each category.
You will learn how to create and edit category filters in a later lesson.
In the lessons that follow, you will learn how to work with policies and their building blocks. You can then use what
you learn to edit the Default policy to best suit the needs of your organization.
Internet access policies are applied to clients: users, groups, and OUs in your directory service, or computers and
network ranges in your network.
■ A computer is the most basic type of client. A computer is a machine on the network, identified by an IP
address.
■ A network is a group of computers, identified by a contiguous IP address range.
■ A directory client can be a user, group, or OU (organizational unit) defined in your directory service. More
information about directory services can be found in the “Clients” section of the Administrator Help.
Exercise 1: Add a computer client
1) Use the left navigation pane to go to the Main > Policy Management > Clients page.
2) Under the Clients tree, click Add. The Add Clients page appears.
3) Enter the IP address of a computer that you want to add as a client, and then click the right arrow (>) button
to add the client to the Selected list.
If you are a delegated administrator, you can only add IP addresses that are assigned to your role as a
managed client. Go to the Policy Management > Delegated Administration page, and then click your role
name to see a list of managed clients for your role.
5) Expand the Computers node in the Clients tree. The IP address that you just added appears in the list.
Information about the settings that apply to the new client appear to the right of the IP address. The Policy
column shows that this client is currently governed by the Default policy.
Policy Management | 21
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
Information about configuring your web protection software to communicate with a directory service can be found
in the “Clients” section of the Administrator Help.
Once configuration is complete, you can add directory clients through the same page used to add computer and
network clients:
1) On the Policy Management > Clients page, under the Clients tree, click Add. The Add Clients page
appears.
3) Select a user, group, or domain to add as a client, and then click the right arrow (>) to add the client to the
Selected list.
If you are a delegated administrator, you can only add users that are assigned to your role as a managed
client. Go to the Policy Management > Delegated Administration page, and then click your role name to
see a list of managed clients for your role.
4) When you are finished adding users, click OK to cache your changes and return to the Clients page.
Expand the Directory node of the client tree to see a list of current user, group, domain, and OU clients.
In the next lesson, you will work with a sample policy to change the way that clients’ Internet activity is managed.
In addition to the Default policy, your web protection software includes two sample policies that you can use to
learn more about managing Internet activity.
■ The Unrestricted policy enforces the Permit All category and protocol filters, 24 hours a day and 7 days a
week. Apply this policy to any members of your organization whose Internet activity should never be restricted.
■ The Example - Standard User policy provides an example of how one policy can apply different filters at
different times.
Note
If you are a delegated administrator and do not see the Example - Standard User policy, ask a
Super Administrator to copy the sample policy to your role.
Policy Management | 22
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
3) Under the policy name and description at the top of the page, check to see if the policy is applied to any
Clients.
When you make changes to a policy, any clients governed by the policy are affected.
5) Select each time block in turn. The filters enforced during that period are displayed on the corresponding
tabs.
When a time block is selected, you can edit the filters enforced during that period on the Edit Policies page.
6) To assign the sample policy to a client, click Apply to Clients in the toolbar at the top of the screen.
7) Browse the Clients tree to identify a client to be governed by the sample policy. Pick a client added in
Lesson 6 that you can use to test the effects of this change.
8) Mark the check box next to the client name or IP address, and then click OK to cache your change and
return to the Edit Policy page.
9) Click OK on the Edit Policy page and then click Save and Deploy to implement your change.
The selected client now receives the Example - Standard User policy.
Exercise 2: Verify policy enforcement behavior manually
One way to judge the effects of applying a policy to a client is to access the client machine or log on using the
client’s network credentials and use a browser to see which sites are permitted and blocked.
Important
Before performing this lesson, make sure that the Forcepoint URL Database has finished
downloading. Go to the Status > Dashboard page, then click Database Download in the toolbar at
the top of the content pane. Verify that the download status is Successfully updated.
You may need to log off of the Forcepoint Security Manager and log on again to allow the new
database to finish loading.
1) If you applied the sample policy to a computer client in the previous exercise, log on to that client machine.
If you applied the sample policy to a user or group client, log on as the affected user.
3) Browse to www.calottery.com.
Policy Management | 23
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
This site belongs to the Gambling category. Both the Basic and Default category filters block this category. If
you are performing this exercise on any day from Monday through Friday, a block page appears.
4) Browse to www.amazon.com.
This site belongs to the Shopping category. If the Default category filter is in effect, you are prompted to use
quota time to access the site. (More information about quota time appears in the next lesson.) If the Basic
category filter is in effect, the site is permitted.
When you are finished exploring which sites are blocked and permitted by the sample policy, return to the
Forcepoint Security Manager.
Exercise 3: Use the Test Filtering tool to verify policy enforcement behavior:
The Security Manager includes tools to help you see how client requests are handled without logging on as the
user or accessing the Internet from a specific machine.
■ Make sure that the right policy is being applied.
■ Verify that the active policy is blocking and permitting sites as expected.
To see whether a client requesting a specific site would be permitted access:
1) Click Test Filtering in the Toolbox section of the right navigation pane.
2) To identify the client to whom you have applied the Example - Standard User policy, do one of the following:
■ Enter the IP address of a computer client.
■ Enter the full distinguished name of a directory client in the User field, or click Find User to browse
or search the directory. The search feature is available only if you are using an LDAP-based directory
service.
4) Click Go.
A pop-up window shows the name and description of the website’s category, the action applied to the site, and
the reason for that action.
In the sections that follow, you will learn how to create custom category filters and then to create custom policies
to manage client Internet requests.
Category filters determine how user requests for HTTP, HTTPS, FTP, and Gopher sites are treated.
Each website is identified by a unique IP address or URL. The Forcepoint URL Database assigns these
addresses to categories, such as Adult Material, Education, or Spyware.
Within a category filter, an action, such as Permit or Block, is assigned to each category. Every site within the
category is managed according to the action that you assign.
Your software includes several category filters and templates to help you get started. You can edit the filters to
suit the needs of your organization, but the templates cannot be changed. When you create a new filter, you can
base it on either a template or an existing category filter.
Policy Management | 24
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
To understand how category filters work, imagine that certain users in your organization should only have access
to websites affiliated with educational institutions. Complete the following exercises to create a filter for these
users.
Exercise 1: Create an Education-Only category filter
2) In the Category Filters box, click Add. The Add Category Filter page appears.
4) Create a description for the filter (for example, “For student research assistants, permits access only to sites
in the Education category”).
5) Select the Block All template to use as the foundation for the new filter.
6) Click OK to cache changes and open the Edit Category Filter page. The new filter name appears at the top
of the page.
1) Select Education in the Categories tree, and then click Permit. The Permit button appears to the right of the
Categories tree.
2) Expand the Education node. Note that the Education subcategories are still blocked.
3) With the Education parent category still selected, click Apply to Subcategories. All of the Education
subcategories (Cultural Institutions, Educational Institutions, and so on) are permitted.
Once you have created custom category filters, you can add them to policies and apply them to clients.
Create new policies to add flexibility in managing employee Internet access. Rather than trying to make the
Default policy apply to everyone, create custom policies for different groups of clients.
Exercise 1: Start from an existing policy to create a new policy
2) Under the list of existing policies, click Add. The Add Policy page appears.
Policy Management | 25
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
4) Provide a brief description for the new policy (for example, “For student research assistants, enforces the
Education-Only category filter”).
5) Mark the Base on existing policy check box, and then select the Default policy from the drop-down list.
1) On the Edit Policy page, under Schedule, expand the Days drop-down list, and then deselect Sat and Sun.
This policy will only apply Monday through Friday. You can add multiple rows to the schedule to have a policy
apply different filters on different days or at different times.
2) Expand the Category / Limited Access Filter drop-down list, and then select the Education-Only category
filter.
3) Expand the Protocol Filters drop-down list, and then select the Default protocol filter.
Protocol filters are used to filter non-HTTP Internet protocols, such as those used for instant messaging or
streaming media. For more information, see the Administrator Help.
4) Expand the Cloud App Filters drop-down list, and then select the Basic Security cloud app filter.
Cloud app filters are used to permit or block access to cloud applications. See the Administrator Help for
more information.
5) At the bottom of the Schedule box, click Add to add another row to the schedule. A default time period
appears in the Start and End columns.
6) Expand the Days drop-down list, and select only Sat and Sun.
2) Expand the appropriate node in the client tree, and then do one of the following:
■ Mark the check box next to the client name or IP address, and then click Edit.
■ Click the client name or IP address.
The Edit Client page appears.
Policy Management | 26
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
3) Under Policy, expand the Name drop-down list and select Research Assistants.
Exercise 4: Verify that the new policy is being applied to the client:
You can also use the Test Filtering tool (as explained in Lesson 6, Exercise 3) to verify that the policy is being
applied correctly.
If you need to block a specific website in a permitted category (for example, because of misuse), you can create
an exception to block just that URL, while continuing to permit the category in your policies.
Both Super Administrators and delegated administrators with appropriate permissions can create exceptions.
■ By default, exceptions created by Super Administrators take precedence over delegated administrator
exceptions.
■ When Super Administrators create an exception, they can specify whether to allow delegated administrator
exceptions to take priority over that exception.
See the Administrator Help for details about exception precedence.
Exercise: Create an exception to block or grant access to a URL
3) On the Add Exception page, enter a unique, meaningful Name to identify the exception.
4) Click in the URLs box, then type in the URL that you want to block or permit (for example, blogger.com).
Policy Management | 27
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
If you create an exception for more than one URL, enter each URL on a separate line.
5) To identify which clients the exception applies to, select an option appropriate to your administrative role.
Super Administrators can select:
■ Global, meaning all clients in all roles
■ All clients in a role, then select a role from the drop-down list
■ Specific clients in any role, then select, search, or browse to identify users, groups, OUs, or IP
addresses.
Delegated administrators can select:
■ All managed clients in this role
■ Specific clients in this role, then select, search, or browse to identify users, groups, OUs, or IP addresses
assigned to their role.
6) By default, the exception Type is Block. Accept this option, or select Permit to grant access to the specified
site for the clients you selected.
7) By default, the exception is set to Never expire. If you instead select the After radio button next to Expires,
you are given the option to enter an expiration date.
After an exception expires, it is no longer applied to client requests. It remains in the list on the Exceptions
page, however, until you delete it. This gives you the option to reactivate an exception by changing its
expiration date.
8) By default, the exception State is set to Active, meaning that it will start being applied to requests as soon as
you cache and save your changes.
If you are not ready to use the exception, clear the check box.
9) Click OK to cache your changes and return to the Exceptions page, then click Save and Deploy to
implement your changes.
You have completed the Policy Management section of this quick start tutorial. If you have reporting permissions,
continue with Reporting.
If you do not have reporting permissions, see Where Do I Go Next? for additional resources.
Related information
Reporting on page 29
Where Do I Go Next? on page 45
Policy Management | 28
Chapter 5
Reporting
Contents
■ Introduction on page 29
■ Lesson 10: Dashboard reports on page 30
■ Lesson 11: Presentation Reports on page 34
■ Lesson 12: Investigative Reports on page 36
■ Lesson 13: Real-Time Monitor on page 41
■ Lesson 14: Improving web protection software on page 43
Introduction
Before you can view charts on the Status > Dashboard page, or generate investigative or presentation reports,
an essential, Windows-only reporting component—Log Server—must be installed. If Log Server is not installed,
skip to Lesson 13: Real-Time Monitor.
Real-Time Monitor gathers its information from another component, Usage Monitor, that is typically installed
with Policy Server. If you have administrative access to Real- Time Monitor, Lesson 13 applies even when other
reporting components are not installed.
This section includes 5 lessons:
■ Lesson 10: Dashboard reports introduces the Status > Dashboard, used to monitor threat activity, security
risks, general usage, and system status for your deployment.
■ Lesson 11: Presentation Reports shows you how to generate pre-defined reports and copy those reports to
apply customized data selection filters, as well as how to set up a scheduled report job.
■ Lesson 12: Investigative Reports shows you how to view log data interactively, identifying a topic of interest
and drilling down to find greater detail. You will also learn how to generate and schedule reports.
■ Lesson 13: Real-Time Monitor describes how to monitor current Internet activity in your network. This includes
information about customizing your view of current traffic to show only specific clients, sites, and so on.
■ Lesson 14: Improving web protection software explains how to implement features that let your software send
specific types of feedback to Forcepoint.
In networks that use delegated administration, Super Administrators control who can access these features.
Related concepts
Lesson 11: Presentation Reports on page 34
Lesson 12: Investigative Reports on page 36
Lesson 13: Real-Time Monitor on page 41
Lesson 14: Improving web protection software on page 43
Reporting | 29
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
Related reference
Lesson 10: Dashboard reports on page 30
The charts and information areas on the tabs of the Status > Dashboard page offer a quick, graphical overview
of current and recent system status and Internet activity.
Each dashboard tab displays a set of default charts, counters, and informational summaries.
■ Elements can be added to or removed from the Risks, Usage, and System dashboards.
■ Up to 12 elements can be displayed on each of these dashboards.
■ When you click most charts and counters on these dashboards, an investigative report with more details is
displayed.
■ On all dashboards, many of the charts can be configured to include different time periods, show different sets
of information (top 5, top 6-10, and so on), display in different formats (stacked area chart, bar chart, multi-
series line chart, and so on).
Other configuration options may be available, depending on the dashboard and element selected.
■ Dashboard information is updated every 2 minutes.
In organizations that use delegated administration, the Super Administrator controls who can view charts on the
dashboard. Access to the Threats dashboard is configured separately from access to the Risks, Usage, and
System dashboards.
By default, the Forcepoint Security Manager times out after 22 minutes of inactivity. You must log on again to
view dashboard updates, or to work in other pages.
Section 1: The Threats dashboard
Use the Threats dashboard to review information about suspicious activity in your network. This type of activity is
often associated with advanced malware threats.
■ You cannot add elements to, nor remove elements from, the Threats tab.
■ Clicking a chart on the Threats dashboard modifies the information shown in the summary table at the bottom
of the page. It does not open an investigative report.
The Threats dashboard includes the following:
Top Security Destinations Maps the countries associated with suspicious activity
in your network. These may be countries hosting sites
in threat- related categories, or countries to which
malicious software in your network is attempting to
send data.
By default, the top 5 countries are shown.
Click a highlighted country to show only traffic to that
destination in the Suspicious Event Summary.
Reporting | 30
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
Severity Events by Type Charts the number of blocked requests for URLs in
threat- related categories.
By default, the top 5 most-requested categories are
shown.
Click a category in the chart to show only requests for
that category in the Suspicious Event Summary.
Suspicious Event Summary Provides severity, user, machine, category, time, and
direction information for Internet activity that may be
related to an advanced malware threat.
Click a severity, user name, IP address, or device
name (provided by Content Gateway; not available
in Forcepoint URL Filtering deployments) to open an
Event Details page with more information about activity
of the selected type.
Filters at the top of the Threats dashboard can be used to limit the data shown on the page to a specific time
period, severity level, or action (permitted or blocked).
The Suspicious Event Summary includes a Search box that can be used to further filter the data shown in the
table.
Section 2: The Risks dashboard
Use the Risks dashboard to monitor permitted and blocked requests for URLs in the Security Risk class. By
default, the following elements are displayed:
30-Day Risk Trends Shows blocked request trends for specific security
and legal liability categories. Click a spark line to
open the Threats dashboard or an investigative report
(depending on category) with more information.
Clients with Security Risks Shows which computers have been used to access
Security Risk sites. You may want to check these
machines to make sure they are not infected with any
viruses or spyware.
Top Security Risk Categories Shows which Security Risk categories have received
the most requests.
Security Risk is a risk class: a grouping of categories
with similar characteristics. Security Risk categories
include Phishing, Spyware, and Hacking, among
others.
Risk Classes Shows how many requests to each risk class (Security
Risk, Legal Liability, Productivity, Business Usage,
Network Bandwidth Loss) have been permitted and
blocked.
Reporting | 31
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
Analytics: Security Risks (Forcepoint Web Security only) Shows how many
requests were assigned to new categories by Content
Gateway analysis because the content had been
changed or the site was compromised.
Top Blocked Users Shows which users have requested the most blocked
URLs.
Top Requested Categories Shows the categories that are being accessed most
to provide a high-level overview of potential security,
bandwidth, or productivity concerns.
Web 2.0 Categories (Forcepoint Web Security only) Shows the top
categories assigned to requested Web 2.0 URLs,
measured by requests.
Web 2.0 URL (Forcepoint Web Security only) Shows the Web 2.0
URLs using the most bandwidth.
Bandwidth
Analytics: Top Categories (Forcepoint Web Security only) Shows the top
categories to which requested URLs were assigned
after Content Gateway analysis determined that they
no longer fit their original category
Health Alert Summary Provides brief status or error messages for system
components. Click a message to view a more detailed
alert and find solutions.
User Activity: Zoom Trend Shows the volume of Internet requests processed into
the Log Database. The unit of measurement depends
on the period shown in the chart. By default, activity is
shown in 3 hour and 30 minute intervals.
Protocol Bandwidth Use Shows which protocols (like HTTP, SMTP, BitTorrent,
or Spotify) are using the most bandwidth.
Filtering Service Status Lists the status of each Filtering Service associated
with the current Policy Server
Reporting | 32
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
Hybrid Bandwidth Summary (Forcepoint Web Security only; requires the Forcepoint
Web Security Hybrid Module) Shows the bandwidth
consumed by Internet requests from users whose
requests are managed by the hybrid service
1) Navigate to the Risks, Usage, or System tab of the dashboard, then click Add Chart in the toolbar at the top
of the page.
The customize page lists the available dashboard elements. A blue circle marks the charts and other
elements (counters, summaries) that currently appear on the selected tab.
There are 2 charts listed that do not appear by default on any tab:
■ 30-Day Value Estimates gives estimates of time and bandwidth savings afforded by your web protection
software over a 30-day period that includes today.
■ Activity Today provides examples of how your software has protected your network, the total number
of requests handled so far today, the number of requests blocked, and the number of real-time database
updates processed.
2) Select a tab from the Add elements to tab drop down list.
3) Select an element (chart, counter, summary) from the Dashboard Elements list.
■ Each tab can show a maximum of 12 elements.
■ Elements currently displayed on the selected tab are marked by a blue circle icon.
■ You can add multiple copies of the same element to a tab (for example, each might show a different time
period).
4) The selected element appears in the Preview pane. Optionally update the chart Name, then update any of
the following that are available:
■ Chart type: Many charts can be displayed as a multi-series bar, column, or line chart, or as a stacked
area or column chart. Some can be displayed as bar, line, or pie charts. Which types are available
depends on the data being displayed.
■ Time period: Most charts can display a variable time period from Today (the 24-hour period beginning at
midnight of the current day) to 30 days or longer (as configured by a Super Administrator on the Settings
> Reporting > Dashboard page).
■ Top: Charts displaying information about the top users, categories, URLs, and so on can typically display
up to 5 values. Select whether to show the top 5 values, 6-10 values, 11-15 values, or 16-20 values.
For some elements, only the name can be customized.
Reporting | 33
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
Presentation reports offer a view into the Internet activity data stored in the Log Database. Pre-defined charts and
tabular reports, called templates, make it easy to generate a consistent presentation of data on a particular topic,
such as the categories that have been blocked the most during a particular time frame.
In networks that use delegated administration, Super Administrators control who has access to these features.
Exercise 1: Generate a pre-defined report
1) In the Forcepoint Web Security module of the Forcepoint Security Manager, go to the Main > Reporting >
Presentation Reports page.
2) In the Report Catalog tree, expand the Internet Activity heading, and select the Top Sites Visited report.
Immediately after installation, only pre-defined reports and templates appear in the tree. If the software has
been in use for some time, the tree may also include:
■ Favorite reports (marked with a star)
■ Custom reports
Field Description
Start date End date Leave the default dates, which define a report
covering the current day’s activities.
5) Deselect Schedule the report to run in the background. The report will be generated in a pop-up window
in the foreground.
Tip
It is usually most efficient to run reports in the background. You can opt to receive email
notification when the report is complete, and use the Presentation Reports > Review Reports
page to access the report.
6) Click Run.
The report will display in the content pane.
1) On the Presentation Reports page, expand the Internet Activity node in the Report Catalog, then select the
Top Sites Visited report.
Reporting | 34
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
3) On the Save As New Report page, change the Report catalog name to New Top 5 Sites Visited.
4) Click Save and Edit to display the Edit Report page, where you can customize the elements of the report.
5) Accept the default (all items reported), and click Next to move through the Clients, Categories, and Protocols
tabs.
When generating future reports, you can use these tabs to fine-tune the content of the report.
6) On the Actions tab, expand the Permitted node in the tree and mark all of the permitted actions, then click
the right arrow (>) to move them to the Selected list. When you are finished, click Next.
This limits the report to only URLs that clients were able to access, omitting blocked sites.
7) On the Options tab, change the Show only top setting to 5 to have the report show only the top 5 sites
visited. Then, click Next.
8) On the Confirm tab, select Save and run, and then click Finish.
9) On the Run Report page, set the Output format to HTML, deselect Schedule the report to run in the
background, and then click Run.
Your web protection software gathers the appropriate records from the Log Database, and displays the report
in the content pane.
The changes you made in the report filter are saved with the new report, and the new report name is listed
in the Report Catalog on the Presentation Reports page. Any time you choose this report to run, it uses the
filter you defined. You can also edit the filter later.
3) Enter the IP address or name of the email server that will distribute scheduled reports to their email
recipients in the SMTP server IP or name field.
3) Use the Schedule Report tab to set the following options. Then, click Next.
■ Job name: Test
Reporting | 35
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
4) On the Select Reports tab, select the New Top 5 Sites Visited report and click the right arrow (>) to move it
to the Selected list. Click Next.
5) On the Date Range tab, select Relative Dates from the drop-down list, and then select Last 2 and Day(s).
Click Next.
Investigative reports let you interact directly with the Internet activity data stored in the Log Database. Initially, a
bar chart showing today’s activity by risk class is displayed. Investigate areas of concern by clicking appropriate
chart elements to drill down for greater detail or by using the search feature.
■ Make a few selections to view multiple levels of information, such as the top 5 users in the top 5 categories.
■ A separate detail view gives you a tabular report of related information. You can customize the columns
displayed, and create a summary view of this table.
■ See Investigative reports reference, for more information about what can be displayed in investigative reports.
In networks that use delegated administration, Super Administrators control who has access to these features.
Exercise 1: Use search to locate specific data
To generate reports on specific URL hosts, destination IP addresses, users, groups, source IP addresses,
address ranges, or ports, you can start by performing a search.
1) On the Main > Reporting > Investigative Reports page, open the Search for drop-down list and select one
of the following options.
■ To identify a user by name, select User. (User Service must be installed.)
■ To identify a machine by its IP address, select Source IP.
2) Enter all or part of a user name or IP address (depending on which option you entered in step 1), then click
the right arrow button.
Reporting | 36
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
3) A new report showing activity specific to the user or IP you entered is displayed.
1) On the Reporting > Investigative Reports page, expand the Internet Use by list and select Risk Class.
2) In the resulting summary report, click Security Risk to display a list of drill-down options.
If there is no Security Risk entry, clients in your network have not requested any sites in that risk class. In
that case, select another risk class.
3) Select by User from the list of options to generate a new report showing each users activity in all categories
assigned to the Security Risk class.
If you are not using User Service, this list shows the source IP addresses for the requests.
4) Click a user name or IP address, then select by URL Hostname. A new report is generated, showing the
Security Risk URLs requested by the selected client.
Note that you can change the report time period using the View drop down list or the View from date fields. You
can also change the measurement used to quantify activity by selecting a new option from the Measure drop-
down list in the toolbar near the top of the content pane.
Exercise 3: Creating a multi-level report
Starting with a report on the main Investigative Reports page, you can define a second level of information to
display. This allows you, for example, to compare the most active users in one category with the most active
users in another category.
You can create a multi-level report with different combinations of data. Simply modify the bar chart to show the
high-level data of interest, then define the second level as described above.
Exercise 4: Using flexible detail reports
Flexible detail reports give a tabular view of data related to a specific area of interest. You can change to a
summary view of the same data, and change the information columns displayed.
1) On the main Investigative Reports page, select User from the Internet Use by list.
2) Click the bar or number for any user that shows a significant number of hits.
A detail view appears, showing a tabular report of today’s traffic for the selected user. The default report
includes columns for Day, Time, URL Hostname, Category, and Hits.
Reporting | 37
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
3) Click Modify Report in the toolbar at the top of the content pane.
4) Use the controls in this dialog box to remove the Time column, and add Action as a column, between Date
and URL Hostname.
You can choose up to 7 columns in this dialog box. Be sure to choose columns that are appropriate for the
data being reported, or the column will be blank.
Notice that although the report shows hits, Hits does not appear as an entry in the list. Reports based on hits
must include Hits as the rightmost column.
5) Click Submit to close the dialog box and update the report.
The new columns are now displayed, in the order you specified.
The Summary report option is available only when the Time column is not displayed. It combines rows that share
a common element. The combined element varies according to the information in the report. In this example, it
combines those with the same URL hostname.
Exercise 5: Saving and scheduling Favorites
Favorites are report definitions that you want to reproduce easily, and may want to schedule on a repeating cycle.
You can save reports shown on the main Investigative Reports page, or the flexible detail view.
3) On the Favorite Reports page, a file name is suggested for the report. Accept that name or enter a different
file name, if desired.
Only letters, numbers, and underscore characters (_) are permitted in the file name.
5) Select the added report in the list, and then click Schedule to run the report on a repeating cycle.
7) Click Next after all entries are complete to display a confirmation screen showing your selections.
8) Click Save to save the scheduled report job and display a list of all scheduled reports.
The job will run according to the schedule you set, and email the report to the selected recipients. At any time,
you can review the list of scheduled jobs, edit a job definition, or delete an obsolete job by clicking Job Queue on
the main Investigative Reports page.
If you are a reporting administrator in an investigative reporting role, you have completed the tutorial. See Where
Do I Go Next?, for additional resources.
If you have Real-Time Monitor permissions, continue with Lesson 13: Real-Time Monitor.
Reporting | 38
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
Related concepts
Lesson 13: Real-Time Monitor on page 41
Related reference
Investigative reports reference on page 39
Related information
Where Do I Go Next? on page 45
Risk Class Risk class associated with the category to which the
requested site belongs. If the category is in multiple
risk classes, all relevant risk classes are listed.
Directory Object Directory path for the user who made the request,
excluding the user name. Typically, this results in
multiple rows for the same traffic, because each user
belongs in multiple paths.
If you are using a non-LDAP directory service, this
column is not available.
Reporting | 39
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
Full URL Domain name and path for the requested site
(example: http://www.mydomain.com/products/
ref=abc123?string/). If you are not logging full URLs,
this column is blank.
Reporting | 40
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
Real-Time Monitor provides a simple view into current Internet activity in your network. You control how often the
data is refreshed and how much data is available at a time, and you can apply search filters to focus on specific
clients, URLs, or types of requests (blocked or permitted).
Unlike other reporting tools, Real-Time Monitor shows only current data.
■ The information comes directly from Usage Monitor, which tracks client activity to generate category and
protocol usage alerts.
■ Each record is captured by the Real-Time Monitor database for display. The database contains a limited
(configurable) number of records.
■ When the Real-Time Monitor database is full, each new record overwrites an older record. Older information is
no longer available in the monitor (though it is available in other reporting tools).
Real-Time Monitor shows activity for one Policy Server at a time. (Policy Server is a component responsible for
coordinating other components.)
The Forcepoint Security Manager also connects to one Policy Server at a time, and Real-Time Monitor connects
to that same Policy Server at launch. As long as Real- Time Monitor is displayed in the content pane, it changes
its Policy Server connection each time the Security Manager changes its connection.
When Real-Time Monitor is open in full screen mode, it remains connected to a single Policy Server, regardless
of whether the Security Manager connects to a different Policy Server.
Reporting | 41
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
■ The Policy Server IP address is displayed in the Real-Time Monitor title bar.
■ Multiple Real-Time Monitor instances can be run in full screen mode on the same machine, each connected to
a different Policy Server.
So if you are a network security administrator, you can monitor your entire deployment by opening a Real-Time
Monitor instance for each Policy Server deployed in your network.
Exercise 1: Real-Time Monitor basics
2) Click Start to populate the page with data. The page shows recent Internet requests, including:
■ The IP address or name of the user who made the request. If user-based policy enforcement is used in
your network, and the IP address is shown, mouse over an entry to see the user name.
■ The URL requested. If the URL is truncated, mouse over an entry to see the full URL.
■ Whether or not the requested site was recategorized as a result of Content Gateway analysis.
An icon indicates that analysis resulted in dynamic recategorization of the site; no icon indicates that the
Forcepoint URL Database or administrator- defined custom category was used. Mouse over the icon to
see the original category.
■ The Category assigned to the site. The actual category used to filter the request is shown, whether that is
the Forcepoint URL Database category, the custom URL category, or the category dynamically assigned
as a result of analysis.
■ The Action (permitted or blocked) applied to the request.
■ The Time the request was passed to Real-Time Monitor. Because Real-Time Monitor receives request
information from Usage Monitor in real time, rather than reading the request from the Log Database, the
request time shown here may not match the request time that appears in investigative and presentation
reports.
3) To review current data, click Pause to prevent the page from continuing to refresh. When you are ready to
start monitoring new information, click Start again.
Depending on your current settings, Real-Time Monitor holds a set number of records (250, 500, or 1000), and
always displays the latest set of available records. When you pause display of new records to review current
data, this can mean that the hundreds or thousands of requests that occur while the display is paused are never
displayed in the monitor. (The requests are, however, stored in the Log Database, and appear in investigative and
presentation reports.)
If you are a delegated administrator or reporting administrator, you have completed this tutorial. See Where Do I
Go Next? for pointers to possible next steps.
If you are a Super Administrator, continue with Lesson 14: Improving web protection software.
Related concepts
Lesson 14: Improving web protection software on page 43
Related information
Where Do I Go Next? on page 45
Reporting | 42
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
Your software includes two options that you can use to send feedback to Forcepoint:
■ Enable WebCatcher to send unrecognized and security-related URLs to be analyzed for liability and security
risks and categorized, if appropriate.
After they are categorized, these sites are added to the Forcepoint URL Database for use in policy
enforcement and reporting.
■ To help Forcepoint continue to enhance policy management capabilities, allow your web protection software to
gather category and protocol usage data.
WebCatcher
Before you begin
When WebCatcher sends unrecognized and security-related URLs to Forcepoint, subsequent
downloads of the Forcepoint URL Database include improvements and category revisions resulting
from WebCatcher data. Only Super Administrators can modify these settings.
Important
The information sent to Forcepoint contains only URLs. It does not include individual
user information.
The following type of information is sent when you activate WebCatcher. The IP address belongs to the
machine hosting the URL, not the requester.
<URL HREF="http://www.ack.com/uncategorized/" CATEGORY="153" IP_ADDR="200.102.53.105"
NUM_HITS="1" />
To enable WebCatcher:
Steps
1) Navigate to the Web > Settings > General > Account page in the Forcepoint Security Manager.
Reporting | 43
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
3) Click OK to cache your changes, and then click Save and Deploy to implement them.
Steps
1) Navigate to the Settings > General > Account page.
2) Mark or clear the Send category and protocol data to Forcepoint check box.
3) Click OK to cache your change, and then click Save and Deploy to implement it.
Next steps
You have completed this tutorial. See Where Do I Go Next? for pointers to possible next steps.
Related information
Where Do I Go Next? on page 45
Reporting | 44
Chapter 6
Where Do I Go Next?
Contents
■ Overview on page 45
Overview
You have completed the New Admin Quick Start tutorial. You have the basic tools you need to start working with
your web protection software.
There are a number of additional features that you can use to add even more precision and flexibility to your
deployment. These features are described in detail in the Administrator Help (accessible via the Help button in
the Forcepoint Security Manager toolbar).
For Super Administrators:
■ Configure Content Gateway analysis to provide security analysis for files and inbound and outbound content,
as well as tunneled protocol detection, real-time content categorization for dynamic content, and SSL
decryption.
Go to the Settings > Scanning > Scanning Options page.
■ Configure a variety of policy enforcement settings, including which policy to use when multiple group policies
could apply, default quota time allotments and quota session length, bandwidth enforcement thresholds, and
more.
Go to the Settings > General > Filtering page.
■ Enable alerting to ensure that administrators receive notification about potential problems with your
deployment, or with users’ Internet activity.
Go to the Settings > Alerts > Enable Alerts page.
■ Configure transparent identification agents and specify how users are identified for policy enforcement.
Go to the Settings > General > User Identification page.
■ Configure how much user-identifying information appears in reporting log records, and which categories are
logged.
Go to the Settings > General > Logging page.
For administrators with policy management permissions:
■ Create custom categories or recategorize individual sites (recategorized URLs).
Go to Policy Management > Filter Components and click Edit Categories.
■ Configure protocol filters for increased control over Internet protocols, like those used for instant messaging
and peer-to-peer file sharing.
Go to Policy Management > Filters and click a filter name, or click Add.
■ Configure cloud app filters to control the cloud applications that can be used by your clients.
Go to Policy Management > Filters and click Add in the Cloud App Filters section.
■ Define keywords to gain a higher level of control over which sites clients can access.
Go to Policy Management > Filter Components and click Edit Categories, then select a category.
Where Do I Go Next? | 45
Forcepoint Web Security On-prem v8.5.x | New Admin Quick Start
Where Do I Go Next? | 46
© 2023 Forcepoint