Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Defining Resources
Defining Resources
Administrator Help | Forcepoint DLP | Version 8.4.x
In a policy, administrators can define:
*
*
*
In Forcepoint DLP, these are cumulatively known as resources.
 
Important 
Select a resource type to define on the Main > Policy Management > Resources page in the Data Security module of the Forcepoint Security Manager. Resources are grouped into 3 general areas: General, Endpoint, and Remediation.
General resources
There are many possible sources (origins) and destinations of information in an organization. Define the following types of source and destination resources, then specify which to include and exclude in specific policies and rules.
*
User directory entries are users or groups that may be a source or destination of sensitive data. These entries are imported from your user directory.
*
Custom user directory groups are derived from custom LDAP queries, and may also send or receive sensitive data.
*
Custom users are not included in the user directory, but may be a source or destination of sensitive data.
*
Custom computers are not included in the user directory, but may be a source or destination of sensitive data.
*
Networks may be a source or destination of sensitive data.
*
Business Units may be a source or destination of sensitive data.
*
Domains may be a source or destination of sensitive data.
*
URL categories may be a source or destination of sensitive data.
Endpoint resources
These resources are only available to accounts with a Forcepoint DLP Endpoint subscription.
*
Endpoint Devices may be the source or destination of sensitive data.
*
Endpoint Applications may be a source or destination of sensitive data on endpoint machines.
*
Endpoint Application Groups may be a source or destination of sensitive data on endpoint machines.
*
Endpoint Printers may be a source or destination of sensitive data.
Remediation resources
*
Action Plans define the action to take when a breach is discovered.
*
Remediation scripts define the external script to run when a breach is discovered. (Not available with all subscriptions.)
*
Notifications can be sent to a specific person or email alias when a breach is discovered.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Defining Resources
Copyright 2017 Forcepoint. All rights reserved.