Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Defining Resources > Remediation > Action Plans > Adding or editing an action plan
Adding or editing an action plan
Administrator Help | Forcepoint DLP | Version 8.7.x
Use the Policy Management > Resources > Action Plans > Action Plan Details page to create or edit an action plan.
There are several ways to access the Action Plan Details page:
*
*
*
To create or edit an action plan:
1.
Enter or update the Name and Description for the action plan.
2.
*
*
*
*
Standard Forcepoint DLP options
On the Data Loss Prevention tab, complete the fields as follows. See Possible actions for an action plan for a description of each possible action.
1.
 
2.
 
3.
For DLP Cloud Proxy, select from the drop-down list to select an action to take when an incident involves files uploaded, attached, or downloaded from a cloud application.
*
Select Permit to allow files to be uploaded, attached, or downloaded.
*
Select Block to prevent the user action.
 
Note 
For DLP Cloud API, select from the drop-down list to select an action to take when an incident involves files uploaded to, downloaded from, or used by a cloud application.
*
Select Permit to allow files to be uploaded, synchronized, downloaded, or shared.
*
Select Safe copy to keep a copy of the file in the cloud archive that is accessible only to administrators.
*
Select Quarantine to save the file in a quarantine folder defined in the CASB portal.
*
Select Quarantine with note to quarantine the file and leave a message in place of the original file.
*
Select Unshare internal to remove sharing permissions for any internal address.
*
Select Unshare external to remove sharing permissions for any external address.
*
Select Unshare all to remove all sharing permissions from the file.
4.
By default, all incidents are audited. Clear the Audit incident check box if you do not want to audit incidents.
 
Warning 
When Audit incident is selected, select one or more of the following additional options:
*
Select Include forensics to include information about the transaction that resulted in the incident, such as the contents of an email body: From:, To:, Cc: fields; attachments, URL category, hostname, file name, and more.
Forensics display in the incident report.
*
Select Run remediation script to have the system run a script when an incident is discovered, then select the script to use from the drop-down list. See Remediation scripts for more information.
*
Select Run endpoint remediation script to have the system run an endpoint remediation script when an incident is discovered, then select the script to use from the drop-down list.
*
Select Send syslog message to notify an outside syslog server or ticketing system of the incident.
*
Select Send email notifications to send an email message to a designated recipient when a policy is breached.
*
*
*
Click New to create a custom message.
See Notifications and Adding a new message for details.
 
Tip 
5.
Forcepoint Data Discovery options
Enter the following information in the Discovery tab:
1.
In the Network Discovery section, select Run remediation script when you want the system to run a remediation script for network discovery incidents. Select a script from the associated drop-down list. See Remediation scripts.
2.
In the Endpoint Discovery section, if file labeling is enabled for deployment, it can be selected from the Labeling system drop-down list. Specify up to two Boldon James Classifier labels and up to one Microsoft Information Protection label to apply to the files.
*
*
*
*
*
*
 
Note 
3.
Select Run endpoint remediation script when you want the system to run an endpoint remediation script for endpoint discovery incidents. Select a script from the associated drop-down list.
Remediation scripts can be added on the Main > Policy Management > Resources > Remediation Scripts page. Select New > Endpoint Script.
4.
*
Select Audit only to monitor and record (audit) incidents.
*
Select Safe copy to keep a copy of the file in the cloud archive that is accessible only to administrators.
*
Select Quarantine to save the file in a quarantine folder defined in the CASB portal.
*
Select Quarantine with note to quarantine the file and leave a message in place of the original file.
*
Select Unshare internal to remove sharing permissions for any internal address.
*
Select Unshare external to remove sharing permissions for any external address.
*
Select Unshare all to remove all sharing permissions from the file.
5.
Click OK to save the changes.
Forcepoint Web Security mode
1.
*
Permit or allow the HTTP, HTTPS, or FTP request to go through.
*
Block or deny the request.
2.
Select Audit incident to have Forcepoint DLP to log incidents. When logging is enabled, email notifications are also available.
3.
Select Send email notifications to send an email message to a designated recipient when a policy is breached.
*
*
*
Click New to create a custom message.
See Notifications and Adding a new message for details.
 
Tip 
 
4.
Click OK to save your changes.
Forcepoint Email Security mode
1.
With Forcepoint Email Security (on-premises), the action option configured here applies to all email directions.
For cloud infrastructure deployments such as Microsoft Azure, this option applies only to outbound email. (Inbound and Internal email is permitted, and an alert is sent to the Forcepoint Email Security administrator.)
*
Permit the message to go through.
*
Block or deny the message or post.
*
Quarantine the message.
Select Encrypt on release to have the system encrypt the message before it's released.
*
Drop attachments that are in breach of policy. Quarantines email messages that:
*
*
*
*
 
Note 
Select Encrypt on release to have quarantined messages encrypted before they're released. If an attachment has been dropped, this option reattaches it and encrypts both the body and attachment before releasing the message.
(Incidents are released when an administrator selects Remediate > Release on the incident details toolbar.)
*
Encrypt the message.
 
Tip 
2.
Select Audit incident to have Forcepoint DLP to log incidents in the incident database. By default, audit is selected irrespective of the action.
 
Warning 
When Audit incident is enabled, several additional actions are available. Select any of these actions to apply.
3.
If you select Send email notifications:
*
*
*
Click New to create a custom message.
See Notifications and Adding a new message for details.
 
Tip 
4.
Click OK to save your changes.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Defining Resources > Remediation > Action Plans > Adding or editing an action plan
Copyright 2020 Forcepoint. All rights reserved.