Resource types

Resources are categorized into different resource types, and used in different policy stages.

The following resource types are available:

Table 1.
Resource type Type Description Used in
Source IP Address Lists User-defined

Source IP Address Lists contain internal corporate IP addresses that identify traffic by its originating address.

Network rules

Applications

Web Exceptions

Threat Exceptions

File Filtering rules

Destination IP Address Lists User-defined

Destination IP Address Lists contain Internet IP addresses that identify traffic by its destination address.

Network rules

Threat Categories

File Filtering rules

Domain Name Lists User-defined

Domain Name Lists contain fully qualified domain names (FQDNs) that identify traffic by its destination address. Each FQDN is automatically resolved to one or more IP addresses.

Network rules

Web Exceptions

Threat Exceptions

File Filtering rules

Services

System/user-defined

Services are used to match traffic based on protocol information, protocol/port combinations, or ICMP type and code information.

Service Groups are collections of services that fulfill a specific function (for example, the services that allow IPsec VPN connections).

Services and Service Groups are used in Network and Threat rules within a policy.

Network rules

Threat Exceptions

Applications System

Applications are used to allow or block access to cloud applications in the Applications policy stage.

Applications are dynamically updated by Forcepoint. You cannot edit the list.

Applications

Web Categories

System

Web Categories are used to allow or block access to websites in the Web policy stage.

Web Categories are dynamically updated by Forcepoint. You cannot edit the list.

Web Categories

Web Exceptions

URL Lists User-defined

URL Lists contain web addresses that can be used to allow or block access to websites.

Web Exceptions

Threat Situations System

Threat Situations define traffic signature patterns used by deep packet inspection to identify threats, used in the Threats policy stage.

Threat Situations are dynamically updated by Forcepoint. You cannot edit the list.

Threat Categories

Threat Exceptions

File Types System

File Types are used to allow or block file uploads and downloads in the File Filtering policy stage. Files are identified using true file type analysis.

File Types are managed by Forcepoint. You cannot edit this list.

File Filtering rules