Resource types
Resources are categorized into different resource types, and used in different policy stages.
The following resource types are available:
Resource type | Type | Description | Used in |
---|---|---|---|
Source IP Address Lists | User-defined |
Source IP Address Lists contain internal corporate IP addresses that identify traffic by its originating address. |
Network rules Applications Web Exceptions Threat Exceptions File Filtering rules |
Destination IP Address Lists | User-defined |
Destination IP Address Lists contain Internet IP addresses that identify traffic by its destination address. |
Network rules Threat Categories File Filtering rules |
Domain Name Lists | User-defined |
Domain Name Lists contain fully qualified domain names (FQDNs) that identify traffic by its destination address. Each FQDN is automatically resolved to one or more IP addresses. |
Network rules Web Exceptions Threat Exceptions File Filtering rules |
Services |
System/user-defined |
Services are used to match traffic based on protocol information, protocol/port combinations, or ICMP type and code information. Service Groups are collections of services that fulfill a specific function (for example, the services that allow IPsec VPN connections). Services and Service Groups are used in Network and Threat rules within a policy. |
Network rules Threat Exceptions |
Applications | System |
Applications are used to allow or block access to cloud applications in the Applications policy stage. Applications are dynamically updated by Forcepoint. You cannot edit the list. |
Applications |
Web Categories |
System |
Web Categories are used to allow or block access to websites in the Web policy stage. Web Categories are dynamically updated by Forcepoint. You cannot edit the list. |
Web Categories Web Exceptions |
URL Lists | User-defined |
URL Lists contain web addresses that can be used to allow or block access to websites. |
Web Exceptions |
Threat Situations | System |
Threat Situations define traffic signature patterns used by deep packet inspection to identify threats, used in the Threats policy stage. Threat Situations are dynamically updated by Forcepoint. You cannot edit the list. |
Threat Categories Threat Exceptions |
File Types | System |
File Types are used to allow or block file uploads and downloads in the File Filtering policy stage. Files are identified using true file type analysis. File Types are managed by Forcepoint. You cannot edit this list. |
File Filtering rules |