Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Administering Forcepoint Databases > Overview of Forcepoint databases
Overview of Forcepoint databases
Administering Forcepoint Databases | Web, Data, and Email Solutions | 8-June-2020
 
The on-premises Forcepoint security solutions use a variety of databases for different purposes: configuration information, reporting data, URL categorization, fingerprinting, and forensics. Several data formats are used, including SQL, PostgreSQL, and Forcepoint proprietary formats.
These databases include:
See "The Master Database" in the Administrator Help for your web protection solution for further details.
Administrators can specify when Real-Time Monitor captures data on the Web > Settings > Reporting > Preferences page in the Forcepoint Security Manager. No other aspect of database behavior is configurable.
Enable or disable the forensics repository and configure its location and size on the Web > Settings > Reporting > Dashboard page in the Forcepoint Security Manager.
See "Configuring Dashboard reporting data" in the Administrator Help for your web protection solution for details.
Configure the size and location of the forensics repository in the Data Security module of the Forcepoint Security Manager. Navigate to the Settings > Deployment > System Modules page and click Forensics Repository under the management server.
Data Fingerprint Database
One of the ways that you can classify data in Forcepoint DLP is by "fingerprinting" it. This allows the detection of sensitive information despite manipulation, reformatting, or other modification. Fingerprints enable the protection of whole or partial documents, antecedents, and derivative versions of the protected information, as well as snippets of the protected information whether cut and pasted or retyped.
When you fingerprint data, the fingerprints are stored in the Data Fingerprint Database on the Forcepoint management server and pushed to other Forcepoint DLP components for fast analysis on those machines.
To tune performance, you can configure the disk space and cache size of the database on the management server in the Data Security module of the Forcepoint Security Manager. To do so:
1.
2.
Navigate to the Data > Settings > Deployment > System Modules page.
3.
Select Primary Fingerprint Repository under the management server.
4.
Secondary repositories are maintained by Content Gateway and Forcepoint Email Security. You can configure Forcepoint DLP to detect fingerprints from repositories local to those machines (best practice) or from a remote machine, such as the management server.
Periodically, you must synchronize the fingerprints in the secondary repositories with the ones on the management server. How often you synchronize depends on your business needs. For best performance, select a time with low traffic volume.
To configure these settings:
1.
Navigate to the Settings > Deployment > System Modules page.
2.
Select Secondary Fingerprint Repository under the component or solution of interest.
3.
4.
See "Configuring the fingerprint repository" in the Forcepoint DLP Administrator Help for instructions on configuring these settings.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Administering Forcepoint Databases > Overview of Forcepoint databases
Copyright 2020 Forcepoint. All rights reserved.