Go to the table of contents Go to the previous page Go to the next page View or print as PDF
v8.4.0 Release Notes for Web Protection Solutions : New in Web Protection Solutions
New in Web Protection Solutions
Release Notes | Forcepoint Web Security and Forcepoint URL Filtering |31-Jul-2017
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Product mapping
Version 8.0 was the first product release that used a new, simplified product naming and grouping of the familiar product line.
Version 8.4 has reset the product names to better align with the company vision.
 
Security enhancements
Forcepoint Security Labs Analysts continually assess potential security vulnerabilities, which can be introduced by third-party libraries. Security improvements have been made in several areas in version 8.4.
Expanded Internet access for off-site users (hybrid)
A new option that allows off-site users to access URLs that would otherwise be blocked has been added. Available only for customers who purchase the Forcepoint Web Security Hybrid module, this feature provides a new setting that can be enabled to exclude roaming users from certain policy restrictions, giving them wider Internet access when not in the office.
A new option to Permit when user is off-site has been added as an advanced option to the following pages of Forcepoint Security Manager:
*
*
*
Select a category in the Category Filter or the Categories list. If the selected category is permitted, Permit when user is off-site is selected by default and disabled. If the selected category is blocked, the option is enabled. When the option is checked, a new globe icon appears next to the category to which it applies.
 
Note 
The option is also provided on the Main > Policy Management > Filter Components > Edit Categories > Override Action page. Specify whether or not to Change off-site permit settings and click Permit when user is off-site to enable that setting for the selected category in all filters.
*
By default, Do not change current settings is selected.
*
If Permit is selected in the Action group box, the option is disabled, with Permit when user is off-site selected.
When Permit when user is off-site is enabled for a specific category, users who would ordinarily be denied access to sites within that category are permitted access when their browsing is done off-site.
For customers with multiple Policy Servers and mixed subscription keys, the Permit when user is off-site option is available only when connected to a Policy Server whose key enables the hybrid service. However, changes made when connected to a Policy Server whose key does not enable the hybrid service impacts the settings for the other Policy Server's categories. For example, if PolSvr1 has a subscription key that enables the hybrid service, but PolSvr2 has a key that does not:
*
*
Policy enforcement for cloud applications
With version 8.4, policy enforcement for cloud applications is available. The data used for Cloud App reporting (added in v8.3) is used to enforce blocking of cloud application access when users are on-premises.
A new Cloud App Agent is included with each installation or upgrade of Filtering Service or Forcepoint Security Manager. The Cloud App Agent downloads the cloud app catalog in order to provide cloud application information to Filtering Service for policy enforcement and to Security Manager for inclusion in the new cloud app filters used to define policies. Since Cloud App Agent is always with Filtering Service or Forcepoint Security Manager, it does not display on the Status > Deployment > Component List.
A Cloud Apps database is included with your web protection software on each Cloud App Agent machine and each Cloud App Service machine. This database of cloud applications is used to enable basic functionality from the time you enter your subscription key.
*
The database on the Cloud App Service machine is used for log data and reporting.
*
The Cloud Apps database is also downloaded each time the Forcepoint Security Manager service (Websense TRITON - Web Security) starts. The exception to this is when Filtering Service is on-box with Security Manager. If Filtering Service is on the same machine as Security Manager, database downloads are prompted by Filtering Service restarts only.
When Cloud App Agent starts, the latest database is loaded into memory for use with Filtering Service (for policy enforcement) or Security Manager (to provide cloud app information on the various pages).
*
 
 
 
Cloud app filters
To support cloud application use as part of policy enforcement, a new selection is available on the Main > Policy Management > Filters page. Cloud app filters can now be defined and used for policy enforcement.
Two predefined cloud app filters are listed.
*
The Monitor Only filter is the cloud app filter assigned to each of the predefined policies.
*
Any new cloud app filters that have been added are also be listed on this page. To duplicate an existing filter, mark the check box next to the filter name, and then click Copy. The copy is given the name of the original filter with the word copy appended for uniqueness, and then added to the list of filters. Edit the copy just as you would any other filter.
Click Add in the Cloud App Filters section and use the new Main > Policy Management > Filters > Add Cloud App Filter page to create a new cloud app filter.
1.
Enter a unique Filter name. The name must be between 1 and 50 characters long, and cannot include any of the following characters:
* < > ` ' { } ~ ! $ % & @ # " [ ] | \ ^ + = ? / ; : . ,
Filter name can include spaces, dashes, and apostrophes.
2.
Enter a short Description of the filter. This appears next to the filter name in the Cloud App Filters section of the Filters page, and should explain the filter's purpose.
The character restrictions that apply to filter names also apply to descriptions, with the following exceptions; periods (.), commas (.), and brackets ([, ]) can be included in descriptions.
3.
Select an entry from the Base filter on drop-down to use to begin creating a new Cloud App Filter.
a.
b.
Select Blank under Cloud App Filter Templates to create a completely new filter, with no pre-defined settings.
4.
Click OK to see and edit the new filter. The filter is added to the Cloud App Filters list on the Filters page.
Click Cancel to return to the Filters page without adding a new filter.
Use the new Main > Policy Management > Filters > Edit Cloud App Filter page to continue customizing the new filter or make changes to a cloud application filter.
 
Important 
The filter name and description appear at the top of the page.
*
Click Rename to change the filter name.
Note that the rename option is not available for the Monitor Only filter.
*
Type in the Description field to change the filter description.
The number next to Policies using this filter shows how many policies currently use the selected filter. If the cloud app filter is active, click View Policies for a list of policies that enforce the filter.
The bottom portion of the page shows the details of the filter you selected. To change the way clouds apps are filtered and logged:
1.
Enable Block all high risk apps to block access to any cloud app that is considered high risk.
2.
In the Blocked apps list, add specific cloud apps that should always be blocked, regardless of their risk level.
a.
b.
Search results are listed alphabetically within each risk level.
c.
The cloud app is added to the blocked list.
d.
The number of apps included in the list is provided above the list box. Cloud apps in the list are sorted alphabetically within each risk level.
3.
In the Permitted apps list, add cloud apps that should always be permitted.
a.
b.
Search results are listed alphabetically within each risk level.
c.
The cloud app is added to the permitted list.
d.
The number of apps included in the list is provided above the list box. Cloud apps in the list are sorted alphabetically within each risk level.
 
Important 
The Permitted apps list takes precedence over the Block all high risk apps option. Access to a high risk app that is on the permitted list is allowed even if Block all high risk apps is enabled.
4.
Click OK to close the message window. No further action is taken.
5.
Click OK to remove it from the original list and add it as requested. Click Cancel to leave both lists unchanged.
6.
After editing the filter, click OK to cache your changes and return to the Filters page. Changes are not implemented until you click Save and Deploy.
 
Note 
To activate a new cloud app filter, add it to a policy and apply the policy to clients.
Delete a filter by selecting it in the list on the Filters page and clicking Delete. Filters that are used in a policy cannot be deleted. The Monitor Only filter cannot be deleted since it is used as the default cloud apps filter when a new policy is added.
Policies
The Main > Policy Management > Policies > Edit Policy page has been modified with a new look and feel to accommodate cloud application filters, along with category and protocol filters.
*
*
The new Edit Policies page allows for the usual Schedule entries, including Start, End, and Days entries, as well as drop-down selections for Category/Limited Access Filter, and Protocol Filter. A new Cloud App Filter drop-down selection is also provided. Use the drop-down option provided to select a different cloud app filter.
When adding or editing a policy, you must now select the Cloud App Filter to enforce for each time block. Select Add Cloud App Filter to add a new filter to enforce in this policy.
Below the schedule section are three tabs that can be used to view the filters associated with the specific time block that is selected in the schedule.
*
If a category filter is used in the policy, the tab contents match the Main > Policy Management > Filters > Edit Category Filter page, providing:
*
*
Use the search option provided to find a specific category in the list. Note, however, that the search option is not available if either the Permit All or Block All filter is selected.
*
*
If a limited access filter is used in the policy, the tab contents match the Main > Policy Management > Filters > Edit Limited Access Filter page include:
*
*
Use the Add Sites and Add Expressions button to add permitted URLs, IP addresses, or regular expressions to the filter.
*
*
See Editing a category filter or Editing a limited access filter in Administrator Help for additional details.
*
The detail section matches the Main > Policy Management > Filters > Edit Protocol Filter page, providing:
*
*
Use the search option provided to find a specific protocol in the list. Note, however, that the search option is not available if either the Permit All or Block All filter is selected.
*
*
See Editing a protocol filter in Administrator Help for additional details.
*
The detail section matches the Main > Policy Management > Filters > Edit Cloud App Filter page described earlier in this document.
*
*
The filter contents (Block all high risk apps checkbox and blocked and permitted apps lists).
Enable or disable the checkbox and use the search options provided to find a specific cloud app for inclusion in either list.
*
*
When you finish editing a policy, click OK to cache your changes. Changes are not implemented until you click Save and Deploy.
 
Note 
Note that the filter names and descriptions cannot be changed from the Edit Policies page. Those options are available only by accessing the filter directly from the Main > Policy Management > Filters page.
As usual, select a policy and click Delete to delete a policy.
 
Note 
Delegated administration with cloud app filters
Cloud app filters are also available to delegated administrators.
*
When a new delegated administration role is added, all Super Administrator cloud app filters are copied to the role when the Copy all Super Administrator policies, filters, and filter components to the new role is selected.
*
*
On the Main > Policy Management > Filters page, mark the check box next to a cloud app filter name and then click Copy to Role to copy the filter to a specific delegated administration role.
Cloud app filters are also included when a policy is copied using the Copy to Role feature available on the Main > Policy Management > Policies page.
*
The Move to Role option available on the Main > Policy Management > Clients page has also been modified to include cloud app filters with the new policy when a client is moved to a new role.
Enforcing policies with cloud app filters
To support the new cloud app enforcement, new action codes have been added. These actions are included in investigative reports, presentation reports, and the dashboard charts.
*
*
*
*
*
If a cloud app is explicitly permitted or blocked, additional lookup against the URL category is done to get category information for use in reporting and to confirm the URL is not assigned to a category in the Security Risk class.
*
*
*
*
If Block all high risk apps is enabled and the cloud app is considered high risk, the request is blocked unless the cloud app is explicitly permitted.
If a cloud app is considered high risk, additional lookup against the URL category is done to retrieve category information for use in reporting and to determine if the category is assigned to the Security Risk class.
*
*
*
If the cloud app filter assigned to the policy being applied does not list the cloud app as specifically blocked or permitted, and Block all high risk apps is not enabled, enforcement is done using the category filters assigned to the policy.
When a cloud app is explicitly blocked, the block happens prior to further lookup and the request is assigned the new "Cloud app blocked" action code. Requests for cloud apps that are explicitly permitted are assigned the new "Cloud app permitted" action code only when, after the URL lookup, no further reason is found to block the request
See the Enforcement order in Administrator Help for further details.
New block pages have been included to better handle cloud app blocking. As with category block pages, the cloud app block pages can be customized. See the Creating Custom Block Pages for details.
 
Note 
 
Note 
Enhancements to Cloud App reports
To incorporate the new cloud application enforcement feature and provide better usability, enhancements have been made to the report on cloud apps use found on the Cloud Apps tab of Main > Reporting > Applications.
*
*
*
Select Blocked, Permitted, or both to report on a specific set of requests.
*
Select On-site to report on user requests that are managed in network or Off-site to report on requests made by roaming users. Select both to report on all requests, regardless of where they are managed.
 
Note 
The linked pages (User Summary Report and Cloud App Summary) automatically use the Time period, Requests, and Users access filters selected on the main Cloud Apps page.
*
*
*
*
*
*
*
Similarly, Usage Trend chart options are now multi-series line, stacked area, or stacked column.
*
*
Pressing Enter is now an alternative to clicking Search when using that feature on the Cloud App or Cloud App User report.
Note that you still need to click Search to use the feature on the User Summary Report and Cloud App Summary.
*
The Users Accessing table that is part of the User Summary Report now offers the User entry as a link that opens an Investigative Report with more details for the browsing being done by that user on the date in the Last Accessed column.
The link is available only to delegated administrators with permission to "access investigative reports".
*
Files created using the Export to CSV option available on the various report pages include data for the new columns added to the reports.
In addition, the filenames contain the date and time the file was created.
For example, an export from the Cloud App page now creates a file in the format cloudapps_yyyyMMdd_HHmmss.csv.
*
*
Authentication cookie sharing (Content Gateway)
Authentication credentials cached with cookie surrogates can now be shared across all nodes in a cluster.
Prior to v8.4, when cookie mode caching is enabled, after a user is authenticated, the cookie for that user is later used for subsequent authentication attempts through the same Content Gateway machine. Requests by that same user that go through a different proxy require the user to provide a name and password.
With 8.4, when cookie mode caching is enabled, after a user is authenticated the cookie for that user can be used for subsequent authentication attempts by any of the proxies that are clustered with the proxy that did the initial authentication. This feature is especially useful in load balanced environments.
Cookie sharing is enabled on the Configure > Security > Access Control > Global Authentication Options page of Content Gateway manager.
*
Enable either Cache using Cookies only or Cache using both IP addresses and Cookies in the Caching Method section of the page.
Note that all proxies in the cluster must use the same caching method when cookie sharing is enabled.
*
*
Select Enabled to enable the feature.
When cookie caching is enabled, this feature is automatically enabled.
 
Note 
Enabling the setting in the UI also updates a new parameter in records.config.
proxy.config.auth.sharecookie
Do not edit the config file to enable this feature. Use the UI setting.
*
Select Choose File for both Public and Private keys to import your own keys for use with this feature. Browse to the file you want to use and select it. Files must be in PEM format.
The same keys must be imported for each proxy in the cluster.
*
After selecting each file, click Import Keys to import custom keys (recommended) and store them in the default location.
Note that default keys are provided and are added when the product is installed or upgraded. The default file names and locations are:
/opt/WCG/config/cookie_auth_public.pem
/opt/WCG/config/cookie_auth_private.pem
Select the files you wish to import. The custom keys are automatically copied to this folder and renamed to the default names.
 
Important 
Keys must be PKCS#1 RSA public keys and are RSA 1024/2048/4096 bit public and private key pairs without a passphrase. Use the following commands to generate keys:
openssl genrsa -out cookie_auth_private.pem 1024
openssl rsa -in cookie_auth_private.pem -RSAPublicKey_out -out cookie_auth_public.pem
Change 1024 to 2048 or 4096 to generate 2048 or 4096 bit keys.
*
Select Save Public Key and Save Private Key to make a backup of the files.
Select the location and filenames to use for the backup copy, keeping in mind that the default names are always used for the active keys.
Key files should be backed up prior to importing new keys.
When load balancing has been configured, all proxies must use the same setting for proxy.config.http.transparent_auth_hostname in records.config. The value must be the fully qualified domain name (FQDN) of the load balancer and can be configured on the Configure > Security > Access Control > Global Configuration Options page of Content Gateway manager. Enter the FQDN as the Redirect Hostname.
It can also be configured manually (not recommended) by updating records.config. For example, use the following command to set the value:
LOCAL proxy.config.http.transparent_auth_hostname STRING loadBalancer.tcs.com
where loadBalancer.tsc.com is the FQDN of the load balancer.
Note the following feature limitations:
*
*
*
Automatic updates to Certificate Authority Tree (Content Gateway)
When installed, Content Gateway initially populates the Certificate Authority Tree (trusted certificate store) with the list qualified by Mozilla for Firefox, by Microsoft for Internet Explorer, and by Apple for Safari.
With version 8.4, the information in CA Tree is automatically updated on a regular basis as well as each time Content Gateway is restarted.Updating the CA tree avoids the potential for using a root CA that has expired, is no longer a root CA, or if the certificate revocation list URL of the root CA has changed.
The update process inserts new trusted CAs and updates existing CAs that have updated certificate revocation lists, and at the same time removes expired CAs, any CA that is no longer a root CA, and non-trusted CAs.
 
Note 
Enabled by default, the feature can be disabled by editing records.config using this command:
CONFIG proxy.config.ssl.catree_update INT 0
Restart Content Gateway after making this change.
Reset the value to 1 to re-enable the updates.
To avoid file corruption, checks are in place to confirm the availability and health of each new update. Update attempts that fail generate an informational alarm. The existing set of certificates continues to be used until the next successful download.
This feature:
*
*
*
After the initial update, review the CA Tree and remove any certificates that are no longer trusted or may be revoked.
*
*
When an update is in progress, provides a warning on the Configure > SSL > Certificates pages that changes made when the update is running are lost. The same message appears when a backup or restore is attempted.
 
 
Direct Connect Endpoint (hybrid)
A new Direct Connect Endpoint (DCEP) is available for Forcepoint Web Security customers who purchase the Forcepoint Web Security Hybrid Module. (Note that the existing web endpoint is now called Proxy Connect endpoint.)
DCEP can be enabled by hybrid customers and DCEP client software is then included using View Files in the Forcepoint Web Security Endpoint section of the Settings > Hybrid Configuration > Hybrid User Identification page of Security Manager.
They hybrid service authentication reports now include DCEP and Policy Connect Endpoint as separate entries.
 
Note 
This new endpoint is appropriate if:
*
*
*
Communication is established between the endpoint and the proxy, and when DCEP detects the proxy, it confirms that the endpoint and the proxy belong to the same customer and authenticate with each other. Then, endpoint puts itself into Standby mode and allows Forcepoint Web Security to provide policy enforcement for clients in the network.
The Content Gateway installation process has been updated to include Endpoint Authentication Server port in the list of configurable port assignments.
For additional information about Direct Connect and Proxy Connect endpoints, see the Endpoint Installation Guide.
SIEM enhancements
Hybrid data sent to SIEM solution
In earlier versions, hybrid log data forwarded to Log Server by Sync Service was not also forwarded to a configured SIEM solution. With v8.4, hybrid log data is forwarded to the SIEM Integration configured on the Settings > General page.
Enhancement to SIEM integration support
In previous versions of the product, a different SIEM solution could be configured for each Policy Server using the Settings > General > SIEM Integration option. Data handled by the Filtering Services associated with that Policy Server would be forwarded to that SIEM solution.
With v8.4, data for each Policy Server (including those without a SIEM solution) is sent to all SIEM solutions configured for other Policy Servers assigned to the same Policy Broker. This is true whether Policy Server was installed and assigned to a specific Policy Broker, or Policy Server was connected to a Policy Broker using the Web > Settings > General > Policy Broker page of Security Manager.
Miscellaneous SIEM enhancements
Additional enhancement have been made to Forcepoint Web Security SIEM integration.
*
*
Add the following keys to your format string to include cloud app details:
*
*
*
*
Content Gateway enhancements
Enhancements have been made to Content Gateway to improve usability.
*
The file editor accessed from the Configure > Networking > WCCP page now provides two options for Ports.
*
Select Specify ports to enter up to 8 ports in a comma separated list.
*
Select All ports to redirect traffic from all ports.
A reminder that there must be a corresponding ARM rule for every port specified in an enabled WCCP service group is provided.
*
In earlier versions, if you selected an authentication method on the Configure > My Proxy > Basic page of Content Gateway Manager, and added users to your directory service in the format user1@mycompany.com, authentication would fail. Authentication would be successful only if the same users were entered in the format user1_mycompany.com.
New options are now available that allow the user1@mycompany.com format.
When using rule-based authentication and adding a New Domain on the Configure > Security > Access Control > Domains page with the LDAP Authentication Method, the available LDAP Server Types are now:
*
*
*
When the selected authentication method is LDAP, and adding an LDAP Server on the Configure > Security > Access Control > LDAP page, the available Server Types are now:
*
*
*
In both cases, userPrincipleName supports the user1@mycompany.com format.
*
When an SSL website is requested without an SNI (server name indication), the Common Name in the website's certificate may not match the URL hostname. When that happens, future requests to the same website will not match the SSL Incident database.
To force the proxy to add an outbound SNI (server name indication), enable the following variable:
proxy.config.ssl.client.set_sni INT 1
*
Browser limitations require configuring a specific port in order for certain Content Gateway graphs to display properly. To avoid any issues, the Monitor > My Proxy > Node and Monitor > My Proxy > Graphs pages on Content Gateway manager will be disabled until a port is specified in records.config (in /opt/WCG/config, by default).
Update this variable to enable the Node and Graphs pages:
proxy.config.admin.overseer_port INT ##
where ## is a valid port number.
A restart of Content Gateway is required for this variable to take effect.
Customers using an appliance should contact Technical Support for assistance with the port change.
*
proxy.config.dss.large_file_threshold
proxy.config.dss.analysis_timeout_for_large_file
With these settings, a default value of 5MB (large_file_threshold) is used to determine how large a file should be before a longer period of time than the current default of 10 seconds is given for analysis time. With this setting, any file larger than 5MB is given, by default, 20 seconds (analysis_timeout_for_large_file) for analysis.
*
*
*
 
Reporting optimizations
Changes have been made to some of the reporting components, including the Log Database and Log Server, to provide improved functionality for logging and reporting.
*
*
*
Note that customers who currently use custom reporting tools may be impacted by the Log Database schema changes.
General enhancements
Changes have been made in order to make the product more user friendly and to better protect our customers.
*
*
The Sync Service Communication Results table on the Main > Status > Hybrid Services page has been redesigned to provide additional information.
*
*
The Collect and Retrieve Reporting Data section of the Settings > Hybrid Configuration > Scheduling page has been updated with additional text and warnings to explain the dangers of changing the default values.
In addition, values of 5 and 10 minutes have been added to the Retrieve data every drop-down selections. Default internal settings used for data retrieval have also been modified to allow for a more complete download of hybrid log records.
*
The Apply to Subcategories and Apply to Group options used when editing category filters, protocol filters, and filter lock options have been relocated on their respective management console pages to better indicate their full functionality.
*
The Aggressive analysis option for Antivirus Scanning in the Security Threats: File Analysis section of Settings > Scanning > Scanning Options is now enabled by default. Antivirus analysis is applied to inbound files, increasing the protection that Forcepoint Web Security provides.
This setting is not be changed by the upgrade process.
*
The Print Policies To File option available on the Main > Policy Management > Policies page has been updated to include both policy exception and cloud app filter details.
Install and upgrade improvements
Improvements have been made to the installation and upgrade screens and process.
The Web Hybrid Module Components screens has been re-organized to make it more intuitive.
Browser support
See the Certified Product Matrix for the latest list of supported browsers.
Logon application support
Logon Agent communicates with the logon application (LogonApp) on client machines to identify users as they log onto or off of Windows domains.
The logon application supports the following operating systems:
*
*
*
For more information about Logon Agent and the logon application, see the Using Logon Agent for Transparent User Identification white paper.
Removed in this version
Technical support for Windows Active Directory in mixed mode ends with v8.4. Forcepoint Web Security and Forcepoint URL Filtering continue to offer mixed mode as a directory service option.
Functionality will be removed in the next release. It is recommended that customers currently using Window Active Directory in mixed mode move to a different directory service.
See Product Support Life Cycle for additional information about planned support of existing products.
Third-party platform and product support
All components
This version adds support for:
*
*
*
See the Certified Product Matrix for the latest list of supported browsers.
 
Note 
Note that installing web protection components on Windows Server 2012 or 2012 R2 requires Microsoft .NET Framework v.35 and v4.5. Install both and turn them both on before running the Forcepoint Security Installer.
Content Gateway
This version is supported on:
*
 
Important 
*
*
*
*
*
Note 
*
 
Important 
"Best effort" support for the version of Red Hat Enterprise Linux and CentOS listed above is provided. Under "best effort" support, Technical Support makes a best effort to troubleshoot cases in standard fashion until the issue is deemed a Red Hat Enterprise Linux- or CentOS-specific issue, at which point you must contact Red Hat directly for assistance.
As a best practice, Red Hat Enterprise Linux systems that host Content Gateway should be registered with Red Hat Network and kept up-to-date with the latest security patches.
 
Important 
 
Important 
For a complete platform requirements information, see System requirements for this version in the Deployment and Installation Center.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
v8.4.0 Release Notes for Web Protection Solutions : New in Web Protection Solutions
Copyright 2017 Forcepoint. All rights reserved.