![]() |
![]() |
![]() |
![]() |
Navigating the System > Main options
|
![]() |
The Dashboard appears first when you first view the Data Security module of the Forcepoint Security Manager. It provides an at-a-glance dashboard of the enterprise data loss prevention status. See Viewing the Dashboard.
|
![]() |
System Health enables you to monitor Forcepoint DLP performance. See Monitoring system health.
|
![]() |
Endpoint Status* shows a list of data endpoints that are registered with the management server, including information regarding an endpoint's discovery, profile and policy, and the host's system summary. See Viewing endpoint status.
|
![]() |
Mobile Status* shows a list of mobile devices that are registered with the management server, including information regarding the owner, device type, and last sync time. See Viewing endpoint status.
|
![]() |
Data Loss Prevention lets you view and manage data loss prevention incidents relevant to the active administrator. You can assign incidents to other administrators and view consolidated reports on incidents and information leaks. This gives you a complete picture of what's going on inside your network. You can also schedule reporting tasks.
|
![]() |
Mobile Devices* shows information about mobile device incidents. Using this screen, you can assign, view, and monitor mobile device incidents.
|
![]() |
Discovery* shows information about incidents that were detected through discovery scans. Using this screen, you can assign, view, and monitor discovery incidents.
|
![]() |
Use DLP Policies to create or manage network or endpoint Data Loss Prevention (DLP) policies. You can create policies from scratch or by using predefined policies.
|
![]() |
Use Discovery Policies* to create or manage discovery policies. You can create policies from scratch or by using a predefined regulatory template.
|
![]() |
Use Content Classifiers to describe the data to be protected. You can classify data by various patterns and phrases, file properties, file fingerprints, database fingerprint, or machine learning.
|
![]() |
Use Resources to define the source and destination of the data you want to protect, the endpoint device or application that may be in use, and the remediation or action to take when a violation is discovered (such as block or notify).
|
![]() |
Traffic Log shows details of the traffic being monitored by Forcepoint DLP. See The Forcepoint DLP traffic log.
|
![]() |
System Log offers a list of the events sent from system components, such as the Forcepoint DLP servers, protectors, and policy engines. See The Forcepoint DLP system log.
|
![]() |
Audit Log displays a list of actions that administrators have performed in the system. See The Forcepoint DLP audit log.
|
![]() |
![]() |
![]() |
![]() |
Navigating the System > Main options
|