Web Reporting Tools > Report attributes: Web and Data Security
|
Note: this can show the value Not available for transactions where authentication has been bypassed.
|
||
Requires the Forcepoint Advanced Malware Detection for Web module.
|
||
Applies only to Forcepoint Mobile Security integrated with AirWatch Mobile Device Management
|
||
Traffic on mobile devices that are secured by Forcepoint Mobile Security and traffic on other devices, such as laptops and desktop machines, secured by the cloud service.
|
||
Options are Cloud connection, Endpoint Web (Proxy), Endpoint Web (Direct), IPsec Advanced, IPsec, GRE, EasyConnect, Appliance (Cloud traffic), Appliance (Local traffic), Secured mobile traffic, Aerohive integration, Firewall redirect, or Dedicated port.
|
||
Note: this can show the value Not available for transactions where authentication has been bypassed.
|
||
Select Blocked to view incidents where potential data loss or theft was prevented. Select Monitored to view those that were permitted.
|
||||||||
|
||||||||
See Regulations for a description of the regulations.
See Data Theft for a description of the data theft policies.
Create these under Policy Management > Content Classifiers, and then enable them on the Data Security tab of your policy.
|
||||||||
Web Reporting Tools > Report attributes: Web and Data Security
|