Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Web Reporting Tools > Report attributes: Web and Data Security
Report attributes: Web and Data Security
The tables below list the report attributes that are available in the Report Builder, Transaction Viewer (for Web Security transactions), and Incident Manager (for data security incidents). Attributes are listed in the order they appear on the page.
*
*
For many attributes, you have the option to choose "is", "is not", "contains", "does not contain", "starts with", and "does not start with". Use these qualifiers to narrow your results. For example, you may select Destination Country is not United States to filter out U.S. events.
For information about report metrics, see Report metrics: Web and Data Security.
Web Security reports
Web attributes
 
Note: this can show the value Not available for transactions where authentication has been bypassed.
Requires the Forcepoint Advanced Malware Detection for Web module.
Applies only to Forcepoint Mobile Security integrated with AirWatch Mobile Device Management
Traffic on mobile devices that are secured by Forcepoint Mobile Security and traffic on other devices, such as laptops and desktop machines, secured by the cloud service.
Authentication attributes
 
Protocol attributes
 
Note: this can show the value Not available for transactions where authentication has been bypassed.
Data Security reports
Data Security reports can contain the attributes shown in the table below.
Note that data is only displayed in your report if the relevant classifier, category, regulation, etc. is included in your web policy. This is configured on the Data Security tab of the policy and the data is specific to policies configured with DLP Lite.
Data for some attributes is not available for policies configured with Data Protection Service. Use Forcepoint DLP to view and report on incidents not included in the these reports. See Viewing Incidents and Reports for more information.
Select Blocked to view incidents where potential data loss or theft was prevented. Select Monitored to view those that were permitted.
*
Regulatory Compliance - detects data loss applicable to your industry and region.
*
Data Theft - detects when data is being leaked due to malware or malicious transactions.
*
Custom Classifier - detects when patterns, phrases, or dictionary terms that are specific to your business are being leaked.
*
*
See Regulations for a description of the regulations.
See Data Theft for a description of the data theft policies.
Create these under Policy Management > Content Classifiers, and then enable them on the Data Security tab of your policy.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Web Reporting Tools > Report attributes: Web and Data Security
Copyright 2024 Forcepoint. All rights reserved.