Table of Contents You are at the beginning of the document Go to the next page

Table of Contents

Introduction
How Forcepoint Web Security Cloud works
Getting started
Cloud Web setup
Forwarding traffic
Identifying users
User authentication methods
Working with remote users
Testing whether a browser is using the proxy
Next steps: configuring advanced features
Tailoring your policies
Customizing notification pages
Adding non-proxied destinations
Adding administrators
Privacy protection
Cloud service reporting
Optional add-on modules
Preparing end users for deployment

Table of Contents You are at the beginning of the document Go to the next page
Copyright 2022 Forcepoint. All rights reserved.