Documentation
|
Support
Table of Contents
Introduction
How Forcepoint Web Security Cloud works
Getting started
Cloud Web setup
Forwarding traffic
Identifying users
User authentication methods
Working with remote users
Testing whether a browser is using the proxy
Next steps: configuring advanced features
Tailoring your policies
Customizing notification pages
Adding non-proxied destinations
Adding administrators
Privacy protection
Cloud service reporting
Optional add-on modules
Preparing end users for deployment
Copyright 2022 Forcepoint. All rights reserved.