![]() |
![]() |
![]() |
![]() |
v8.4.0 Release Notes for Web Protection Solutions : New in Web Protection Solutions
|
![]() |
By default, Do not change current settings is selected.
|
![]() |
If Permit is selected in the Action group box, the option is disabled, with Permit when user is off-site selected.
|
![]() |
When connected to PolSvr2, if the action applied to a category is changed from permitted to blocked, the same category appears with the Permit when user is off-site option enabled but unchecked when connected to PolSvr1.
|
1.
|
Enter a unique Filter name. The name must be between 1 and 50 characters long, and cannot include any of the following characters:
|
2.
|
Enter a short Description of the filter. This appears next to the filter name in the Cloud App Filters section of the Filters page, and should explain the filter's purpose.
|
3.
|
Select an entry from the Base filter on drop-down to use to begin creating a new Cloud App Filter.
|
b.
|
Select Blank under Cloud App Filter Templates to create a completely new filter, with no pre-defined settings.
|
4.
|
Click OK to see and edit the new filter. The filter is added to the Cloud App Filters list on the Filters page.
|
![]() |
Click Rename to change the filter name.
|
![]() |
Type in the Description field to change the filter description.
|
1.
|
Enable Block all high risk apps to block access to any cloud app that is considered high risk.
|
2.
|
In the Blocked apps list, add specific cloud apps that should always be blocked, regardless of their risk level.
|
a.
|
Enter all or part of a cloud app name in the Search box.
|
3.
|
In the Permitted apps list, add cloud apps that should always be permitted.
|
a.
|
Enter all or part of a cloud app name in the Search box.
|
The Permitted apps list takes precedence over the Block all high risk apps option. Access to a high risk app that is on the permitted list is allowed even if Block all high risk apps is enabled.
|
6.
|
After editing the filter, click OK to cache your changes and return to the Filters page. Changes are not implemented until you click Save and Deploy.
|
![]() |
The filter contents (Block all high risk apps checkbox and blocked and permitted apps lists).
|
![]() |
When you finish editing a policy, click OK to cache your changes. Changes are not implemented until you click Save and Deploy.
|
When you edit any filter from the Edit Policies page, the changes affect every policy that enforces the filter. Before editing a filter that is enforced by multiple policies, click the This filter is active in link to see which policies will be affected.
|
![]() |
When a new delegated administration role is added, all Super Administrator cloud app filters are copied to the role when the Copy all Super Administrator policies, filters, and filter components to the new role is selected.
|
![]() |
On the Main > Policy Management > Filters page, mark the check box next to a cloud app filter name and then click Copy to Role to copy the filter to a specific delegated administration role.
|
![]() |
The Move to Role option available on the Main > Policy Management > Clients page has also been modified to include cloud app filters with the new policy when a client is moved to a new role.
|
![]() |
If Block all high risk apps is enabled and the cloud app is considered high risk, the request is blocked unless the cloud app is explicitly permitted.
|
![]() |
If the cloud app filter assigned to the policy being applied does not list the cloud app as specifically blocked or permitted, and Block all high risk apps is not enabled, enforcement is done using the category filters assigned to the policy.
|
![]() |
Pressing Enter is now an alternative to clicking Search when using that feature on the Cloud App or Cloud App User report.
|
![]() |
The Users Accessing table that is part of the User Summary Report now offers the User entry as a link that opens an Investigative Report with more details for the browsing being done by that user on the date in the Last Accessed column.
|
![]() |
Files created using the Export to CSV option available on the various report pages include data for the new columns added to the reports.
|
![]() |
Enable either Cache using Cookies only or Cache using both IP addresses and Cookies in the Caching Method section of the page.
|
![]() |
Select Enabled to enable the feature.
|
![]() |
Select Choose File for both Public and Private keys to import your own keys for use with this feature. Browse to the file you want to use and select it. Files must be in PEM format.
|
![]() |
After selecting each file, click Import Keys to import custom keys (recommended) and store them in the default location.
|
When custom keys are imported, the default files provided by Forcepoint are overwritten. You should backup the default keys prior to importing. See Save Public Key and Save Private Key below.
|
![]() |
![]() |
When an update is in progress, provides a warning on the Configure > SSL > Certificates pages that changes made when the update is running are lost. The same message appears when a backup or restore is attempted.
|
![]() |
Select Specify ports to enter up to 8 ports in a comma separated list.
|
![]() |
Select All ports to redirect traffic from all ports.
|
![]() |
A new variable in records.config has been added so that all websites added to the SSL Incident List using the By Certificate option work as expected.
|
![]() |
Browser limitations require configuring a specific port in order for certain Content Gateway graphs to display properly. To avoid any issues, the Monitor > My Proxy > Node and Monitor > My Proxy > Graphs pages on Content Gateway manager will be disabled until a port is specified in records.config (in /opt/WCG/config, by default).
|
![]() |
The Sync Service Communication Results table on the Main > Status > Hybrid Services page has been redesigned to provide additional information.
|
![]() |
The Collect and Retrieve Reporting Data section of the Settings > Hybrid Configuration > Scheduling page has been updated with additional text and warnings to explain the dangers of changing the default values.
|
![]() |
The Apply to Subcategories and Apply to Group options used when editing category filters, protocol filters, and filter lock options have been relocated on their respective management console pages to better indicate their full functionality.
|
![]() |
The Aggressive analysis option for Antivirus Scanning in the Security Threats: File Analysis section of Settings > Scanning > Scanning Options is now enabled by default. Antivirus analysis is applied to inbound files, increasing the protection that Forcepoint Web Security provides.
|
![]() |
The Print Policies To File option available on the Main > Policy Management > Policies page has been updated to include both policy exception and cloud app filter details.
|
![]() |
![]() |
![]() |
![]() |
v8.4.0 Release Notes for Web Protection Solutions : New in Web Protection Solutions
|