Casb Admin Guide
Casb Admin Guide
Administration Guide
© 2021 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. All other trademarks used in
this document are the property of their respective owners.
Published 2021
Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes
no warranties with respect to this document and disclaims any implied warranties of
merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for
incidental or consequential damages in connection with the furnishing, performance, or use of this
document or the examples herein. The information in this document is subject to change without
notice.
Last modified: 19-Dec-2021
CHAPTER 1 Preface
CONTENTS
CHAPTER 2 Overview
Introducing Forcepoint CASB 3
The Forcepoint CASB workflow 4
The Forcepoint CASB workspace 6
System architecture 9
Gateway enforcement 11
Accessing the Forcepoint CASB management portal 13
Logging in to Forcepoint CASB 13
Logging out of Forcepoint CASB 14
iv Administration Guide
CHAPTER 8 User Behavior Analysis
Machine learning-based anomaly detection using Forcepoint CASB 115
Activity auditing and user profile 115
User risk 116
Monitoring user risk 118
Users at Risk 118
Top High Risk Users 119
Watchlist 119
Organizational Behavior 120
Top Business Units at Risk 120
Organizational Geographic Risk 120
Investigating accounts 122
The Accounts table 122
Accounts table column descriptions 125
The Account summary 127
The Detailed Account page 130
vi Administration Guide
Configuring data types 249
Data type syntax 249
Data type examples 250
Adding a custom data type to Forcepoint CASB 253
Configuring an ICAP connection 255
Adding a new ICAP connection 255
Creating a DLP Policy 257
Setting up a secure tunnel using stunnel 257
Setting up SIEM / syslog integration 259
Activities and alerts CEF mapping 262
Incidents CEF mapping 265
Downloading Tools and Agents 267
Licensing 268
This Administration Guide contains all the information necessary for ongoing use of
Forcepoint CASB, including monitoring and analyzing user activity using the
management portal, setting up cloud discovery and service asset protection, and
system administration.
CHAPTER 1
For information about initially setting up Forcepoint CASB for your organization, please
contact your reseller or Forcepoint support.
Some Forcepoint CASB features are independently licensed. If any features described
in this guide are unavailable in your Forcepoint CASB deployment, please contact your
reseller or the Forcepoint sales team to extend your license.
This chapter introduces Forcepoint CASB and the high-level concepts you need to get
started with it.
This chapter discusses the following:
CHAPTER 2
Discovery (see "Discovery and Asset Management" on page 15): Scan network log files to
see all active cloud accounts, with usage metrics and risk information for found cloud
applications. Eliminate shadow IT by bringing found applications into the Forcepoint CASB
system as managed assets, enabling the additional functions listed below.
User behavior analysis and risk analysis (see "User Behavior Analysis" on page 114):
Scan network log files to identify high risk users and related threats to your organization.
UBA reduces security management costs and improves security team focus by:
l Understanding the typical user through automatic user behavior profiling and comparing
that to your approved business flows.
l Automatically detecting deviations from typical behavior and using that to improve your
policy accuracy.
l Focusing your attention on the key users at risk, highlighted by Forcepoint CASB based
on smart risk calculation.
l Understanding your risk by following a quick investigative flow to get all of the
information you need on a high-risk user, including usage patterns, activities, incidents,
and more.
Access monitoring and enforcement (see "Security Monitoring and Enforcement" on
page 93): Configure access policies to managed assets, without needing to rely on
applications’ native permission systems which in some cases can be limited or insecure.
Threat and risk detection and prevention (see "Security Monitoring and Enforcement"
on page 93): For managed assets, detect user account behavior that is anomalous relative
to automatically-learned usual behavior, according to preconfigured and configurable
policies. Optionally, threat detection can trigger automatic account blocking.
Activity analysis (see "Activity Analysis and Investigation" on page 47): For applications
that have been configured as managed assets, obtain in-depth visibility into organizational
cloud user activities. You can investigate these activities according to various parameters,
including action types, business units, accessed data types, administrative activity,
suspicious activity, user accounts, endpoints, geographical locations and more. Filtered
activity lists can be exported for further analysis and for compliance.
Access and Security Governance (see "Account access and security governance" on
page 138): For managed assets, assess risk by monitoring account compliance with
regulatory standards and with organizational policy regarding user accounts and user
authentication settings.
The main Forcepoint CASB work environment is the Forcepoint CASB management portal.
The management portal includes dashboards for user risk analysis, cloud access discovery,
compliance, and activity analysis and security monitoring. The portal also includes tools for
investigating endpoints, policy configuration, and system configuration.
The management portal includes four main dashboards, and additional pages for further
investigation and configuration:
Risk Summary (see "User Behavior Analysis" on page 114): The Risk Summary page is
the default page that appears upon login.
For supported cloud services that have been defined as managed assets, includes:
l User Risk dashboard: Displays a high-level view of user activity, including risks to
your organization, with drill-down to accounts and the watchlist.
l Accounts: Displays user accounts, including current and recent activity and alert
details, with drill-down to incidents and audit logs.
App Discovery (see "Discovery and Asset Management" on page 15), including:
l Scan results from the Discovery tool (described below), with details on all active cloud
accounts, including usage metrics and risk information for found cloud applications.
l Configurable parameters for the above risk information.
l Tools for bringing found applications into the Forcepoint CASB system as managed
assets, upon which they will appear in the other dashboards as well.
Compliance (see "Governance and Compliance" on page 137): For supported cloud
services that have been defined as managed assets, includes:
l Data Classification (see "Data classification" on page 149): For managed assets,
Forcepoint CASB scans the contents of stored files and provides detailed information
The Endpoints page displays details of devices used to connect to managed assets, separately
listing devices managed by the organization and unmanaged devices, with drill-down to Accounts.
The Endpoints page also enables administrative approval or revocation of device enrollment (see
"Administrative enrollment, approval and revocation" on page 227).
Forcepoint CASB gateway: The gateway acts as a proxy between organizational users
and cloud applications, monitors cloud account activities, and enforces organizational
policy. It receives policy decisions from, and submits activity logs to, the Forcepoint CASB
management server.
The Forcepoint CASB gateway runs as a virtual appliance, and is hosted and managed by
Forcepoint.
Forcepoint CASB management server: The management server serves the Forcepoint
CASB management portal, determines policy application to the gateway, performs
analysis, and creates alerts. It also collects account settings and user information directly
from cloud applications (for Governance). The management server includes a database that
stores all relevant information, including policy, system settings, and activities.
In addition to the above components, Forcepoint CASB provides two agent applications for
relevant scenarios:
Endpoint agent (see "Gateway enforcement" on the next page): For routing relevant
endpoint connections to the Forcepoint CASB gateway.
Active Directory (AD) agent (see "Providing a user directory" on page 182): In
deployments where the management server cannot access the organizational Active
Directory (for example, the management server is in the Forcepoint CASB cloud), the AD
agent can be installed locally to access Active Directory and relay the information to the
management server (see "Providing a user directory" on page 182).
A comprehensive solution recommended in many cases is to use both types of solutions in parallel
(supported by Forcepoint CASB): Implement reverse proxy as the primary enforcement method,
and distribute the Forcepoint CASB endpoint routing solutions as needed for applications that
cannot otherwise be directed to the Forcepoint CASB gateway.
Too many unsuccessful login attempts. If you enter an incorrect password too many
times within a specific time period, you are locked out of the account. The number of
attempts and timeout period are configured on the Administrator Account Security settings
page. For more information, see "Configuring login lockout restrictions" on page 203.
The password expired: Administrator passwords can be set to expire after a specific
number of days. This setting is configured on the Administrator Account Security settings
page. After the setting is enabled, you can set the active time period (between 30 and 180
days) and set up email notifications. For more information, see "Configuring password
restrictions" on page 202.
The account has not been accessed within a set number of days: If you do not log in
to your account within a specific time period, the account is locked because of inactivity.
This setting is configured on the Administrator Account Security settings page. For more
information, see "Configuring login lockout restrictions" on page 203.
Note: A list of password guidelines are displayed on the Change Password window. For
more information about configuring these guidelines, see "Configuring password
restrictions" on page 202.
To change your password at any time through the management portal, open the Admin menu and
click Change Password.
Automatic logouts
You will be logged out automatically if no activity is detected for 15 minutes.
With the Forcepoint CASB Discovery module, you can scan and upload network
log files to see all active cloud accounts, with usage and risk information for
CHAPTER 3
found cloud applications. You can then eliminate shadow IT by bringing found
applications into the Forcepoint CASB system as managed assets, which enables,
for those assets, activity analysis and security monitoring and enforcement.
This chapter discusses the following:
Setting up discovery 16
Monitoring organizational cloud access 28
Restricting application access 41
Investigating apps through the Cloud App Directory 44
Note: You must have a valid Forcepoint CASB license to download this tool. This tool will
only be visible on the Tools and Agents page if you have a valid license. Contact Forcepoint
Support if you would like to use the tool, but do not see the tool on this Settings page.
The Cloud Discovery tool can be installed through either of the following methods:
Attended installation through the user interface: This method allows you to install the
Cloud Discovery tool through an interactive Wizard. This installation requires the user to
confirm the installation settings through a series of prompts before starting the installation.
Unattended installation through the command line: This method allows you to install
the Cloud Discovery tool without user interaction. This is a silent installation and does not
display any indication of the installation progress.
To install and configure the Cloud Discovery tool through the user interface (Windows / Mac OS):
The trial license you automatically received upon downloading the tool enables only limited
functionality. For full functionality, use a license provided by your Forcepoint sales
representative or reseller for your specific Forcepoint CASB management server. If this
license is already installed in Forcepoint CASB, you can download it from the Forcepoint
CASB management portal by going to Settings > Tools and Agents > Application
Discovery Tool > Download License.
5. In the tool, go to File > Settings.
6. Under Manage All Scan Results, for all scan results to be automatically uploaded, select
Automatically upload scan results:
To install the Cloud Discovery tool through the command line as an unattended installation
(Windows):
1. Obtain the Windows installation source from Settings > Tools and Agents.
2. Open the Windows command line interface as an administrator.
3. Run the following command:
<path> --mode unattended
To install the Cloud Discovery tool through the command line as an unattended installation (Mac
OS / Linux):
1. Obtain the Linux or Mac OS installation source from Settings > Tools and Agents.
2. Open the command line interface.
3. Run the following command:
sudo <path> --mode unattended
where <path> is the directory where the Cloud Discovery tool source file is located.
For example:
sudo CloudDiscovery-4.6.1.333-osx-installer_
jre.app/Contents/MacOS/osx-intel --mode unattended
1. Export relevant log files from an organizational perimeter device such as a firewall, web
proxy, SIEM, or router. If your organization is distributed among multiple sites, include logs
from all sites. For full relevant results, the logs should represent a week or more of well-dis-
tributed user traffic (excluding periods of low user access activity). You can include multiple
files of the same format in a folder to be scanned; different-format files should be placed in
separate folders.
2. In the Cloud Discovery tool, click Add File (for a single log file) or Add Folder:
4. Click Run Discovery. You’ll be prompted to save scan settings for future scans including
automatic scheduled scans.
The Cloud Discovery tool scans and analyzes the logs, and if so configured uploads results to
the organizational Forcepoint CASB management server. Upon completion, basic result statistics
are displayed:
1. Configure an organizational perimeter device such as a firewall, web proxy, SIEM, or router
to regularly export relevant log files. If your organization is distributed among multiple sites,
include logs from all sites.
2. If the above log files can’t be exported directly to a location accessible by the Cloud Dis-
covery tool, have them copied to such a location, such as by using a scheduled script.
3. In the Cloud Discovery tool, configure a scan (see "Scanning for discovery" on page 19) for
the above log files and save the scan settings, either at being prompted upon running dis-
covery, or by clicking File > Save Scan As. The scan settings are saved as a .scan file;
make note of its location.
4. Using the operating system’s standard scheduling tools (for example, the Windows Task
Scheduler or the Mac OS Automator and Calendar), schedule running the following
command:
<path>\cloudDiscoveryCLI.bat -s "<scan>" [-d "<output>"]
where
<path> is the Cloud Discovery tool installation directory;
<scan> is the path and filename of the saved .scan file; and
5. If you used the Windows Task Scheduler, open the task Properties, and make sure that
the task is configured to use the current user account even if not logged in, and is
configured for Windows Vista, Windows Server 2008:
1. On the Linux host, execute the Cloud Discovery .run file, and continue through the wizard
according to prompts.
For Share scan summary results, enter Y.
For Launch Cloud Discovery, enter n.
2. From the Cloud Discovery installation folder (by default: /opt/CloudDiscovery/), run:
sh cloudDiscoveryConfig.sh --install.license <license>
where <license> is the path and name of an appropriate Forcepoint CASB license file.
The trial license you automatically received upon downloading the tool enables only limited
functionality. For full functionality, use a license provided by your Forcepoint sales
representative or reseller for your specific Forcepoint CASB management server. If this
license is already installed in Forcepoint CASB, you can download it from the Forcepoint
CASB management portal by going to Settings > Tools and Agents > Application
Discovery Tool > Download License.
3. To enable automatic uploading of scan results, provide credentials of a Forcepoint CASB
administrator with Cloud Discovery permissions, by running:
sh cloudDiscoveryConfig.sh --set.username <user> --set.password
<password>
where <user> and <password> are the relevant credentials. You don’t need to provide the
address of your organizational Forcepoint CASB management server; it should have been
automatically configured by Forcepoint CASB in your license.
4. Optionally, test the connection to the management server:
sh cloudDiscoveryConfig.sh --test.connection
5. Configure an organizational perimeter device such as a firewall, web proxy, SIEM, or router
to regularly export relevant log files. If your organization is distributed among multiple sites,
include logs from all sites. If the log files can’t be exported directly to a location accessible
The Linux Discovery tool cannot perform automatic software updates. To manually update the tool
itself, run:
sh cloudDiscoveryConfig.sh --update.app
To manually update information for service identification, risk factors and characteristics, run:
sh cloudDiscoveryConfig.sh --update.cat
2. Browse to and select the scan result ZIP file. The default location for scan results is:
C:\Users\<user>\Documents\CloudDiscovery\results\<date><ScanName><#>\<Sca
nName>.zip
3. Click Add Scan:
When scan results are not uploaded automatically by the Discovery tool, the Forcepoint CASB
management server might not receive app and risk catalog updates. In this case, to manually
provide Forcepoint CASB with an updated catalog file, in Forcepoint CASB go to Settings >
Cloud Discovery, under New Catalog upload the updated file and click Add Catalog.
Attended through the user interface: This method allows you to uninstall the Cloud
Discovery tool through the operating system's user interface. This requires the user to
confirm the removal before starting the removal process.
Unattended through the command line: This method allows you to uninstall the Cloud
Discovery tool without user interaction. This is a silent removal and does not display any
indication of the removal progress.
To uninstall the Cloud Discovery tool from a Windows computer, do one of the following:
To uninstall the Cloud Discovery tool from a Mac computer, go to the /Applications/Cloud
Discovery folder, and run Uninstall:
You can zoom in and out with ; to pan the map, drag it. Tooltips display country
name and usage numbers:
By Scans: Select whether to display aggregated information from All scans or just from a
specified scan (the last 100 scans are listed):
Only applications that belong to all selected categories (AND) are included. If not all
categories are listed, you can See all categories. To include all applications, unselect all
categories.
By cloud application Risk level:
Only usage by users that belong to all selected departments (AND) are included. If not all
departments are listed, you can See all departments. To include all usage, unselect all
departments.
To include applications that you marked to Hide, select to Show hidden cloud apps:
Date Discovered, Risk level, and whether it has been brought into Forcepoint CASB as a
managed asset:
Service Category and Description
Discovered usage and traffic statistics (quantities and distributions of Users, Activities,
Data Volume; and date Last Seen)
From an application’s Actions menu, you can Hide it, Block it, or Manage it as an asset.
For managed assets, you can go to the Security or Analytics dashboard:
The upper-left section includes general details about the application service, and controls for
blocking access, for managing the application as an asset, and for hiding it.
The upper-right section includes usage and traffic statistics for the application. Below that, the
following sections are displayed:
Service Locations: Where the application’s servers are located. You can zoom in and out
with ; to pan the map, drag it. To view a list of the application servers’ IP addresses,
As you make changes, the information at the top of the page is automatically updated to
reflect how the changes affect application risk levels.
3. At the bottom of the page, click Save.
Block by Skyfence: If your Forcepoint CASB deployment includes endpoint routing, you
can add the application’s address domains to the list of blocked domains.
Block by Third Party: Forcepoint CASB provides destination addresses that you can
copy to organizational firewalls to configure them to block access to the application:
To block an application in either of the above two ways, do one of the following:
If there are too many applications to list here, click See all.
In the Discovery dashboard list of accessed cloud applications, by the application, click
Actions and the relevant Block option:
In the application’s detail page, at the bottom of the upper-left section, click the relevant
Block option:
The default list of cloud apps displays all apps in the directory. Each cloud app is displayed within
a summary box that contains basic information, such as the app category, a short description of
the app, the risk level, and the usage number for your organization.
To sort the list, open the Sort by: drop-down menu above the directory. The default sort is by
Popularity. You can also choose to sort by Risk level, cloud app Name, or Usage.
To filter the list of cloud apps and only display the apps that meet the filter criteria, select the
desired App Categories, Risk Level, and/or Popularity from the menus to the left of the
directory.
Click the Export to PDF button to create a PDF report of the cloud app's detailed
information, including all information from the Info and Risk Factors tabs. The PDF report is
displayed in a new tab or window, where you can view, print, or save a copy of the report.
Click the Compare with other apps button to add this cloud app to the compare apps list.
You can compare up to four cloud apps.
l Forcepoint CASB displays a new section at the top of the window. The selected cloud
app is listed, as well as any other selected apps.
l To select additional apps to compare, navigate back to the directory and either click the
Compare button located in the cloud app's summary box or open the cloud app's
detailed page and click the Compare with other apps button.
l After you select all of apps you wish to compare, click the Go button. The Cloud App
Directory displays a table with the detailed information for each compared cloud app.
l To save a copy of the comparison results, click the Export to PDF button.
Click the Go to website button to open a new browser tab or window that displays the
Under the cloud app 's summary are two tabs: Info and Risk Factors.
The Info tab displays a description of the cloud app and a map of service locations.
l Click see service IPs and URLs to display lists of the IP addresses and URLs
associated with the service.
l To save the IP addresses and URLs to a CSV file, click the Export to CSV button.
The Risk Factors tab displays the cloud app settings that contribute to the cloud app's
overall risk level. These risk factors are separated into the following categories:
l Compliance
l Security Settings
l General Information
l Data Leakage
l Data Ownership
l Account Termination Policy
l Auditing
The Alternative apps section displays the cloud apps that are most similar to the selected app.
You can either click the cloud app's summary box to display the cloud app's detailed page, or click
Compare to compare the alternative app to the selected app.
Click See all alternative apps to open the directory page with the results filtered to display all
cloud apps that match the selected app's App Category.
For service applications that have been defined as managed assets, Forcepoint
CASB has the ability to identify activity details such as source devices, source
CHAPTER 4
locations, and actions (for example, password change or data modification). Using this
information, Forcepoint CASB provides various graphic activity summaries and
tools for investigating user activities according to various parameters. Filtered
activity lists can be exported for further analysis and compliance.
You can use the investigative tools for compliance, IT planning, and security
purposes. For example, you can investigate issues identified in Security, periodically
review organizational behavior patterns, or identify sensitive actions such as
password changes.
You can investigate user accounts and their activities, including handling their
policy violations.
This chapter discusses the following:
Real-time Monitoring: This method is proxy-based. Forcepoint CASB connects the user
to the cloud service through a Forcepoint CASB proxy and collects user activity as the user
interacts with the cloud service. Because Forcepoint CASB is set up between the user and
the cloud service, Forcepoint CASB monitors the activities in real time, and if the activity
violates a policy, performs a mitigation action to block the activity.
Service Provider Log: This method is API-based. Forcepoint CASB collects user activity
from audit logs provided by the cloud service. When the user performs an action on the
cloud service, the cloud service records detailed information about the action in an audit log.
Forcepoint CASB connects to the cloud service through an API connection to download the
audit logs and provide the information for analysis.
To view the user activity collected for either Activity Audit type, go to Audit & Protect > Activity
Audit.
Under Activity Audit, you will see the two Activity Audit types:
Realtime Monitoring
Service Provider Log
Dashboard: The information displayed in the Dashboard is the same for each type.
Audit Log: The information displayed by default in the Audit Log is the same for each type.
You can display additional columns in the Audit Log table, but the columns available in the
Service Provider Logs correspond to the information received from the individual cloud
service (asset), and might not match the information captured through Real-time
Monitoring.
Note: A Forcepoint CASB asset can have both Real-time and Service Provider Log user
activity, but the activities will be separated into a Real-time Monitoring audit log and a
Service Provider Log audit log. Forcepoint CASB cannot combine the two logs.
Salesforce.com
Microsoft Office 365
Microsoft Azure
Microsoft Exchange
Box
Google G Suite
ServiceNow
Dropbox
Amazon Web Services (AWS)
Cisco Webex
Note: Because each cloud service creates their own Activity APIs, the data collected from
each cloud service varies. Data categories from one cloud service might not match the data
categories from another cloud service.
Note: Salesforce does not support the Quarantine mitigation option. If you are configuring a
Salesforce asset and the Quarantine option is available, do not select it. If you select the
Quarantine option, it does not work.
To configure an asset's API connection, see "Configuring an API connection" on page 280.
High 55–80 High impact activities that usually require high level
permissions, but do not need to be reviewed by a
security department each time they occur. For example,
modifying a Price Book in Salesforce, resetting a user
password.
Individually, these activities do not need to generate a
security alert or a push notification. It is recommended to
use additional conditions with these activities to
generate an alert.
Monitor the impact score in the Realtime Monitoring audit log. For more information, see
"Investigating activity logs" on the facing page and "Audit log column descriptions" on
page 56.
Add the impact score as a predicate in custom policy rules where you can apply common
mitigation for user activities with similar impact score level. For more information, see
"Configuring custom policies" on page 80 and "Custom access policy predicates" on
page 88.
Send the impact score to a SIEM in the activity record. For more information, see "Setting
up SIEM / syslog integration" on page 259 and "Activities and alerts CEF mapping" on
page 262.
Note: Not all real-time assets have been mapped to include an activity impact score. If a
real-time asset is unmapped, an activity impact score is not shown for the asset.
For more information about the columns available in the Audit Log, see "Audit log column
descriptions" on page 56.
To navigate through the pages, click the arrows next to the number of the activities above the
table.
To filter the log results:
Note: The filter values are dependent on the values available for that table and can
differ from the values shown in the images above and below.
3. Expand the new filter, select the filter option, then click Apply.
4. To save the current filters as a search, click the bookmark button to the right of the Add
filters field, type a name for the search, and click the save button.
To configure the displayed columns and their order, click the button.
To export the table to a CSV file, click . To refresh the display, click .
Note: The CSV export is limited to the past 30 days or 100,000 entries, whichever is lower.
To limit the logs to represented activities from a recent specified time period, select the time
period:
Time The date and time when the activity took place (adjusted to the Forcepoint
CASB administrator's time zone).
This column is labeled Activity Date in the Service Provider Logs Audit Log.
Account The account used to access the cloud service (sAMAccountName if the
Active Directory connection is set; otherwise, the login name).
Asset The asset name assigned with the cloud service (e.g., My Office365).
Anomaly A flag indicating if the activity is a breach of a Forcepoint CASB policy (Yes)
or not (No).
Severity The severity assigned with the Forcepoint CASB policy breached by the
activity. If more than one policy was breached, the highest severity across
these policies is displayed. This column is empty if no policy was breached.
Action The activity performed by the user (e.g., view page, delete file).
Target The activity's destination subject (e.g., the email destination, the
person/group a file is shared with, the user account when an admin changes
permissions)
Client location The geographic location from which the user activity was detected.
Mitigation Action The mitigation action taken by Forcepoint CASB as a result of the policies
breached by the activity.
Record The record type depends on the action type. For example, when the user
action is File Upload, the record contains the file name.
Message The activity subject (e.g., the email subject, chat message, or searched
content).
Impact Score The impact score given to the activity by Forcepoint CASB. For more
information, see "About the activity impact score" on page 51.
Service Type The sub-service used (e.g., Outlook Web Access or SharePoint Online for
Office 365).
Full Name The full name of the user. This data is retrieved from the Active Directory if
integration is in place; otherwise, it is empty.
Category The data object category (i.e., logical group based on the cloud service
modules).
Data types The total number of matched data types in the activity.
occurrences
Managed A flag indicating if the device used to access the service is “Managed” or
“Unmanaged” by Forcepoint CASB.
Admin A flag indicating if the user performing the activity is an administrator (Admin)
or a user (User).
Is sensitive data A flag indicating whether the data detected in the activity is sensitive (Yes)
or not sensitive (No).
Title The title of the user. This data is retrieved from the Active Directory if
integration is in place; otherwise, it is empty.
Department The business unit of the user. This data is retrieved from the Active Directory
if integration is in place; otherwise, it is empty.
OS Username The user name for the account logged in to the operating system of the
computer used for the activity (available only when the Forcepoint CASB
endpoint agent is deployed).
Endpoint OS The operating system of the endpoint used for the activity.
This column is labeled Device OS in the Service Provider Logs Audit Log.
Service Location The geographic location of the cloud service (based on destination IP).
Authentication The authentication method used for the activity (e.g., form authentication).
Type
This column is labeled Authentication in the Service Provider Logs Audit
Log.
In addition, Forcepoint CASB hides some columns from the default view. These columns can be
added to the Audit Log view by selecting them from the Manage Columns menu.
Source IP The detected category based on the source IP address for the IP
reputation Reputation service. The category can be either Anonymous proxies,
Suspicious IPs, or Tor networks.
TOR Networks The IP addresses of the Tor networks detected in the activity.
Anonymous The anonymous proxy IP addresses of the Tor networks detected in the
proxies activity.
Suspicious IPs The suspicious IP addresses of the Tor networks detected in the activity.
Follow Up The mitigation actions taken after the activity is detected (e.g., Remove
Mitigations sharing permissions).
Note: The summary charts displayed in the Activity Audit dashboards might differ from
those shown in the above example. The Activity Audit dashboards gather information from
For tracking user access behavioral patterns, from each chart you can click Investigate to view
additional charts. For each value of the parent chart, Forcepoint CASB displays a group of child
charts including only activities matching that value.
For example, if you notice activity from an unexpected location in the Active Locations chart, you
can click Investigate to view a group of charts for each location, where you could check if users
from the suspicious location are accessing any sensitive data objects:
Note: Similar to the parent charts on the Activity Audit dashboards, the summary charts
displayed in the child charts might differ from those shown in the above example. The child
charts gather information from components within Forcepoint CASB. If a component is not
set up, the chart is not displayed.
For another example, if you notice a significant number of unmanaged endpoints listed in the
Dashboard, you could click Investigate to check if there is a correlation with any particular OS.
This might indicate a problem with the distribution of endpoint routing solutions.
In the main Dashboard page or in any page of child charts:
Forcepoint CASB analyzes all incoming user activity and compares it to the policies
defined for that asset. If the user activity matches a policy, Forcepoint CASB applies
CHAPTER 5
Note: Quick and custom policies must be configured to match the user data
activity type. User activity control, DLP, anomaly detection, and quick policies
can be set up to mitigate both Proxy-based activities (i.e., realtime activities)
and API-based activities (i.e., service provider log activities). User access
management policies are only available for Proxy-based activities.
Access policies 64
Anomaly detection policies 70
Data leak prevention policies 75
Custom policies 79
1. In Forcepoint CASB, go to Audit & Protect > Security Policies > User Access
Management, select the relevant asset, then enable the relevant policies.
2. Some policies, when enabled, present configuration options. See the table below.
3. Optionally, select Apply Changes to All Assets to save these policy changes for all
assets.
4. Click Save Access Policies.
Client Locations Allow access only from Select allowed source countries
specified countries
Endpoint Management Allow access only from Select what to block from
managed source devices unmanaged devices: all
access, or just downloads
and/or data modifications
Configure enrollment
criteria
IP Reputation Block access from risky IP Select to block access from Tor
addresses networks, suspicious IP addresses,
or anonymous proxies. To add
exceptions to the restricted list,
configure the trusted IP addresses.
1. In Forcepoint CASB, go to Audit & Protect > Security Policies > User Activity
Control:
2. To find which of the displayed category or categories includes a specific data object, use
the Search field.
3. Expand the relevant data category:
4. Select one or more Data Objects to include in the rules, or select Select all to add all
available data objects.
5. Click Add Rule:
To change the status of the policy, click the toggle until it shows the desired status.
You can also change the status when you edit the policy. For information about editing an anomaly
detection policy, see "Configuring anomaly detection policies" on page 72.
3. Optionally, select Apply Changes to All Assets. This option is effective if authentication
is via an IdP, or if the user name is an email address. If you do not select this option, the
changes here apply to the current asset only.
4. Click Save.
1. In Forcepoint CASB, go to Audit & Protect > Security Policies > Anomaly Detection.
2. Go to a policy you want to edit, then click the edit icon:
1. In Forcepoint CASB, go to Audit & Protect > Security Policies > Data Leak Prevention
for the relevant asset:
2. To find categories including a specific data type, use the search field.
3. Expand the relevant policy:
A policy can be configured to be triggered only if the condition is met a specified number of times in
a session. You can set the policy's severity level, alert notifications, and enforcement actions, and
you can exclude users from the policy.
The What > Data Object Category predicate categorizes data objects as in Data Access
policies.
To change the status of the custom policy, click the toggle until it shows the desired status.
You can also change the status when you edit the custom policy. At the top of the custom policy's
Editor page, select the status from the drop-down.
1. In Forcepoint CASB, go to Audit & Protect > Security Policies > Custom Policy
Editor, select the relevant asset, and do one of the following:
To add a new policy, click Add policy:
To edit an existing policy, find the policy in the table, then click the pencil icon:
To add a Boolean operator, click AND, OR, NOT, (, or ) under the Choose
Operations section.
Parameters and operators are added at the insertion point ( ). To set the insertion
9. To set the policy to be triggered only if the condition is met a specified number of times in a
session, click Set Occurrences:
Select Only if the policy condition is met __ times within a session, then
type the number of occurrences, to identify the user activities that matches this
custom policy only if they recur a specific number of times in one day.
Select On any event that matches the policy condition to apply this policy
to every user activity that matches this custom policy.
b. Click Save.
10. To configure the custom policy settings for Incidents, click Incident Settings.
The list of notifications shown here come from the Notifications settings page. To create
Who Login name String: exact / partial / RegEx Username used to log into
the service asset
Custom1 String: exact / partial / RegEx User's custom data from the
Custom2 known user directory. See
Custom3 "Providing a user directory"
on page 182.
OS Username String: exact / partial / RegEx User name for the account
logged in to the operating
system of the computer used
for the activity
Data object ID String: exact / partial / RegEx The ID assigned to the data
object
Message String: exact / partial / RegEx The activity subject (e.g., the
email subject, chat message,
or searched content)
Impact Score Critical / High / Medium / The impact score given to the
Low / Custom activity by Forcepoint CASB.
See "About the activity
impact score" on page 51.
Forcepoint CASB provides visibility into the user activity performed on your
organization's sanctioned cloud applications. By providing this visibility, you can apply
CHAPTER 6
controls, such as policy-based access controls, and build a user behavior profile to
detect anomalous behavior that suggests an account takeover of malicious intent.
The Audit & Protect dashboard provides the visibility into a user's activities. From
there, you can drill-down to the activities and incidents that affect the security posture
of your organization.
This chapter discusses the following:
The Audit & Protect dashboard includes three areas, as explained in the following sections.
Policy violations
The Audit & Protect Dashboard displays the number of policy violations, grouped by:
Anomalies: Includes accounts where violations of the Anomaly detection policies were
detected.
Top High Risk Users: Includes the top 5 user accounts in the organization that are
considered high risk (based on risk level).
Custom Policies: Includes accounts where violations of custom policies were detected.
To view violation details by accounts and to handle violations, click the number:
Forcepoint CASB opens the Accounts page, filtered to display accounts that violated the policy.
There, you can handle the violations.
The Audit & Protect dashboard separates these summaries by monitoring type: Real-time
Monitoring Activity Analysis and Service Provider Logs Activity Analysis. To configure
which summaries are displayed, click :
To view represented activities in the Analytics page, click a number or account in the summary:
Hover the mouse pointer over a policy violation or activity summary, and drag the onto a
detail widget:
Forcepoint CASB analyzes user activity to determine if the activity breaks a policy
rule. If the activity breaks a policy rule, it becomes an alert. Forcepoint CASB then
CHAPTER 7
analyzes all incoming alerts for similarities, such as a common alert type or user
account. These similar activity alerts are grouped together into an Incident record.
Incidents let you see and understand the overall problems affecting your network,
instead of searching through and investigating the multiple individual symptoms of the
problem. For example, you can review a list of incidents and quickly see a Brute Force
attempt on your network instead of searching through potentially thousands of alerts to
find each Brute Force alert and investigate every alert to see if they are connected.
By combining these alerts into a single incident, the alerts in the incident can be
monitored, acknowledged, or ignored either individually or as a group.
For more information about the columns available in the Incidents log, see "Incidents log
column descriptions" on page 106.
3. Expand the new filter, select the filter option, then click Apply.
4. To save the current filters as a search, click the bookmark button to the right of the Add
filters field, type a name for the search, and click the save button.
5. To load the saved search, click the button to the right of the Add filters field and select the
search from the Load search list.
To configure the displayed columns and their order, click the button.
Acknowledge those incidents in the security dashboard: New alerts will no longer be
added to the incidents. These incidents will continue to impact the user's risk score, but will
be removed from the security dashboard. Acknowledged incidents are still displayed in the
Incidents Log with a status of Acknowledged.
Ignore those incidents: (Optional) The incidents are no longer displayed in the account's
incident timeline or impact the user's risk score. Ignored incidents are still displayed in the
Incidents Log with a status of Ignored.
Last Updated The date and time when the last activity attached to the incident took place
(adjusted to the Forcepoint CASB administrator's time zone).
Incident Name The rule name to which the incident relates. If you move the mouse over the
Incident Name, Forcepoint CASB displays a tooltip of the rule's description.
Account The account used to access the cloud service (sAMAccountName if the
Active Directory connection is set; otherwise, the login name).
Full Name The full name of the user. This data is retrieved from the Active Directory if
integration is in place; otherwise, it is empty.
Incident The date and time Forcepoint CASB detected the incident. This is the time
Detection Time Forcepoint CASB processed the data and can be days after the first
activities.
Mitigation Action The mitigation action taken by Forcepoint CASB as a result of the policies
breached by the incident.
Follow-Up The mitigation actions taken after the incident is created (e.g., Remove
Mitigation sharing permissions).
Severity The severity assigned with the Forcepoint CASB policy breached by the
incident. If more than one policy was breached, the highest severity across
these policies is displayed. This is empty if no policy was breached.
State The status of the incident based on the workflow actions. The incident could
be:
First Alert Time The date and time of the first alert attached to the incident (i.e., the alert that
created the incident).
Last Alert Time The date and time of the current last alert attached to the incident.
Asset The asset name assigned with the cloud service (e.g., My Office365).
In addition, Forcepoint CASB hides some columns from the default view. These columns can be
added to the Incidents log view by selecting them from the Manage Columns menu.
To open an incident record, either double-click the incident row, or select the row and click the
button on the right side.
Incident details
User Profile
Alerts table
The incident details area displays general information about the incident, such as:
Severity: The incident severity is calculated based on the severity of the individual alerts
within the incident record.
Mitigation: The mitigation action is based on the mitigation actions of the individual alerts
within the incident record.
Source: The source corresponds to the activity audit type: Real-time (proxy-based
activity) or Service-logs (API-based activity).
Created date: The date and time when Forcepoint CASB detected the incident. This date is
also referenced in the Action Log.
Last Updated date: The date and time when the incident record was last updated, either
automatically by Forcepoint CASB or manually by an administrator. This date is also
referenced in the Action Log.
You can view the Incidents log's previous incident record by clicking the previous arrow at the top
of the incident record. To view the next incident, click the next arrow.
To perform a workflow action for a singe incident:
1. From an incident record, click Workflow.
2. The incident's workflow actions screen opens:
3. Select an action:
Acknowledge this incident in the security dashboard: Existing violations of this policy
will no longer be listed. This incident will continue to impact the user's risk score
calculation, but will be removed from the security dashboard. Acknowledged incidents are
still displayed in the Incidents Log with a status of Acknowledged.
Ignore this incident: (Optional) The incident is removed from the user's Account page and
Add <user> to the exception list of this rule: This user account will no longer trigger a
violation of this policy.
The User Profile provides details, such as email address, job title, risk score, typical locations,
typical devices, and the asset, about the user account connected to this incident.
You can also view the user's detailed account page (see "The Detailed Account page" on
page 130.)
The Alerts table provides a list of the alerts from the last 30 days that contribute to this incident:
This table displays a summary of important alert information from the last 30 days. To view the
alerts in the more detailed activity audit log, or to see alerts older than 30 days, click the button
under the table. This opens the list of alerts in either the Realtime Monitoring or Service Provider
Log audit log, depending on the source identified at the top of the incident record. See
"Investigating activity logs" on page 53 for more information.
3. Select an action:
Add <user> to the exception list of this rule: This user account will no longer trigger a
violation of this policy.
User risk
Understanding user risk is a key action toward optimizing the security analysis and investigation
time. Attending to multiple alerts across many enterprise accounts is not an ideal use of a security
analyst’s time. Understanding which user in the organization currently poses the most risk and
attending to the key issues about their account is a much more focused approach and one that
prioritizes attending to the key risks to the organization first.
Forcepoint CASB assigns a risk score to every user and highlights the risk as part of the key
dashboards in the management portal, allowing the administrators to attend to the riskiest issues
first.
A risk, by definition, is the combination of the probability of something bad happening, and the
impact on the organization if something bad happened. Forcepoint CASB leverages this approach
to determine the potential risk of users.
The probability is determined based on past behavior and the severity of the current action. The
impact is determined by many factors, such as the access level of that user for sensitive data or
their privileges at the service.
The risk score is calculated based on the above and every incident that takes place may modify
the user risk. Further to that, the risk decays over time and if no new incidents are introduced for
this user, after a while the risk score will reset.
Incident risk scores (which contribute to the user risk score) can be adjusted by the customer
administrator by assigning different risk levels with different policies. The customer administrator
The User Risk Dashboard displays six summary areas: Users at Risk, Top High Risk Users,
Watchlist, Organizational Behavior, Top Business Units at Risk, and Organizational Geographic
Risk. Each area is explained in the following sections.
Note: User accounts are connected to specific Cloud service assets. Because a person
within your organization can have accounts for several assets, they can have more than
one user account listed on the User Risk Dashboard.
Users at Risk
This section provides an overview of the users at risk, separated by Admins & Power Users and
Non Admin Users.
Watchlist
The Watchlist allows you to mark specific users to closely monitor them over time. After a user is
added to the Watchlist, they can be monitored from the User Risk Dashboard.
The User Risk Dashboard displays the top 15 user accounts, based on risk score. To view the list
of all watched users, click All Watched Users. Forcepoint CASB opens the Accounts page,
filtered to only display the list of watched users. From the Accounts page, you can view the
Detailed Account Page for an individual user.
All users on the Watchlist are denoted by a black star. This star is always visible either next to the
user's image, or next to their name. The icon ON WATCHLIST also is displayed on the user's
Detailed Account Page.
Organizational Behavior
This section displays a chart of activity and incidents for your organization over the past 30 days.
Incidents are displayed above the date, while activities are displayed under the date.
Hover over the date, incident bar, or activity bar to display the numbers of incidents and activity for
that date. Click it to open the Incidents page with the table of incidents filtered for that date.
To display the Incidents page with all incidents, click All Incidents. For more information about
incidents, see "Monitoring and Investigating Alerts and Incidents" on page 101
Note: Business unit data is retrieved from Active Directory. If Active Directory is not set
up, or if business units are not available for your organization, then this section will not
display any information.
Note: The filter values are dependent on the values available for that table and can
differ from the values shown in the images above and below.
3. Expand the new filter, select the filter option, then click Apply.
5. To load the saved search, click the button to the right of the Add filters field and select the
search from the Load search list.
To configure the displayed columns and their order, click the button.
To export the table to a CSV file, click . To refresh the display, click .
Select the Release Accounts action to release an account that is blocked due to a policy breach.
Accounts are blocked if the policy action is set to Block Account.
Account The account used to access the cloud service (sAMAccountName if the
Active Directory connection is set; otherwise, the login name).
Last Activity The date and time when the last activity was detected on the account.
Admin / User A flag indicating whether the account is an administrator (Admin) or a user
(User), as detected in the Users and Configuration Governance scan on the
asset.
Full Name The full name of the user. This data is retrieved from the User Directory if
integration is in place; otherwise, it is empty.
Title The title of the account. This data is retrieved from the Active Directory if
integration is in place; otherwise, it is empty.
Business Unit The business unit of the account. This data is retrieved from the Active
Directory if integration is in place; otherwise, it is empty.
High Risk A flag indicating whether the account is considered high risk (Yes) or not
(No). This flag is based on the account's current risk score.
Asset The asset name assigned with the cloud service (e.g., My Office365).
Locations The geographic locations from which the account's activities were detected.
Account Status A flag indicating whether the account is blocked due to rule enforcement
(Blocked) or not blocked (Active).
Last Incident The date and time when an incident attached to the account was last
updates updated.
In addition, Forcepoint CASB hides some columns from the default view. These columns can be
added to the Accounts table by selecting them from the Manage Columns menu.
Watched A flag indicating whether the account is on the Watchlist (Yes) or not (No).
Scan ID The ID of the last internal Users and Configuration Governance scan where
the account took part.
Governance Last The date and time of the last activity on the account that was detected by the
Activity Users and Configuration Governance scan.
Internal Location A flag indicating whether the account's location is considered an internal
location (Yes) or an external location (No). This is based on your
organization's internal IP ranges settings.
User image: An image of the user retrieved from Active Directory. If no image is available, a
placeholder image is used. If the user is on the Watchlist, a black star is displayed in the
lower left corner of the image.
Asset: The asset associated with this account.
Email address: The user's email address. This information is retrieved from Active
Directory.
User name: The full name of the user. This information is retrieved from Active Directory.
Job title: The job title of the user within your organization. This information is retrieved from
Active Directory.
Comments: A list of all comments added by the Forcepoint CASB administrators for this
account. Each comment displays the date, time, and Forcepoint CASB account email
address of the administrator who added the comment. To add a new comment, click
Comments, add the new comment in the text field, then click Add.
Actions button:
l Delete Account: This option removes the account from Forcepoint CASB.
Forcepoint CASB removes all data associated with this account: Incidents, Alerts,
Warning: Deleting an account removes this user account and all user
activities from the Forcepoint CASB records. Although the user record can
be added back if the user performs new activities, the deleted activities are
permanently deleted from Forcepoint CASB and cannot be recovered.
l Add to Watchlist/Remove from Watchlist: This option adds the user to your
Watchlist. The Watchlist is available from the User Risk Dashboard, and provides
a quick way to view all accounts you wish to track.
See detailed user page button: Click this button to open the user's Detailed Account
Page. For more information, see "The Detailed Account page" on page 130.
Locations: The Locations from which this account has connected to the asset. When the
area is collapsed, Locations displays an image of the country flag for the top locations used
with this account (up to 5). When expanded, Locations displays the image of the country
flag, the name of the country, and the date when the user last connected from that location.
If there are more than 5 locations associated with this account, a link to view all of the
locations is displayed next to the Locations heading. Click the link to display a list of all
locations. This list displays the image of the country flag, the name of the country, and the
date when the user last connected from that location.
Devices: The devices from which this account has connected to the asset. When the area
is collapsed, Devices displays an image of the operating system for the top devices used
with this account (up to 5). When expanded, Devices displays the image of the operating
system, the name of the operating system, and the date when the user last connected from
that device.
If there are more than 5 devices associated with this account, a link to view all of the
devices is displayed next to the Devices heading. Click the link to display a list of all
devices. This list displays the image of the operating system, the name of the operating
system, and the date when the user last connected from that device.
Investigate
l All user activities: Click this link to display the two options: Realtime activities and
API-based activities. Clicking Realtime activities opens the Realtime Monitoring
Audit Log. Clicking API-based activities opens the Service Provider Log Audit Log.
Each Audit Log is filtered to display the incidents associated with this account and
asset.
For more information about Realtime and API-based activities, see "Activity audit
types" on page 48.
To remove a displayed account (as filtered by search) from the list until they perform any more
activities, click Actions>Delete Account:
Warning: Deleting an account removes this user account and all user activities from the
Forcepoint CASB records. Although the user record can be added back if the user performs
new activities, the deleted activities are permanently deleted from Forcepoint CASB and
cannot be recovered.
To view the user's detailed information, including a timeline of incidents and activities, click See
detailed user page. For more information about the detailed user page, see "The Detailed
Account page" on the facing page.
User profile
User Behavior
Incident Timeline
This area displays the following account information for the user:
User image: An image of the user retrieved from Active Directory. If no image is available, a
placeholder image is used. If the user is on the Watchlist, a black star is displayed in the
lower left corner of the image.
Risk score: The overall risk score associated with this user account. The risk score is the
sum of the scores from all incidents associated with this account.
Asset: The asset associated with this account.
User name: The full name of the user.
Job title: The job title of the user within your organization.
Comments: A list of all comments added by the Forcepoint CASB administrators for this
account. Each comment displays the date, time, and Forcepoint CASB account email
address of the administrator who added the comment. To add a new comment, click
You can also expand the user profile area by clicking the button in the top right corner of
the area. To collapse the area, click the button.
Locations: The Locations from which this account has connected to the asset. When the
area is collapsed, Locations displays an image of the country flag for the top locations used
with this account (up to 5). When expanded, Locations displays the image of the country
flag, the name of the country, and the date when the user last connected from that location.
If there are more than 5 locations associated with this account, a link to view all of the
locations is displayed next to the Locations heading. Click the link to display a list of all
locations. This list displays the image of the country flag, the name of the country, and the
date when the user last connected from that location.
Devices: The devices from which this account has connected to the asset. When the area
Incidents are displayed above the date, while activities are displayed under the date. Above the
chart, there is a graph that displays the risk score timeline. The area in red denotes the risk score
number. As the risk score increases, the graph line goes higher and the amount of red space
increases. This provides a quick visual cue of the account's risk score.
Hover over the date, incident bar, activity bar, or risk score graph to display the numbers of
incidents and activity, along with the risk score, for that date. Click to open the Incidents page,
with the table of incidents filtered for that date.
Incident timeline
The Incident Timeline displays the latest Incidents associated with the user account in
chronological order, with the latest Incident at the top of the timeline.
Incident time: The date on which the incident occurred is displayed above the timeline of
incidents for that date. The time at which the incident occurred is displayed on the left side
of the Incident record.
Type of Policy Violation: The Incident record displays an icon to visually identify the type of
policy violation. The record also displays the affected rule (e.g., Suspicious volume of
downloaded data originating from a high-risk source IP) and policy (e.g., Compromised
Insider).
Risk Score change: The number of points from this incident that are added to the user's
overall risk score. This number decreases over time.
Asset: The asset associated with this account.
Note: If the mitigation action for the incident is Block, a icon is displayed next to the risk
score.
When you hover over the Incident record, it expands to display additional information:
To view more Incidents, select one of the following options at the bottom of the timeline:
Expand Timeline button: Click this button to display all earlier incidents in the timeline.
The earlier incidents are added to the bottom of the timeline.
See all in Incidents Log link: Click this link to open the Incidents page, with the table of
incidents filtered by this account and asset. For more information about the Incidents log,
see "The Incidents log" on page 102.
For managed assets, Forcepoint CASB can provide information about cloud account
configuration and deployment, and stored and shared sensitive organizational
information.
The following types of governance features are available:
CHAPTER 9
Amazon AWS
Box
Dropbox
Google G Suite
Office 365
Salesforce
Statistics on recent usage, and configured administrative user accounts, providing insight
on account ownership:
If you have unmonitored accounts, the number of unmonitored accounts is displayed under
the total number of Users and Admins. Forcepoint CASB does not display unmonitored
accounts in the Users and Configuration governance report.
Violations of configurable regulatory standards and organizational policy:
By each policy violation and user account category, you can Create Task.
You can product an Excel spreadsheet that contains user information.
You can produce a PDF report with configurable sections similar to the Governance dashboard:
2. By the relevant policy violation or user account category, click Create Task:
b. Under Excessive Rights Settings, set the number of days after which an unused
user account is considered dormant:
d. Under Advanced Settings, configure the number of days after which newly-found
items (policy violations or excessive-right users) should no longer be marked as new.
4. Click Save Changes.
5. Upon scan completion, notifications are sent as configured. These notifications include
information about changes relative to the previous scan.
Optionally, set an Average Price Per User, to be used for calculating Overspend:
3. For Forcepoint CASB to properly parse activity logs received from the service, enter the
Date Format in which the service displays the date and time for activities. To view format
syntax, click What is a valid format?.
4. Click Save Changes.
Changes take effect only upon the next scan.
Office 365
Box
Google G Suite
Dropbox
ServiceNow
Salesforce.com
Amazon Web Services (AWS)
Cisco Webex
Scan locations, schedules, and the data types to be matched are configurable by policy.
Forcepoint CASB displays the latest scan results in a high-level dashboard that can drill down to
specialized reports, and also in the detailed and comprehensive File Analytics.
Scan results from multiple policy scans are aggregated per-asset; found files' originating policies
are listed in File Analytics.
What Sensitive Data Was Found: The most common data types found
What data categories or regulations are involved: The most-found data type categories
(predefined, as appearing in DLP policies)
Who owns the sensitive documents: The owners (as defined by the storage asset) of
most-found files
What findings resulted from each policy: The scan policies that produced most results
Click any number to drill-down to represented files in File Analytics. To view a detailed report
based on any of the above criteria, click Investigate.
The following reports are available for investigating content that has been publicly shared:
Data Type: This report displays the shared content that matches data types associated
with specific regulations.
Data Category: This report displays the shared content sorted by the data categories
defined in DLP policies.
Content Owner: This report displays the shared content sorted by the file owners defined
by the storage asset.
You can reach reports from the Data Classification dashboard by clicking Investigate Data, or
from Compliance > asset > Data Classification > Reports > report type:
Found files are arranged in either a pie chart or a bar chart. Click the icon in the upper right corner of
the chart pane to switch between the pie chart and the bar chart. Below the chart, each value is
listed in a table, along with information about the files relevant to that value. You can further sort
and filter the table.
Each row of the table represents a file. Click within a row to open the file's detailed view on the
right side of the screen. The detailed view displays information about the file, including type of
sensitive date found and the number of occurrences, the sharing permissions, and the file's owner.
For more information about the columns available in the File Analytics table, see "File Analytics
table column descriptions" on page 160.
You can view a log of changes to the file as found in previous scans. Click Scan history to open a
table of changes from previous scans:
If a Malware Inspection policy finds a file infected with malware, the Detected Malwares, File
Infection Status, and Malware Risk columns are populated. Also, the file's detailed view
displays the malware name and severity level (as a triangular icon filled with the severity level's
color code) in the Malware Inspection Results section. To view a detailed analysis report in PDF
format, click see report.
To sort by any column (ascending / descending), click the column header.
To filter the table by any column value:
3. Expand the new filter, select the filter option, then click Apply.
4. To save the current filters as a search, click the bookmark button to the right of the Add
filters field, type a name for the search, and click the save button.
5. To load the saved search, click the button to the right of the Add filters field and select the
search from the Load search list.
To export the table to a CSV file, click . To refresh the display, click .
To scan stored files for malware infection, you must first create a Data Classification policy and
select Malware Inspection as the Content. For more information, see "Configuring Data
Classification policies" on page 163.
Forcepoint CASB then scans the stored files, identifies files infected with malware, and applies
the mitigation actions recorded in the policy. For a list of file types analyzed by the Advanced
Malware Detection add-on, see "Advanced Malware Detection supported file types" below.
.docm Microsoft Office Word document, Office Open XML format, with macros
.dotm Microsoft Office Word document template, Office Open XML format, with
macros
.dotx Microsoft Office Word template document, Office Open XML format
.potx Microsoft Office PowerPoint template document, Office Open XML format
.ppsm Microsoft Office PowerPoint Slideshow, Office Open XML format, with mac-
ros
.pptm Microsoft Office PowerPoint document, Office Open XML format, with mac-
ros
.pptx, .ppsx Microsoft Office PowerPoint document, Office Open XML format
.xlam Microsoft Office Excel add-in, Office Open XML format, with macros
.xlsb Microsoft Office Excel document, Office Open XML format, with macros and
binary storage
.xlsm Microsoft Office Excel document, Office Open XML format, with macros
.xltm Microsoft Office Excel spreadsheet template, Office Open XML format, with
macros
.xltx Microsoft Office Excel template document, Office Open XML format
Last Inspected The date and time when the file was last inspected by Forcepoint CASB.
File Name The name of the file, including the file extension.
Sensitive Data A list of the sensitive data found in the file. This information is provided in the
following format: <Data Type Category>:<Data Type Name>(<Data Type
Occurrences).
Occurrences The total number of times the sensitive data was found in the file.
3rd Party The name of the 3rd party who analyzed the file. This is currently the ICAP
Analysis connector's name.
Shared With A list of accounts (both internal and external) that the owner is sharing the file
with.
Owner The full name of the file's owner. This data is retrieved from the User
Directory if integration is in place; otherwise, it is empty.
File Path The directory path of the file on the cloud service.
Mitigation Status The mitigation action taken by Forcepoint CASB as a result of the policies
breached by the file.
Archive Path The archive folder location, if the file was quarantined or copied by
Forcepoint CASB.
Modification The date and time when the file was last modified.
Time
Creation Time The date and time when the file was created.
Access Time The date and time when the file was last accessed by any account.
Detected A list of malware found in the file by the Advanced Malware Detection
Malwares service.
An Advanced Malware Detection add-on license is required to gather this
information.
Malware Risk The risk level associated with the malware found in the file (e.g., Critical,
High, Medium, or Low).
An Advanced Malware Detection add-on license is required to gather this
information.
File hash The internal file hash record made by Forcepoint CASB.
In addition, Forcepoint CASB hides some columns from the default view. These columns can be
added to the File Analytics table by selecting them from the Manage Columns menu.
Data Type A list of all the data types found in the file.
Data Type A list of all the data type categories found in the file.
Category
Note: Scan by sharing status is only available for Office 365, Box, Dropbox, G
Suite, and AWS assets.
8. For the policy to run automatically, on the Schedule tab, select the frequency and
scheduling for scans:
Some assets have Audit only as the only available option, but some assets (like Office
365) list all mitigation actions available for API-based assets:
Audit only: Forcepoint CASB audits the scan results for all sensitive or infected
files matched by this policy. The scan results will appear in the Data Classification
dashboard, file analytics, and reports.
Remove sharing permissions (Office 365, Google G Suite, Salesforce, and Box
only): Forcepoint CASB will remove the sharing permissions for all or a partial set of
For managed assets, the Encryption Broker service leverages a bring your own key
(BYOK) capability offered by the cloud services. Forcepoint CASB connects to your
CHAPTER 10
key management service (KMS) through an API connection to access your encryption
keys. Then, Forcepoint CASB connects to the cloud service through another API
connection, where the data is encrypted and decrypted based on the key provided by
Forcepoint CASB from the KMS.
Enabling Forcepoint CASB as your encryption broker requires the following steps:
Forcepoint CASB provides an easy interface within the management portal to define
the key rotation policies and enforce those policies across services.
Note: Currently, Forcepoint CASB only supports Office 365 OneDrive and
SharePoint Online with the Azure Key Vault KMS.
Note: You can only create one data encryption policy per asset.
Configure the data encryption policy: Saves the data encryption policy. You must
specify the KMS, keys, and key rotation plan before saving the data encryption policy. For
more information, see "Configuring the data encryption policy" below.
Disable the data encryption policy: Stops running the data encryption policy, but keeps
the configuration details in case you want to restart the policy in the future. For more
information, see "Disabling and enabling a data encryption policy" on page 176.
Reset the data encryption policy: Stops running the data encryption policy and removes
all configuration details in case you want to change the policy's configuration. For more
information, see "Resetting a data encryption policy" on page 177.
Identify the key sources and keys to be used with the data encryption policy.
Save the data encryption policy.
Configure the key rotation plan.
The configuration steps vary depending on the cloud service asset. Currently, Forcepoint CASB
only supports Office 365 OneDrive and SharePoint Online with the Azure Key Vault KMS.
For more information about configuring the KMS and keys for the Office 365 data encryption policy,
see "Configuring the Office 365 data encryption policy" on the next page.
For more information about setting up a key rotation plan, see "Setting a key rotation plan" on
page 174.
2. Under Key Source and Key(s), set the Primary key vault and key:
a. Select a key vault from the Azure Key Vault drop-down menu.
If you do not have an available key vault, click Create New AKV to create one. For
more information about creating a new Azure Key Vault KMS, see "Adding a new
Office 365 key management service" on page 213.
After you select a key vault, the Key drop-down menu populates with the keys
available in that key vault. Only keys that are enabled, do not have an expiration date,
and are not used by other policies are available.
b. Select an available key from the Key drop-down menu.
Important: If your key rotation plan is not set to None, changing the keys on an
active, enabled policy will trigger an immediate key rotation when you save the
changes.
After the policy is saved, Forcepoint CASB logs all operations within the scope of the data
encryption policy to the data encryption audit log. Also, the key rotation plan starts if you set one
up. For more information, see "Setting a key rotation plan" below.
b. Regulation-Based Rotation: This option allows you to set your rotation schedule to
comply with specific regulations:
NIST: rotates the keys every two years.
PCI: rotates the keys every one year.
c. Custom: This option allows you to set a rotation schedule that is set to a specific time
interval. In the field, type a number, then select either weeks, months, or years from
the drop-down menu.
For example, to rotate your keys every two weeks, type 2 in the field and select weeks
from the drop-down menu.
3. Click Save.
After the key rotation schedule is saved, the rotation status information updates:
Last Rotation displays the date and time when the keys were last rotated.
Key(s) Rotation State displays the status of the last key rotation:
l Rotated Successfully: The last rotation was successful. The key rotation plan is now
waiting for the next rotation.
l In Progress: The keys are currently under rotation. Key rotation can take a while to
complete.
l Failed: The last rotation was unsuccessful.
Next Rotation displays the upcoming date when the keys will be rotated. If the key rotation
plan is set to None, this entry is blank.
Important: The exported keys are not the actual keys that are being used to encrypt the
data at the cloud service; they are only a backup. The exported keys are encrypted by
KMS, so the exported keys can only be imported back to the same KMS instance. In
addition to being encrypted by the KMS, the keys are stored encrypted within Forcepoint
CASB for extra safety.
Note: Active keys can only be exported after a successful key rotation and cannot
be exported when a key rotation is in progress.
3. Forcepoint CASB downloads the active keys from your last successful key rotation to your
local endpoint machine. For Office 365, the keys are downloaded in a ZIP file.
Returns all policy settings (i.e., KMS, keys, rotation plan) to the default values.
Stops the key rotation plan.
Stops all actions on the asset. (Configuration on the asset side is left as-is.)
Updates the data encryption audit log to reflect that the policy has been reset.
Clears the Used By Asset column in the Keys table.
Removes the active keys backup.
1. In Forcepoint CASB, go to Compliance > Encryption Broker > Data Encryption Audit
Log.
2. Select the relevant asset from the top left list of assets.
3. The audit log appears:
To navigate between pages, click the arrows next to the number of the activities above the table.
To sort by any column (ascending / descending), click the column header.
To filter the table by the values of any column:
Note: The filter values are dependent on the values available for that table and can
differ from the values shown in the images above and below.
3. Expand the new filter, select the filter option, then click Apply.
4. To save the current filters as a search, click the bookmark button to the right of the Add
filters field, type a name for the search, and click the save button.
5. To load the saved search, click the button to the right of the Add filters field and select the
search from the Load search list.
To configure the displayed columns and their order, click the button.
To export the table to a CSV file, click . To refresh the display, click .
This chapter explains how to configure various aspects of the Forcepoint CASB
system that are relevant to all managed assets. Configuration tasks that apply to
service assets individually are explained in Managing Service Assets.
This chapter discusses the following:
You can provide Forcepoint CASB with an organizational user directory in one of two ways:
Manual file upload: Prepare a user directory file and upload it to Forcepoint CASB. To
update Forcepoint CASB with organizational changes, you’ll need to periodically upload an
updated complete file.
(Recommended) Active Directory retrieval: Provide a connection to the organizational
Active Directory to retrieve user information. If the Forcepoint CASB server cannot access
the organizational Active Directory, the Forcepoint CASB AD Agent can access the Act-
ive Directory from inside the organizational network and upload the user account inform-
ation to the Forcepoint CASB server.
To view Forcepoint CASB’s currently known user information, go to Settings > Account
Management > User Data.
Discovery information for existing scan results is not automatically updated with new user
information. To update existing Discovery information, remove the scan results, then upload them
again.
1. From the organizational Active Directory, export a CSV file and edit as necessary. The
CSV file must include a single header row and a row for each user account; it must include
13 fields (columns) with the following exact headers. Fields marked below as optional can
be with empty content, but the column and header must be defined. All field values will
appear wherever user details are displayed.
accountName
firstName
The directory is now available to Forcepoint CASB. To update Forcepoint CASB with
organizational changes, you’ll need to periodically upload an updated complete file.
Under Import Status, Forcepoint CASB displays information about the last file upload for this
You can subsequently Download the file from here, then use it as a basis for changes.
1. Obtain Active Directory connection details from your organizational Active Directory
administrator.
2. In Forcepoint CASB, go to Settings > Account Management > Organizational
Directories, then click Add Directory:
Optionally, you can provide Search Expressions and Replace Expressions to manipulate
field values as needed; the part of the field value identified by the Search Expression
regular expression (RegEx) will be replaced by the Replace Expression, which can be a
fixed string or another part of the field value identified by regular expression.
11. Optionally, you can configure custom fields to be displayed; these fields can also be used
as criteria in custom policy Who sections. To configure custom fields, under Custom
Mappings, in the left-hand column add any or all of (exactly) custom1, custom2, and
custom3, and to its right type the Active Directory fields to use for their values:
If you are not using the AD Agent, you can initiate an immediate retrieval by scrolling back up and
clicking Import Now.
If you are using the AD Agent, see "Setting up Active Directory Agent retrieval" below for more
information about configuring the AD Agent.
If you need to remove the directory from Forcepoint CASB, click Delete Directory back at the top.
To view Forcepoint CASB’s currently known user information, go to Settings > Account
Management > User Data. Mappings are reflected in this list.
Note: You must have a valid Forcepoint CASB license to download this tool. This
tool will only be visible on the Tools and Agents page if you have a valid license.
Contact Forcepoint Support if you would like to use the tool, but do not see the tool
on this Settings page.
4. Install the Forcepoint CASB AD Agent in a location that can access the Active Directory
and the Forcepoint CASB server. For redundancy, it is recommended to install and
configure the AD Agent on more than one computer.
5. Upon completing installation, the AD Agent configuration page appears. Alternatively, in the
AD Agent installation folder (usually: C:\Program Files (x86)\SkyfenceADAgent ), run
agentConfigurator.exe.
6. Configure the AD Agent. All settings are required, unless specifically marked as optional
(some have default values):
If you cannot trace the certificate presented by the proxy, and the AD Agent refuses to connect:
Creating a new administrator account (See "Creating a new administrator account" below.)
Editing an administrator account (See "Editing an administrator account" on page 198.)
Changing an administrator password (See "Changing an administrator password" on
page 200)
Locking an administrator account (See "Locking an administrator account" on page 198.)
Unlocking an administrator account (See "Unlocking an administrator account" on
page 199.)
2. On the Administrators page, click the edit icon in the Actions column to display the
Administrators Details screen.
3. Edit the administrator Detailsas necessary.
4. Click Save.
An administrator can also be manually locked out of their account by another administrator:
2. In the table, find the administrator account you wish to lock and click the lock icon.
2. On the Administrators page, click the edit icon in the Actions column to display the
Administrators Details screen.
Administrators can subsequently change their own passwords in Forcepoint CASB by selecting
the Change Password option from the Admin menu:
Define the way administrator passwords are created. For more information, see
"Configuring password restrictions" below.
Lock administrators out of their account. For more information, see "Configuring login
lockout restrictions" on the facing page.
Restrict access by IP range. For more information, see "Configuring IP address
restrictions" on page 205.
2. In the Password Restrictions section, configure the requirements needed to create a pass-
word for administrator accounts:
a. To set the password length, enter the smallest number of characters required for your
administrator passwords into the Minimum password length field in the Minimal
Password Length subsection.
Administrator passwords must be between 8 and 64 characters.
b. To require specific types of characters in the passwords, select the relevant option(s)
3. To lock administrators out of their accounts after entering an incorrect password, go to the
Failed Logins subsection, select Enable administrator lockout, and configure the
lockout options:
Allow max XX failed login attempts before account lockout: Enter the number
of times an administrator can enter a failed login before they are locked out of their
account. This number must be between 3 and 10 login attempts.
Release account after XX minutes: Enter the amount of time in which the
administrator is locked out of the account. During this time, no login attempts are
allowed. The administrator can try to log in to the account after the timer expires.
This number must be between 10 and 1440 minutes.
An account can be manually released or manually disabled by another administrator from
the Administrators settings page. For more information, see "Configuring administrator
accounts and permissions" on page 195.
4. To deactivate inactive accounts, go to the Account Deactivation subsection, select
Enable account deactivation, and configure the option:
Deactivate accounts after XX days since last successful login: Enter the
number of days in which the account does not have a login attempt. If an
administrator does not successfully login during this time period, the account is
deactivated. This number must be between 1 and 90 days.
When this setting is enabled, Forcepoint CASB immediately applies the new setting
and deactivates accounts that meet the new limit. For example, if you select 30
1. In Forcepoint CASB, go to Settings > Access Management > Single Sign On:
4. Get the IdP’s SAML 2.0 parameters and enter them in Forcepoint CASB by .
If you experience problems with the integration, click provide the SAML response XML to check
for misconfigurations.
Note: Stop monitoring affects all assets attached to the account. You cannot stop
monitoring on specific assets.
Stops displaying account data in new Users and Configuration Governance and App
Discovery reports.
Data classification file analytics is not stopped for unmonitored accounts. Forcepoint CASB
continues to scan and display the data classification files of unmonitored accounts.
Note: If you have other pending changes, such as deleting or restarting accounts,
those processes also start.
7. If you are sure that you want to stop monitoring the account, continue through the pop-up
Deleting an account
Warning: Deleting an account permanently removes all data for this account. Only delete
an account if you are sure that the account data will not be needed in the future. After an
account's data is deleted, it can not be returned.
Forcepoint recommends that you export and save any important account data before
deleting the account.
If you have stopped monitoring an account, you can also choose to delete the account from
Forcepoint CASB. When you choose to delete an account, Forcepoint CASB deletes the following
data from all assets attached to the account:
Note: You can delete an account only after you stop monitoring the account. For more
information about how to stop monitoring an account, see "Stopping account monitoring" on
page 208.
To delete an account, first make sure that you have stopped monitoring the account. The account
must be in the Configure Account Monitoring list to be deleted.
Note: If you have other pending changes, such as stopping or restarting accounts,
those processes also start.
6. If you are sure that you want to delete the account, continue through the pop-up
confirmation messages.
Warning: Deleting an account permanently removes all data for this account.
Only delete an account if you are sure that the account data will not be needed in the
future. After an account's data is deleted, it can not be returned.
Forcepoint recommends that you export and save any important account data before
deleting the account.
7. Deleting an account may take up to several days to completely remove all account data.
Some data storage is on a 30 day rotation schedule to remove data; therefore, an account is
only considered deleted after 30 days have passed from the initial deletion request.
After the account is deleted, the account remains in the table of unmonitored accounts. The
account row no longer displays the delete button, but displays the message Account was deleted
instead.
The account can be returned to monitoring, but only new data is collected. To restart account
monitoring, see "Restarting account monitoring" on the next page.
Note: Restarting monitoring affects all assets attached to the account. You cannot
restart monitoring on specific assets.
Displays account data in new Users and Configuration Governance and App Discovery
reports.
4. The Accounts Privacy page displays a message at the top of the window stating that
changes have been made. To view a list of all changes that have not been saved, click
view before save. This list includes all changes waiting to be saved: accounts to be
unmonitored, accounts to be deleted, and accounts to be returned to monitoring.
5. Click Save to save all pending changes and restart the monitoring process.
Note: If you have other pending changes, such as stopping or deleting accounts,
those processes also start.
After the account monitoring restarts, the account is removed from the Configure Account
Monitoring list.
Connect Forcepoint CASB to your existing KMS instances through an API connection. See
"Adding a new key management service" below for more information.
Generate a new key on each KMS instance. See "Generating a new key" on page 215 for
more information.
Note: Currently, Forcepoint CASB only supports Office 365 OneDrive and SharePoint
Online with the Azure Key Vault KMS.
1. In Forcepoint CASB, go to Settings > Resources > Key Management Services and click
Add New KMS.
2. On the Create KMS pop-up window, make sure Azure Key Vault is selected, then click
Next.
3. Type a KMS Name and KMS Description, then click Next.
4. Click Set Connection to establish the API connection with your Microsoft Azure instance.
5. From the Key Vault drop-down menu, select the Azure Key Vault where you want to store
and retrieve this key. Forcepoint CASB automatically tests the connection to the Azure Key
Vault and displays a message letting you know if the connection failed or succeeded.
To select a different Azure instance, click Change.
Note: You can only manage an Azure Key Vault once. Managed Azure Key Vaults
are removed from the Key Vault drop-down menu after setting the API connection to
that vault.
6. Click Add.
After the new KMS is added, you can view and edit the KMS information from the Key
Management Services settings page.
Note: Forcepoint CASB does not store the keys within the management portal. The KMS
generates and stores all keys. When you generate a key through the management portal,
Forcepoint CASB directs the KMS to generate the key through the API connection.
Currently, Forcepoint CASB only supports Office 365 OneDrive and SharePoint Online with the
Azure Key Vault KMS. For more information about generating keys for Office 365 assets, see
"Generating a new Office 365 key" below.
1. In Forcepoint CASB, go to Settings > Resources > Key Management Services and
select your KMS from the list.
2. Under the Keys Table, click Generate New Key.
Important: Office 365 does not support keys with date limitations. If you are
creating a key for an Office 365 asset, do not enter values into the Key Not Before
Date or Key Expiration Date fields.
4. Click Generate.
The new key is now displayed in the Keys Table with a KMS Key State of ENABLED. Enabled
(active) keys can be used in a data encryption policy.
When you create a data encryption policy for an Office 365 asset, you need to create two new
keys for the data encryption policy. Office 365 encryption requires two keys: one key from a
primary Azure Key Vault and one key from a secondary Azure Key Vault.
After you create your Office 365 keys, see "Configuring the data encryption policy" on page 172 for
more information about creating the data encryption policy.
Deleting a key
If you have generated a key from Forcepoint CASB and this key is no longer used, you can delete
the key from the Keys Table. When a key is deleted, Forcepoint CASB stops managing the key,
and the key is no longer available through the Encryption Broker service.
1. In Forcepoint CASB, go to Settings > Resources > Key Management Services and
select your KMS from the list.
2. In the Keys Table, select the key you want to delete.
3. Click the delete button that appears on the right side of the key's row.
4. Confirm that you want to delete the key.
5. Click Save.
Note: You can only delete a KMS if it is not active. If the KMS has a key being used by an
active data encryption policy, the Delete KMS button is disabled.
1. In Forcepoint CASB, go to Settings > Resources > Key Management Services and
select your KMS from the list.
2. Click Delete KMS.
3. Confirm that you want to delete the KMS.
Important: REST API access is different from API connections to cloud services. REST
APIs connect Forcepoint CASB to other enterprise software within your organization so
you can share data across the services. Cloud service API connections connect
Forcepoint CASB to the cloud services used within your organization so you can monitor
and restrict cloud service usage.
Create a new API access key. For more information, see "Create a new API access key"
below.
Edit an existing API access key. For more information, see "Editing an API access key"
on page 221.
Delete an API access key. For more information, see "Deleting an API access key" on
page 222.
4. Click Next.
5. On the Access key properties steps 2/2 screen, add the key details:
a. In the General info section:
i. Add a Key name. This name is the primary descriptive name of the key.
Forcepoint recommends naming the key after the connection target. For
example, if you are using this key to connect to Forcepoint DLP, you might name
the key "CASB DLP Connection".
ii. The Access key ID field cannot be edited. The key displayed here is the same
key displayed on the first page.
iii. The Enable key option is turned on by default when you create the key. If you
want to create the key, but enable it later, deselect the Enable key option.
b. In the Permissions section, choose the API capabilities to be used with this key:
i. The list of capabilities depends on the purchased licenses. For example, if you
purchased a Cloud DLP license, then you will see Cloud DLP in the list.
ii. Each capability has two options:
Read: This permission allows a service to retrieve Forcepoint CASB data
through the API connection.
Write: This permission allows a service to modify Forcepoint CASB data
through the API connection. Due to restrictions with some APIs, this option is
not available for every capability.
If you select all available capabilities, the key's entry in the API Access Keys table
displays the Permissions as Full. If you select only some of the available
capabilities, the entry displays the key's Permissions as Partial.
c. In the Client Access section, choose if the API should be restricted by IP address:
Allow access from everywhere: The REST API connection can be accessed
from any IP address. Connections are not restricted by IP address when you
select this option.
Allow access from the following IP ranges: The REST API connection can
be accessed only from an IP address that is within the IP ranges defined in this
This new API access key must be shared with the other service before the two services can
communicate. Procedures for adding the API access key vary by service. Review the third-party
service's documentation for procedures on adding the API access key.
3. On the Edit API access key screen, edit the key details as needed:
a. In the General info section:
i. Edit the Key name. This name is the primary descriptive name of the key.
Forcepoint recommends naming the key after the connection target. For
example, if you are using this key to connect to Forcepoint DLP, you might name
the key "CASB DLP Connection".
ii. The Access key ID field cannot be edited. To change the key:
i. Click Regenerate key.
ii. On the message screen, click Continue.
iv. Click Done. The old access key is revoked and the new access key is
enabled.
iii. The Enable key option is turned on by default when you create the key. If you
want to disable the key, deselect the Enable key option.
b. In the Permissions section, edit the API capabilities used with this key:
i. The list of capabilities depends on the purchased licenses. For example, if you
purchased a Cloud DLP license, then you will see Cloud DLP in the list.
ii. Each capability has two options:
Read: This permission allows a service to retrieve Forcepoint CASB data
through the API connection.
Write: This permission allows a service to modify Forcepoint CASB data
through the API connection. Due to restrictions with some APIs, this option is
not available for every capability.
c. In the Client Access section, choose if the API should be restricted by IP address:
Allow access from everywhere: The REST API connection can be accessed
from any IP address. Connections are not restricted by IP address when you
select this option.
Allow access from the following IP ranges: The REST API connection can
be accessed only from an IP address that is within the IP ranges defined in this
list. Each IP range must be on a separate line in the list and be in standard
CIDR format (i.e., x.x.x.x/y).
4. Click Done.
Enrolling source devices with Forcepoint CASB enables Forcepoint CASB to know that they are
managed by the organization. Managed devices are listed on the Endpoints page. You can
configure the enrollment criteria that define how Forcepoint CASB determines whether an endpoint
is organizationally managed.
After an endpoint is enrolled, it is assigned a unique device ID and is remembered as managed.
Certificate-based enrollment can be configured to last only as long as a certificate is present.
Endpoints are considered organizational if they meet any of the following conditions, as selected:
You can select to Require administrator approval, in which case upon verifying the
submitted code Forcepoint CASB will list the device for approval, and only upon approval
consider the device to be managed.
You can limit the number of notifications in 24 hours.
After making changes, click Save Manual Enrollment.
To subsequently revoke enrollment, in the Managed tab, hover over the endpoint and click
Revoke:
1. From the Endpoints > Pending tab or the Endpoints > Unmanaged tab, Download a
list of endpoint candidates for such approval:
Device ID: Unique identifier generated by Forcepoint CASB for the endpoint; upon upload,
Forcepoint CASB identifies the endpoint by this ID.
Last Action: Date and time of the endpoint’s last activity observed by Forcepoint CASB.
Operating system: Endpoint’s operating system and version.
Accounts: Comma-separated list of the user accounts using this device.
For example:
Device ID Last Action Operating system Accounts
6d43d06a4cb3755 4/16/2014 mac os x 10 john@example.com(office365),
6080a656c8bbab 3/22/2014 mac os x 10 alan@example.com(office365),alan-
b@myexample.com(salesforce)
Upon upload, Forcepoint CASB uses only the Device ID, so for upload only the first column is
required. Further columns are disregarded.
The user connects from the customer domain in the cloud service. The customer domain is
the domain registered with your customer account.
The user connects from a domain listed in the internal domains list. Organizations with
more than one customer domain can manage their domains through the internal domains
list. To add or remove an internal domain, follow the procedures below.
If a user connects from a domain that does not match the criteria above, they are considered
external users.
To add an internal domain:
2. In the Internal domains section, type your organization's internal domain address(es).
Each domain address must be on a separate line.
3. Click Save.
Note: Latitude and Longitude are not required. If you select a Country, but
leave the Latitude and Longitude fields empty, Forcepoint CASB
automatically populates the fields based on the selected country.
d. Click Save.
To edit an IP range entry, select the IP range row in the table and click the button.
To remove the IP range entry, select the IP range row in the table and click the button.
Importing IP ranges
If you need to add a list of IP ranges at one time, Forcepoint CASB allows you to import a CSV file
that contains all of your IP ranges.
Warning: Importing a new list completely overwrites the existing list of IP ranges. Ensure
that all IP ranges are included in the new list, even IP ranges that are already in the existing
list. Any IP ranges from the existing list that are not included in the new list will be deleted.
3. Click Save.
3. Click Save.
9. Under Message, click to edit the default message, or click Add Message to add a new
message.
10. Edit the message fields:
11. Click Test SMS to send the message to the assigned recipients.
12. Click Save.
Click to view relevant available variables that Forcepoint CASB will resolve and
replace. For example:
<data-type> (required), with string attribute name: Single top-level element for the data
type. The provided name will appear in Forcepoint CASB, but will be overwritten by the
name provided in the management portal, if different, upon uploading the data type.
Building-block elements:
<pattern>: Each pattern element includes a regular expression, defining a string
pattern to be located in inspected data. To escape special characters, wrap the regular
expression inside a <![CDATA[ ]]> child element.
The regular expression should be in Google RE2 format. See
https://re2.googlecode.com/hg/doc/syntax.html
A couple of useful regular expression features are:
For case-insensitive matching, at the beginning of the Pattern content add: (?i)
To mark a word boundary (beginning or end): \b
<data-type-ref>, with string attribute id: Refers to an existing data type (predefined or
custom) by its ID. To find a Data Type’s ID, in Forcepoint CASB, go to Settings >
DLP > Data Types. You can search, filter (by Predefined / Custom / Unused), and
<and>, <or> - wrapped around multiple child elements; <not> - wrapped around a single
child element: Boolean logical operators defining the relationship of their child elements.
For example, to match data including both of two patterns, place the two pattern elements
inside an and element.
Additional determining elements:
<validator>, with string attribute type, wrapped around a single pattern element:
Matches data matching its child element, if the matching data is validated according to
the algorithm of the specified type. Valid types are: luhn and nhs (Modulus 11).
<occurrences>, with string attributes min and isUnique, wrapped around a single
child element: Matches data that includes data matching the child element at least
min times. If isUnique="true", the occurrences must be different.
<proximity>, with string attribute max, wrapped around exactly two child elements:
Matches data that includes data matching both of its child elements, in the order of the
child elements' appearance, with no more than max characters from the end of the
first to the beginning of the second.
Example 2
The following data type matches data that includes either "top secret" or "confidential", with word
breaks before and after, case-insensitive:
<data-type name="Business Confidential Information">
<or>
Example 3
The following data type matches data that contains 5 to 10 occurrences of the word "confidential",
with word breaks before and after, case-insensitive:
<data-type name="5 Confidential">
<occurrences min="5" max="10" isUnique="true">
<pattern>(?i)\bconfidential\b</pattern>
</occurrences>
</data-type>
Example 4
The following data type attempts to identify use of the phonetic alphabet:
<data-type name="Dictionary">
<or>
<pattern>(?i)Alpha</pattern>
<pattern>(?i)Bravo</pattern>
<pattern>(?i)Charlie</pattern>
<pattern>(?i)Delta</pattern>
<pattern>(?i)Echo</pattern>
<pattern>(?i)Foxtrot</pattern>
<pattern>(?i)Golf</pattern>
<pattern>(?i)Hotel</pattern>
</or>
</data-type>
1. In Forcepoint CASB, go to Settings > DLP > Data Types > Add New Data Type:
4. Click Save.
1. Install stunnel on the processing unit or a nearby computer using the proper installer or by
running the following command in a Linux server:
yum install stunnel
2. Create a configuration file under /etc/stunnel/stunnel.conf.
a. The content of the file should be:
fips=no
client=no
cert=<cert path>
key=<key path>
output=/var/log/stunnel.log
[icaps]
accept=10.100.70.7:11344
connect=10.100.70.7:1344
The SIEM tool exports data to CEF-formatted files that are picked up by the SIEM server
file connector. CEF is a standard format used by all SIEM solutions, so using CEF files
ensures that every SIEM solution can import the data.
The SIEM tool can send data to syslog, acting as a syslog client that can connect to your
SIEM solution as its syslog server.
Note: You must have a valid Forcepoint CASB license to download this tool.
This tool will only be visible on the Tools and Agents page if you have a valid
license. Contact Forcepoint Support if you would like to use the tool, but do not
see the tool on this Settings page.
2. For secure connection of the SIEM tool to the Forcepoint CASB service, the tool requires
the trust store file that can be downloaded from the Forcepoint CASB management portal.
From the management portal, go to Settings > Tools and Agents > SIEM Tool, then
click Download Trust Store.
Place the downloaded trust store file in a location that the SIEM tool can access after it is
installed.
3. Extract the provided SIEM tool archive on a host that has Java v1.8 or higher installed and
can access the organizational Forcepoint CASB management server.
4. Configure the credentials. This only needs to be done one time.
Open a command prompt, navigate to the location of the SIEMClient files, and run the
following command:
Windows:
SIEMClient.bat --set.credentials –-username <user> --
password <password> --credentials.file <file>
Linux:
SIEMClient.sh --set.credentials –-username <user> --password
<password> --credentials.file <file>
where the above parameters are:
<user> and <password>: Forcepoint CASB administrator credentials. Optionally, if
you omit the --username and --password arguments, you will be prompted to provide
them interactively.
<file>: Path and filename for the credentials store.
5. Run the SIEM tool from the command prompt:
<tool> --credentials.file <file> --host <host> --port <port#>
--output.dir <dir> [ truststorePath=<trust> ]
[ exportSyslog=true syslogHost=<syslogServer>
syslogFacility=<facility> ] [ cefVersion=<cef.version> ]
[ cefCompliance=<cef.flag> ] [ --proxy.host <proxy.host> ]
[ --proxy.port <proxy.port> ]
where the above parameters are:
N/A Vendor
N/A Product
N/A Version
10 = Critical
N/A dhost
N/A dvc
N/A dvchost
IP Chain AD.IPChain
External AD.IPOrigin
Account AD.samAccountName
N/A Vendor
N/A Product
N/A Version
Incident ID SignatureID
Last Alert Time The date and time of the current last alert end
attached to the incident.
First Alert Time The date and time of the first alert start
attached to the incident (i.e., the alert
that created the incident).
Full Name The full name of the user. This data is cs4
retrieved from the Active Directory if
integration is in place; otherwise it is
empty.
1. On the Forcepoint CASB management portal, go to Settings > Tools and Agents.
2. Locate the application you want to download and click the Download link. Each application
has different download links for different operating systems.
On the About CASB page, you can also add new licenses provided by Forcepoint.
ii. Select the relevant asset type (you can navigate pages, search, or Search by
category) and click Next:
Click Save.
d. Click Add.
Optionally, select Monitor only login activity. This feature is for reverse proxy only.
Click Save Monitoring Settings.
5. It is recommended to configure Account Access and Security Governance for the
asset.
6. It is highly recommended to deploy gateway enforcement.
7. You can customize asset access enforcement.
Amazon AWS
Box
Dropbox
Google G Suite
Office 365
Salesforce
For Forcepoint CASB to be able to collect information directly from a cloud application asset,
configure the connections to each relevant cloud service asset as follows:
1. In Forcepoint CASB, go to Settings > Resources > Assets > asset > Asset
Governance, and configure the Web connection:
The account credentials should have full administrative permissions. Alternatively, for a
description of a sufficient but more restrictive permission set, see the Forcepoint CASB
Service Provider API Connection Guide.
If the asset API uses a token (rather than credentials), paste it into the Password field. For
both connections, Login URL is necessary only if a non-default URL is used (for example,
if your organization uses single sign-on or a customized URL).
2. Click Save Connection Settings.
3. You can receive automatic updates upon scans, including the information marked in the
Access & Security Governance dashboard as New.
To receive these updates, if you haven’t yet done this:
This is a global setting for all access & security governance-enabled assets.
Note: Connecting Forcepoint CASB to a cloud service's API must be performed using an
Administrator account that has access to all users' and administrators' folders in the
account.
1. In Forcepoint CASB, go to Settings > Resources > Assets > asset > Asset
Governance.
Note: This option is only available before the connection is set. After the
connection is set, the drop-down menu is disabled.
Read-only access only supports the Audit Only mitigation action. If you have
policies in this asset that are set to another mitigation action, Forcepoint CASB
displays a message stating that those policies' mitigation actions will reset to
3. Under API connection, click Set connection. A new browser window opens and displays
the log in page for the cloud service.
4. On the cloud service's log in page, enter your administrator login credentials. Forcepoint
CASB automatically requests that the service generate a token with a set of permissions.
These permissions will be presented by the cloud service. You can review and accept
these. Note that the required permissions are a subset of the admin capabilities limited to
the minimal requirements for Forcepoint CASB functionality.
5. Review the required credentials, then click the button to grant access. The cloud service
window closes.
6. In Forcepoint CASB, return to the cloud service asset's settings page (Settings >
Resources > Assets > asset > Asset Governance), if you are not there already.
7. Forcepoint CASB displays the message Credentials added successfully if the API
connection accepts the administrator login credentials.
8. Click Test connection under API connection to test the connection. Forcepoint CASB
connects to the cloud service through the API and attempts to retrieve the user list, data
classification download, and activity download.
If this is an Office 365 asset, you can select the Check encryption check box to check the
connection to the key management service (in this case Azure Key Vault). For more
information about setting up a key management service, see "Managing your key
management services" on page 213.
If the connection test fails, Forcepoint CASB is not connected to the cloud service through
the API. Verify that you are connecting with an account that has administrator privileges.
9. Click on to enable activity download.
10. After this is completed, Forcepoint CASB imports all users' audited activities from the cloud
service.
1. In Forcepoint CASB, go to Settings > Resources > Assets > asset > Blocking:
2. Select one:
Generic authentication error: Forcepoint CASB sends a 401 error, and the
browser displays a page accordingly.
Custom page: Forcepoint CASB displays a custom page. For each of Blocked
1. In Forcepoint CASB, go to Settings > Resources > Assets > asset > Identity
Verification Settings:
For each of Account self-verification page and Action self-verification page, you can
Download and customize the content and style of the verification page. Then Browse to
upload it.
To revert to the Forcepoint CASB default page, click Restore default.
3. Under Notification Type, select how verification codes are sent to users (Email and/or
SMS), and how many times a user can request a code before being blocked until the
following day:
1. In Forcepoint CASB, go to Settings > Resources > Assets > asset > Data Object
Mappings:
If the service application doesn’t present a proper certificate, select Don’t validate this
asset’s server certificate.
If the service application uses the non-secure SSLv3, select Allow client-gateway com-
munication using SSLv3 ciphers.
For cloud user activities to go through the Forcepoint CASB gateway, connections
from browsers and other client applications need to go through the Forcepoint CASB
gateway. To implement this, reverse proxy and endpoint routing solutions are
available.
Reverse proxy provides a secure solution by disabling non-gateway connections to
cloud assets. However, non-browser client applications, such as most Office 365
desktop applications and most mobile client applications, can only access their native
server URL. If only reverse proxy is used, these applications will not work. Endpoint
routing provides a good solution for controlled organizational devices, including for
applications that do not support URL changes, but does not disable non-gateway
connections from other devices. A comprehensive solution recommended in many
cases is to use both types of solutions in parallel (supported by Forcepoint CASB):
Implement reverse proxy as the primary enforcement method, and distribute the
Forcepoint CASB endpoint routing solutions as needed for applications that cannot
otherwise be directed to the Forcepoint CASB gateway.
This chapter discusses the following:
Limited Integration: The IdP redirects via Forcepoint CASB, but the service application
does not enforce such connections. Forcepoint CASB functions as a transparent proxy,
passing on the original authentication token which is addressed to the service application.
The service application is configured to trust authentication originating from the IdP.
Limited Integration has the following advantages over Proxy Enforcement:
Simpler configuration, and easier to revert from if necessary.
For gradual deployment, for the service application to continue accepting also
connections that do not go through Forcepoint CASB. This is relevant if the service
application does not enable configuring multiple IdP accounts (as is the case for most
service applications) but the IdP can be configured to use the same certificate for two
accounts addressed to the same service application.
Proxy Enforcement: The IdP addresses its response to the Forcepoint CASB gateway;
the Forcepoint CASB gateway accepts the authentication from the IdP, then re-signs the
response with its own certificate. The service application accepts only such authentication
Rather than use a third-party IdP, you can use Forcepoint CASB itself as a single sign-on IdP.
This simplifies some configuration of IdP Proxy.
1. Make sure that a relevant Active Directory (not static directory file) is configured.
2. In Forcepoint CASB, go to Settings > Forcepoint IDP:
1. Make sure that single sign-on via Forcepoint CASB as IdP or via a third-party IdP is fully
configured for the service application.
2. Make sure that the service application is configured as a managed asset.
3. Configure an asset-specific gateway address to be mapped to the service application’s
address:
a. In Forcepoint CASB, go to Settings > Resources > Assets > asset > Access
Mapping > Add URL Mapping:
b. For IdP Integration with Anti-bypass mode only, Select how Forcepoint CASB should
re-sign authentication responses:
c. Click outside the URL field to auto-generate a mapped Forcepoint CASB URL.
d. Copy the above Forcepoint CASB URL to the IdP’s administration site for the
service application as the service provider’s single-sign on / Login / Assertion
Consumer Service (ACS) URL.
If the IdP is an external instance of Forcepoint CASB, enter it in the external
Forcepoint CASB at Settings > Resources > Assets > asset > Single Sign-On
Settings > General Settings > Application’s Login URL, and click Save General
Settings.
9. Click Save IdP Proxy Integration Settings.
1. Make sure that single sign-on via a third-party IdP such as ADFS is fully configured for
Office 365.
2. Make sure that Office 365 is configured as a managed asset.
3. Configure an asset-specific gateway address to be mapped to Office 365’s address:
5. Select the IdP Proxy mode: IdP Integration or IdP Integration with Anti-bypass:
6. In step 3, provide your organizational domain:
7. For IdP Integration with Anti-bypass mode only, Select how Forcepoint CASB should re-
sign authentication responses:
If you are not sure what the gateway address is, in Forcepoint CASB go to Settings
> Tools and Agents. In the Endpoint Agents section, the gateway address is listed
under the Desktop agents.
6. On the Endpoint Port Range page, provide a range of ports that the Forcepoint CASB
Security Service can use for host-internal communications with local client applications.
The Forcepoint CASB Security Service is now installed on the endpoint. If you find that a specific
endpoint application is not being properly directed via the gateway, perform troubleshooting.
where
For example:
SkyfenceSecurityServiceInstall_4.1.1.465_windows_x64.exe –mode
unattended –gwHost acme.skyfencenet.com –gwPort 443 –minListeningPort
1024 –maxListeningPort 1031
Firefox and Safari browsers that were open during the Forcepoint CASB Security Service
installation will not be affected until they are restarted.
1. Make sure that the Forcepoint CASB management server is configured with an
appropriate PAC file.
2. In Forcepoint CASB, go to Settings > Endpoints > Agent/Endpoint Monitoring and
check Enable Proxy Auto Configuration (PAC):
The PAC file is now ready to be used by the Forcepoint CASB Security Service or for
distribution.
On endpoints not running the Forcepoint CASB Security Service, point to the (optional)
organizational Forcepoint Web Security Gateway.
On endpoints running the Forcepoint CASB Security Service, point to 127.0.0.1:<port>,
where <port> is the Forcepoint CASB Security Service’s listening port.
For the Forcepoint CASB Security Service to use a manually distributed PAC file, it must
be installed via CLI with --disablePac 1 and with a single listening port (i.e., --
minListeningPort must be the same as --maxListeningPort).
2. Under Blocked domains, type the domain address(es) to block. Each domain address
must be on a separate line.
3. Click Save.