Ep End User
Ep End User
24.11
Revision A
© 2025 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.
All other trademarks used in this document are the property of their respective owners.
Every effort has been made to ensure the accuracy of this document. However, Forcepoint
makes no warranties with respect to this documentation and disclaims any implied
warranties of merchantability and fitness for a particular purpose. Forcepoint shall not
be liable for any error or for incidental or consequential damages in connection with the
furnishing, performance, or use of this manual or the examples herein. The information in
this documentation is subject to change without notice.
Forcepoint F1E v24.11 | End User Guide
Contents
1 Introduction to F1E..............................................................................................................................................5
About the Product.......................................................................................................................................... 6
Forcepoint F1E Agent components............................................................................................................... 6
3
Forcepoint F1E v24.11 | End User Guide
4
Chapter 1
Introduction to F1E
Contents
This guide covers the full range of functionality available in the Forcepoint F1E agents.
Note
Some functionality might be disabled by your organization’s security policies. This disabled functionality
will not be available to use. Disabling the endpoint software introduces possible vulnerabilities, because
you are no longer receiving the protection provided by Forcepoint Web Security Endpoint or Forcepoint
DLP Endpoint.
Related concepts
Fallback mode on page 10
Viewing logs (Windows only) on page 10
RMS/MIP decryption limitation on page 14
Updating Forcepoint DLP Endpoint on page 17
Disabling Forcepoint DLP Endpoint on page 17
Enabling the Forcepoint Safari extension on page 19
Updating the Mail plug-in on page 20
Deploying Forcepoint F1E Outlook Add in on page 21
Online Applications in macOS on page 34
Custom Logo for Coaching Dialog on page 21
Forcepoint DLP Inline Proxy on page 23
Related tasks
Using the Forcepoint Web Security Endpoint Diagnostics Tool on page 9
Disabling Forcepoint Web Security Endpoint protection on page 10
Using the Forcepoint DLP Endpoint Diagnostics Tool (Windows only) on page 18
Allowing or blocking a policy violation on page 34
Setting encryption passwords on page 37
Viewing contained files and saving them to an authorized location on page 41
Viewing logs on page 42
Custom Text for Coaching Dialog on page 22
Related reference
Checking the status of Forcepoint Web Security Endpoint on page 7
Introduction to F1E | 5
Forcepoint F1E v24.11 | End User Guide
If you see this icon ( ) in the notification area of the task bar (Windows) or the status menu of the menu bar
(Mac), one or more of the above F1E agents are enabled on your endpoint machine.
Introduction to F1E | 6
Chapter 2
Forcepoint Web Security Endpoint
Contents
Forcepoint Web Security Endpoint is a software application that runs on the endpoint machines (for example, desktop
computer or laptop), protecting the users from malware and enforcing their organization’s acceptable user policy.
Related concepts
Fallback mode on page 10
Viewing logs (Windows only) on page 10
Related tasks
Using the Forcepoint Web Security Endpoint Diagnostics Tool on page 9
Disabling Forcepoint Web Security Endpoint protection on page 10
Related reference
Checking the status of Forcepoint Web Security Endpoint on page 7
Important
■ If you manually disable Forcepoint Web Security Endpoint, restarting the endpoint machine
always re-enables it.
■ If your organization installs more than one F1E agent (Forcepoint Web Security Endpoint,
Forcepoint DLP Endpoint, and/or Forcepoint Endpoint Context Agent) on your endpoint machine,
you can access all installed agents from one Forcepoint icon on your task bar.
For more information on Forcepoint DLP Endpoint and Forcepoint Endpoint Context Agent, see Forcepoint DLP
Endpoint and Forcepoint Endpoint Context Agent.
Related concepts
Forcepoint DLP Endpoint on page 13
Forcepoint Endpoint Context Agent on page 45
When the tool is launched, the diagnostic tests are executed in sequence. If one of the tests results in a failure,
the subsequent tests are not automatically run.
Three diagnostic tests are accessed from this tool:
■ System information - Collects basic information related to the specific endpoint machine on which the
Forcepoint Web Security Endpoint software is installed.
■ Network diagnostics - Collects information related to network connectivity.
■ PAC file status (Windows only) - For endpoint machines that go through a proxy before connecting to the
Internet, this test collects information to determine if the PAC file is accessible.
OR
Cloud services - For endpoint machines that connect directly to the Internet, this test collects information to
determine if the endpoint software can contact the cloud service for disposition information (i.e., whether to block
or allow the request).
To manually run the diagnostics tests, select one of the above tests and click the Run Diagnostics button.
Note
Corresponding log files generated from these new diagnostic tests can easily be collected with the
existing CLIENTINFO.EXE tool. Your Help Desk might ask you to run this tool to collect these files.
To run it, click the Collect Endpoint Info... button on the diagnostics screen. The resulting file is
placed onto the desktop. Attach the file to an email to your Help Desk or system administrator.
Fallback mode
Forcepoint Web Security Endpoint provides a Fallback mode if your network connection to the cloud service is
interrupted. Events that might trigger Fallback mode include:
■ Changing from Wi-Fi to an Ethernet network connection or vice-versa
■ Connecting to a virtual private network (VPN)
■ Assigning a new IP address to your laptop
■ Disconnecting from the Internet
While in Fallback mode, the F1E icon displayed in your task bar changes to reflect your level of protection. If
you see this icon ( ) in your task bar (Windows) or menu bar (Mac), your system is in Fallback mode and is
not protected against web threats. When network events prevent endpoint machines from connecting with cloud
services, Forcepoint Web Security Endpoint is automatically and temporarily bypassed. If this happens, you can
continue to access the Internet (if Internet access is available), but endpoint protection is not provided during this
time.
Once the network issue is resolved, Forcepoint Web Security Endpoint is automatically re-enabled.
Important
Log files are automatically deleted after 5 days.
it might be useful to manually disable the endpoint software to troubleshoot issues with the assistance of your
system administrator.
If your organization allows you to disable Forcepoint Web Security Endpoint:
1) Right-click the F1E icon in the task bar’s notification area (Windows) or single click the menu bar’s status
menu (Mac).
2) Select Disable Forcepoint Proxy Connect Endpoint or Disable Forcepoint Direct Connect Endpoint
from the menu. Only one of the options is shown in the menu. The option depends on the type of Forcepoint
Web Security Endpoint installed.
If you see an authentication page asking for your username and logon credentials, you need to change your
proxy auto-config (PAC) file settings in Internet Explorer.
Contact your system administrator for assistance with changing your PAC file settings.
To re-enable Forcepoint Web Security Endpoint:
1) Right-click the F1E icon in the task bar’s notification area (Windows) or single click the menu bar’s status
menu (Mac).
2) Select Enable Forcepoint Proxy Connect Endpoint or Enable Forcepoint Direct Connect Endpoint from
the menu. Only one of the options is shown in the menu. The option depends on the type of Forcepoint Web
Security Endpoint installed.
Important
If you manually disable Forcepoint Web Security Endpoint, restarting the endpoint machine always
re- enables it.
Forcepoint DLP Endpoint expands protection to sensitive information stored on the endpoint machines.
Depending on your corporate policy, data could be quarantined or encrypted when you try to email it, print it, or copy
it to removable media such as thumb drives, CD/DVD burners, and Android devices (CD/DVD and Android support
depends on your operating system).
Related concepts
RMS/MIP decryption limitation on page 14
Updating Forcepoint DLP Endpoint on page 17
Disabling Forcepoint DLP Endpoint on page 17
Enabling the Forcepoint Safari extension on page 19
Updating the Mail plug-in on page 20
Deploying Forcepoint F1E Outlook Add in on page 21
Online Applications in macOS on page 34
Encrypting files for removable media on page 36
Decrypting files on a removable media device on page 38
Custom Logo for Coaching Dialog on page 21
Forcepoint DLP Inline Proxy on page 23
Related tasks
Viewing detailed Forcepoint DLP Endpoint status information on page 16
Using the Forcepoint DLP Endpoint Diagnostics Tool (Windows only) on page 18
Allowing or blocking a policy violation on page 34
Setting encryption passwords on page 37
Decrypting files on Windows on page 38
Decrypting files on Mac on page 40
Viewing contained files and saving them to an authorized location on page 41
Viewing logs on page 42
Custom Text for Coaching Dialog on page 22
Related reference
Checking the status of Forcepoint DLP Endpoint on page 14
Important
If you manually disable Forcepoint DLP Endpoint, restarting the endpoint machine always re-
enables it.
If your organization installs more than one F1E agent (Forcepoint Web Security Endpoint, Forcepoint DLP
Endpoint, and/or Forcepoint Endpoint Context Agent) on your endpoint machine, you can access all installed
agents from one Forcepoint icon on your task bar.
For more information about Forcepoint Web Security Endpoint and Forcepoint Endpoint Context Agent, see
Forcepoint Web Security Endpoint, and Forcepoint Endpoint Context Agent.
Related concepts
Forcepoint Web Security Endpoint on page 7
Forcepoint Endpoint Context Agent on page 45
2) Select Open Forcepoint DLP Endpoint from the Windows menu, or Forcepoint DLP Endpoint from the
Mac menu.
Related concepts
Disabling Forcepoint DLP Endpoint on page 17
Related tasks
Viewing contained files and saving them to an authorized location on page 41
Viewing logs on page 42
4) Click OK.
The Forcepoint DLP Endpoint software is disabled for the length of time specified when the bypass code was
created. When the bypass protection expires, the Disabled icon ( ) on the task bar updates to the Default icon
( ).
When you launch the tool, the Diagnostics Tool automatically executes the System information diagnostics test,
which collects basic information related to the specific
endpoint machine on which the Forcepoint DLP Endpoint software is installed. To manually run the diagnostics
test, click the Run Diagnostics button.
If Forcepoint Web Security Endpoint is also installed on your endpoint machine, the Diagnostics Tool shows
additional information. See Using the Forcepoint Web Security Endpoint Diagnostics Tool for more information.
If Forcepoint Endpoint Context Agent is also installed on your endpoint machine, the Diagnostics Tool shows
additional information for Forcepoint ECA.
Note
Corresponding log files generated from these new diagnostic tests can easily be collected with the
existing CLIENTINFO.EXE tool. Your Help Desk might ask you to run this tool to collect these files.
To run it, click the Collect Endpoint Info... button on the diagnostics screen. The resulting file is
placed onto the desktop. Attach the file to an email to your Help Desk or system administrator.
Related tasks
Using the Forcepoint Web Security Endpoint Diagnostics Tool on page 9
To enable the Forcepoint Safari extension, click the Enable Safari Extension button. An Extension window
opens, allowing you to enable the Safari extension.
If the endpoint machine is not JAMF managed, the following notification is shown when you open the Safari
browser:
To enable the Forcepoint Safari extension from this notification, click the Open System Preferences button.
Select the Websense Endpoint Helper check box in the Privacy > Accessibility tab. Then, the Forcepoint
Safari extension is automatically enabled.
To enable the Forcepoint Mail plug-in, click the Restart Mail button. Mail is automatically restarted with the
update installed.
If the endpoint machine is not JAMF managed, the following notification is shown when you open Mail:
To enable the Forcepoint Mail plug-in from this notification, click the Open System Preferences button. Select
the Websense Endpoint Helper check box in the Privacy
> Accessibility tab. The Forcepoint Mail plug-in is automatically restarted with the update installed.
2) Add "custom_logo" file in the folder and run the Package Build v22.12 or later as you normally would.
Important
a) Make sure the name of the logo file to be added is correct.(File name should be
"custom_logo.png")
b) When you are adding the image file of the custom logo, make sure that:
i) The image height is less than 35px and the image width is less than 300px.
Note
You will receive the notification of successful installation after waiting for few minutes post running
the package builder.
Note
■ The character limit of custom text is 250 characters.
■ The number of lines is limited to 5 rows.
■ Make sure the custom message(text) and the URL are arranged in the following format:
■ Correct syntax: <link>url="https://forcepoint.com" text="More Info"</link> .
■ The required policy must have the confirmation action before implementation.
Steps
1) Navigate to FSM > Policy Management > DLP Policies > Manage DLP Policies.
3) Insert the custom text and URL in the “confirmation dialog text” field.
Note
You can also add custom text at the policy rule exception level.
4) Click OK.
Note
After the deployment is finished, switch to any Endpoint to check its functionality.
3) In the Endpoint Web Traffic Detection Mode, you have the following options:
a) Endpoint Inline Proxy
b) Browser Extensions
Select your preferred web traffic detecting option.
4) Select Save.
5) Click Deploy.
Note
Update the Forcepoint DLP Endpoint software.
This feature is useful when the user is using another agent, that uses the system PAC. In such case, user should
deselect the system PAC in the FSM and use the driver only to capture traffic.
Steps
1) Navigate to FSM > Deployment > Endpoint Profiles.
You can see the list of profiles available for users.
Note
Both the system PAC and Endpoint Driver are enabled by default in FSM.
4) Click Deploy.
Steps
1) Navigate to FSM > Deployment > Endpoint Profiles.
You can see the list of profiles available for users.
Note
This section is only available when you have selected Inline Proxy mode for Web Traffic
Detection.
Note
Currently, the Inline Proxy mode supports the monitoring of browsers as applications.
5) Click ADD.
Check your application is added to the list.
6) Select Save&Close.
7) Click Deploy.
Steps
1) Navigate to FSM > Deployment > Endpoint Profiles.
The list of profiles available for users appears.
3) In Detection mode in Endpoint Web Traffic Detection Mode, select Endpoint Inline Proxy.
5) To configure the detection of file uploads via JavaScript injection, select one of the following in Action:
■ To apply the JavaScript injection only to the selected domains, select Apply JavaScript injection only to
the selected domains.
■ To apply the JavaScript injection to all domains excluding the selected ones, select Apply JavaScript
injection to all domains excluding the selected ones.
b) Click Add.
b) Click Import.
b) Click Remove.
c) Click Clear All button to clear all URLs from the list.
Steps
1) Go to FSM > General > Endpoint > Advanced.
2) Scroll down to Excluded Domains For SSL Decryption by Endpoint Inline Proxy.
Note
To enable the Inline Proxy mode, you must go to Deployment > Endpoint Profiles, and select
Endpoint Inline Proxy in Endpoint Web Traffic Detection Mode in Properties for your
selected profile.
4) To add the domain which you want to bypass in the URL section, do the following:
a) Enter the domain name in the URL field.
Note
Do not use wildcards.
b) Click Add
The domain update gets applied to both macOS and Windows Endpoints.
b) Click Import.
b) Click Remove.
7) Click Save.
8) Click Deploy.
Warning
No DLP Policies are applicable to the Inline Proxy bypassed URLs when these sites use
HTTPS or Encryption.
Note
If more than one proxy is to be set, then each entry should be separated by a comma ","
E.G:- 127.0.0.1:9000, 127.0.0.100:9001
6) Select Save.
7) Click Deploy.
Note
Update the Forcepoint DLP Endpoint software.
Note
■ This feature is available starting with Forcepoint Security Manager (FSM) 10.3.
■ This feature requires F1E and is not currently supported by the F1A agent.
■ Detailed instructions for using this setting will be featured in an upcoming Knowledge Base
Article.
■ This feature is only available for the administrator role with Manage custom configuration
permission. To add Manage custom configuration permission to the role, navigate to
Authorization > Roles, select the Manage custom configuration checkbox under Manage
endpoint profiles in the Deployment section.
Steps
1) Select the Enable custom configuration checkbox.
By default, the Enable custom configuration checkbox will be disabled.
2) Enter the configuration text in JSON format into the JSON Editor to define the custom configuration for the
DLP administrator.
When a user attempts to save a configuration containing incorrect format, an error message 'Custom
configuration JSON format is invalid' will be triggered by the JSON Editor.
Note
Custom Configuration can override the existing Endpoint Profile configuration. If you decide to
override, ensure that the changes are applied correctly.
Note
The online applications are only available in the browser extensions mode.
From this confirmation dialog box, you can choose to allow the operation to continue, or you can block the
operation and cancel the request.
To continue with the action:
1) Select a valid reason from the list.
2) Optionally, type additional information in the text box (maximum 256 characters).
3) Click Allow.
Important
If you click the corporate policy link at the bottom of the window and Chrome is your default browser,
Chrome does not open the link until you close the confirmation dialog window.
The behavior of the confirmation or block action varies depending on the action and the affected channel:
■ Removable Media Channel:
■ If you copy or move sensitive documents either through the Windows command line or by dragging and
dropping the files through Windows Explorer to a USB drive, a writable DVD, or a mobile phone through
WPD protocol, and choose the Block action in the confirmation box, Forcepoint DLP Endpoint might also
block non-sensitive files if they are copied or moved with the sensitive files.
■ LAN Channel:
■ If you copy or move files to other machines mounted on the endpoint machine in the same local network,
and choose the Block action in the confirmation dialog box, Forcepoint DLP Endpoint might incorrectly
state that the files were copied or moved.
■ If you try to move a sensitive file to a network share folder using cut and paste, then choose the Block
action in the confirmation dialog box, Forcepoint DLP Endpoint removes the file from both the source
location and the destination. If this happens, look for the file in the Contained Files. See Viewing contained
files and saving them to an authorized location.
■ HTTP/HTTPS (Web) Channel:
■ If you compose email through a web-based mail service (e.g., Gmail or Yahoo Mail), a confirmation dialog
box is shown whenever the service syncs to the hosting server (i.e., when the email is auto-saved). This
causes the confirmation dialog box to be shown multiple times within a short timeframe.
■ Each sensitive attachment within an email triggers a separate confirmation dialog box.
■ If you choose the Block action, you might receive an error message from the mail service, because the
Block action interrupts the activity with the mail service.
■ Print Channel:
■ This channel blocks the printing of sensitive content when you try to print a hard copy through a printer or a
soft copy through a PDF converter.
■ Application Clipboard Channel:
■ This channel allows you to copy and/or paste sensitive content within the same document, or to the same
type of document (e.g., from one Microsoft Word document to another Word document).
■ Application File Access Channel:
■ If you choose the Block action, you might receive an error message from the application, because the
Block action interrupts the activity with the application.
■ When saving a sensitive document, you might receive multiple confirmation dialog boxes, because
temporary files created by the application trigger the confirmation dialog box.
■ Email Channel:
■ In Outlook, the Outlook process is suspended when the confirmation dialog box is shown. This makes it
appear as if Outlook is no longer working. Once you choose either the Allow or Block action, the Outlook
process works as normal.
Related tasks
Viewing contained files and saving them to an authorized location on page 41
Note
macOS only supports password based decryption. A user cannot encrypt files on Windows using
a profile key and then decrypt them on macOS.
For more information about setting your encryption password, see Setting encryption passwords.
For more information about decrypting files, see Decrypting files on a removable media device.
Contact your administrator to see which option is configured in your organization. To see if your organization
encrypts data with a user password, right-click the Forcepoint One Endpoint icon in the task bar’s notification
area on a Windows endpoint machine. If you see a Set Encryption Password option, your organization encrypts
data with a user password.
Related concepts
Decrypting files on a removable media device on page 38
Related tasks
Setting encryption passwords on page 37
Note
Forcepoint DLP Endpoint does not support the encryption of data transferred to a Windows Portable
Device (WPD) from a Windows endpoint machine.
Set the password one time, then any time you copy sensitive data to removable media, it is encrypted and copied
along with a Forcepoint Decryption Utility to the device. You, or any other user accessing the files on endpoint
machines where the Forcepoint DLP Endpoint is not installed, or where the password configured for encryption is
different than yours, must enter this password.
Important
The encryption password can only be set on a Windows endpoint machine running Forcepoint DLP
Endpoint. You cannot set an encryption password or encrypt files on a mac endpoint machine.You
can only decrypt files on a mac endpoint machine using password based decryption. A user cannot
encrypt with windows using profile key and have that file decrypted on macOS.
Note
The password should be at least 8 characters in length (maximum is 15 characters), and it
should contain:
■ At least one numeral
■ At least one symbol
■ At least one capital letter
■ At least one lowercase letter
The following example shows a strong password:
■ 8%w@s1*F
4) Click OK.
Warning
Keep the encryption password in a safe place. If you forget your password, it cannot be
recovered and the file cannot be decrypted.
Note
macOS only supports password based decryption. A user cannot encrypt files on Windows using a
profile key and then decrypt them on macOS.
The Forcepoint Decryption Utility is copied to your removable media device along with the encrypted files. For
more information, see Decrypting Files on Windows and Decrypting Files on Mac.
Related tasks
Decrypting files on Windows on page 38
Decrypting files on Mac on page 40
Note
If you don’t know the version, open Forcepoint Decryption Utility.exe. This utility checks the
version and either decrypts the files, or opens wsdecrypt.exe if the version is v8.2.5 or lower.
3) Enter the encryption password when prompted. For more information about setting the encryption password,
see Setting encryption passwords.
Warning
Keep the encryption password in a safe place. If you forget your password, it cannot be
recovered and the file cannot be decrypted.
A dialog box opens and displays lists of subdirectories and files on your system.
4) Navigate to the folder containing the encrypted files. By default, the files are on your removable media
device.
5) Select the folders and files to decrypt, right-click, and select Save To.
Note
The Decryption Utility Help page might show an older version (8.5.x) and updated date. This is
the latest version of the utility and works with Forcepoint DLP Endpoint v22.12.
Related tasks
Setting encryption passwords on page 37
Steps
1) Insert the removable device into a Mac laptop or desktop.
3) Launch the application Forcepoint Decryption Utility in the disk volume or from the launchpad.
4) Drag and drop the encrypted files from the removable media device into the application’s list window.
5) Select the file to decrypt, and select Decrypt File As. If the selected file is not encrypted by Forcepoint DLP
Endpoint, the operation is disabled.
6) Enter the encryption password when prompted, then click OK. For more information about setting the
encryption password, see Setting encryption passwords.
7) Enter the file name that you want to save the decrypted file as.
8) If necessary, select the next file to decrypt. The password prompt is not shown again if the file is encrypted
by the same password.
The Forcepoint Decryption Utility decrypts the files using the password you provided and places them in this
path. Files that were encrypted with a different password are not decrypted.
Note
The Decryption Utility Help page might show an older version (8.5.x). This is the latest version
of the utility and works with Forcepoint DLP Endpoint v22.12.
Related tasks
Setting encryption passwords on page 37
Important
Contained files are automatically deleted after 7 days.
You can view the contents of contained files and choose to save them to an authorized location instead.
1) On the Forcepoint DLP Endpoint screen, click Contained Files.
2) To see the contents of a file, select the file and click Open.
3) To save a file to an authorized location, select the file and click Save As. You can now view the file from the
new location.
Viewing logs
There are two logs available in Forcepoint DLP Endpoint:
■ The System Log contains information about changes on your machine. For example:
■ Changes of connection status, such as your endpoint machine moving from an office to a remote location
■ When Forcepoint DLP Endpoint is enabled or disabled
■ When Forcepoint DLP Endpoint profiles are applied and updated
■ When Forcepoint DLP Endpoint is connected to or disconnected from the Forcepoint DLP Endpoint server
■ The Content Log contains information about file operations that have been picked up by the endpoint policy
and any actions taken by Forcepoint DLP Endpoint as a result.
To see the log details, choose one of the following options:
1) On the Forcepoint DLP Endpoint screen, click Log Viewer.
2) Right-click the F1E icon in the task bar’s notification area and select Open Log Viewer from the menu
(Windows), or single click the menu bar’s status menu (Mac) and select Log Viewer from the menu.
Important
Log files are automatically deleted after 5 days.
Forcepoint Endpoint Context Agent (Forcepoint ECA) is a software application that runs on your Windows endpoint
machine (e.g., desktop computer or laptop), providing user and application information to the Forcepoint Next
Generation Firewall (Forcepoint NGFW).
Related concepts
Viewing Forcepoint Endpoint Context Agent connection details on page 47
Related tasks
Using the Forcepoint ECA Diagnostics Tool on page 47
Related reference
Checking the status of Forcepoint Endpoint Context Agent on page 45
If your organization installs more than one F1E agent (Forcepoint Web Security Endpoint, Forcepoint DLP
Endpoint and/or Forcepoint ECA) on your endpoint machine, you can access all installed agents from one
Forcepoint icon on your task bar.
For more information about Forcepoint Web Security Endpoint and Forcepoint DLP Endpoint, see Forcepoint
Web Security Endpoint and Forcepoint DLP Endpoint.
Related concepts
Fallback mode on page 10
Forcepoint Web Security Endpoint on page 7
Forcepoint DLP Endpoint on page 13
A window opens showing all available connections to Forcepoint NGFW and the connection status.
Steps
1) Right-click the F1E icon located in the Windows task bar’s notification area.
Next steps
When you launch the tool, the Diagnostics Tool automatically executes the System information diagnostics test,
which collects basic information related to the specific endpoint machine on which the Forcepoint ECA software is
installed. To manually run the diagnostics test, click the Run Diagnostics button.
If Forcepoint Web Security Endpoint is also installed on your endpoint machine, the Diagnostics Tool shows
additional diagnostics tests and Forcepoint Web Security Endpoint information. See Using the Forcepoint Web
Security Endpoint Diagnostics Tool for more information.
If Forcepoint DLP Endpoint is installed on your endpoint machine, the Diagnostics Tool shows both Forcepoint
DLP Endpoint and Forcepoint ECA information.
Note
Corresponding log files generated from these new diagnostic tests can easily be collected with the
existing CLIENTINFO.EXE tool. Your Help Desk might ask you to run this tool to collect these files.
To run it, click the Collect Endpoint Info... button on the Diagnostics Tool. The resulting zip file is
placed onto the desktop. Attach the file to an email to your Help Desk or system administrator.
Related tasks
Using the Forcepoint Web Security Endpoint Diagnostics Tool on page 9