WSC DLP En-Us
WSC DLP En-Us
Revision A
Forcepoint Web Security Cloud | Data Loss Prevention in Forcepoint Web Security Cloud
Contents
■ Introduction on page 2
■ Create content classifiers on page 3
■ Configure Data Security (DLP Lite) policy settings on page 8
■ Configure privacy settings on page 14
■ Configure reporting permissions on page 15
■ Configure block pages on page 15
■ View the dashboard on page 16
■ View reports on page 17
■ View the audit trail on page 18
Introduction
The Data Security (DLP Lite) feature in Forcepoint Web Security Cloud lets you monitor and prevent the loss of
sensitive data and intellectual property via the web, as well as to easily assess your current level of risk exposure
via reporting. You can protect intellectual property, data that is protected by national legislation or industry
regulation, and data suspected to be stolen by malware or malicious activities. When DLP Lite is used for data
loss prevention, basic data protection is provide by the cloud proxy.
Note
Integration with Data Protect Service is also available for Web Security Cloud customers. With
this integration, enterprise data security is handled by the Data Protection Service. For further
information, please contact your account manager.
This document guides you through the steps required to get started with Data Security (DLP Lite) for your web
product using the Forcepoint Cloud Security Gateway Portal, also referred to as the cloud portal.
Note
DLP Lite is not supported with the Direct Connect endpoint or I Series appliances.
The following steps are required to configure data security for your account.
Content classifiers are rules you can define to identify sensitive information, using custom phrases,
dictionaries or regular expressions containing business specific terms or labels. This is helpful for monitoring
intellectual property.
Use the Data Security tab in your policies to define which types of data are protected, and the action to take
when data loss is detected.
2
Forcepoint Web Security Cloud | Data Loss Prevention in Forcepoint Web Security Cloud
Related concepts
Configure privacy settings on page 14
View the dashboard on page 16
View the audit trail on page 18
Related tasks
Create content classifiers on page 3
Configure Data Security (DLP Lite) policy settings on page 8
Configure reporting permissions on page 15
Configure block pages on page 15
View reports on page 17
3
Forcepoint Web Security Cloud | Data Loss Prevention in Forcepoint Web Security Cloud
Steps
1) In the cloud portal, navigate to Web > Policy Management > Content Classifiers.
2) Click Add and select the type of classifier you want to create:
■ Key Phrase: a keyword or phrase that indicates sensitive or proprietary data (such as product code
names or patents).
■ Regular Expression: a pattern used to describe a set of search criteria based on syntax rules.
For example, the pattern “a\d+” detects all strings that start with the letter “a” and are followed by at least
one digit, where “\d” represents any digit and “+” represents “at least one.”
Regular expression patterns are detailed in the Forcepoint Web Security Cloud help: see Regular
expression content classifiers.
■ Dictionary: a container for words and expressions relating to your business.
3) Complete the fields as described in the appropriate section, and then click Save.
■ Key phrase content classifiers
■ Regular expression content classifiers
■ Dictionary content classifiers
4) Repeat steps 2-3 until you’ve added all the classifiers you require.
Related concepts
Regular expression content classifiers on page 5
4
Forcepoint Web Security Cloud | Data Loss Prevention in Forcepoint Web Security Cloud
Related tasks
Key phrase content classifiers on page 6
Dictionary content classifiers on page 7
Regular expression (regex) patterns can be detected within content, such as the pattern of an internal account
number, or alphanumeric document code.
When extracted text from a transaction is scanned, the system searches for strings that match regular expression
patterns and may be indicative of confidential information.
To create a regular expression classifier:
3) Enter the Regular expression pattern (regex) that you want the system to search for, using Perl syntax.
For syntax and examples, click Help > Explain This Page within the cloud portal, or view the help page at
the following link: Regular expression content classifiers.
4) Use the Pattern Testing section of the page to test your regular expression.
Because regular expression patterns can be quite complex, it is important that you test the pattern before
saving it. If improperly written, a pattern can create false- positive incidents.
5
Forcepoint Web Security Cloud | Data Loss Prevention in Forcepoint Web Security Cloud
a) Create a .txt file (less than 1 MB) that contains values that match this regex pattern. The file must be in
plain text UTF8 format.
b) Browse to the file and click Test to test the validity of your pattern syntax. If the pattern you entered is
invalid, you’re given an opportunity to fix it. You cannot proceed until the test succeeds.
The presence of a keyword or phrase (such as “Top Secret” or “Project X”) in a web post may indicate
that classified information is being exposed. You can learn about activity like this by defining a key
phrase classifier.
Steps
1) Enter a unique Name for the key phrase classifier.
3) Enter the key word or phrase that might indicate classified information, up to 255 characters. Key phrases
are case-insensitive.
Leading and trailing white spaces are ignored. If you need to use slashes, tabs, hyphens, underscores, or
carriage returns, define a regular expression classifier rather than a key word classifier.
6
Forcepoint Web Security Cloud | Data Loss Prevention in Forcepoint Web Security Cloud
Next steps
Key phrases also identify partial matches. For example, the key phrase “uri” reports a match for “security”. Note
that wildcards are not supported for key phrases.
You can have up to 100 key phrase classifiers.
Steps
1) Enter a unique Name for the dictionary classifier.
7
Forcepoint Web Security Cloud | Data Loss Prevention in Forcepoint Web Security Cloud
3) Dictionaries can have up to 100 phrases. To add content to the dictionary, click Add under Dictionary
content.
b) Weight: Select a weight, from -999 to 999 (excluding 0). When matched with a threshold, weight defines
how many instances of a phrase can be present, in relation to other phrases, before triggering a policy.
5) If you have many phrases to include, create a text file listing the phrases, then click Import and navigate to
the text file.
6) Mark The phrases in this dictionary are case-sensitive if you want the phrases that you entered to be
added to the dictionary with the same case you applied.
Next steps
You can have up to 100 dictionary classifiers. Each is limited to 100 phrases.
For examples and restrictions, click Help > Explain This Page.
Steps
1) In the portal, navigate to Account > Data Protection Settings .
2) In the Web Defaults section, select Use DLP Lite. Save you changes.
When Use DLP Lite is selected, a Data Security tab is available for new policies.
8
Forcepoint Web Security Cloud | Data Loss Prevention in Forcepoint Web Security Cloud
3) Navigate to the Web > Policy Management > Policies, page, then open the policy you want to configure.
Related concepts
Trusted domains on page 13
Related tasks
Custom data security classifiers on page 12
Related reference
Data security regulations on page 9
Data theft detection on page 10
9
Forcepoint Web Security Cloud | Data Loss Prevention in Forcepoint Web Security Cloud
Most countries and certain industries have laws and regulations that protect customers, patients, or staff from the
loss of personal information such as credit card numbers, social security numbers, and health information.
To set up rules for the regulations that pertain to you:
Field Description
Payment Card Industry (PCI DSS) Conforms to the Payment Card Industry (PCI) Data
Security Standard, a common industry standard that
is accepted internationally by all major credit card
issuers. The standard is enforced on companies
that accept credit card payments, as well as other
companies and organization that process, store, or
transmit cardholder data.
4) Select an action to take when matching data is detected. Select Block to prevent the data from being sent
through the web channel. Select Monitor to allow it. (Incidents are created either way.) You can filter by
action in the Data Security Incident Manager.
5) Select a sensitivity to indicate how narrowly or widely to conduct the search. Select Wide for the strictest
security. Wide has a looser set of detection criteria than Default or Narrow, so false positives may result and
performance may be affected. Select Narrow for tighter detection criteria. This can result in false negatives
or undetected matches. Default is a balance between the two. Severity is automatically calculated for these
regulations.
Use this section to detect when data is being exposed due to malware or malicious transactions. When you select
these options, Forcepoint Web Security Cloud searches for and reports on outbound passwords, encrypted files,
network data, and other types of information that could be indicative of a malicious act.
10
Forcepoint Web Security Cloud | Data Loss Prevention in Forcepoint Web Security Cloud
Encrypted file - unknown format Searches for outbound files that were encrypted
using unknown encryption formats
2) Select an action to take when matching data is detected. Select Block to prevent the data from being sent
through the web channel. Select Monitor to allow it. (Incidents are created either way.) You can filter by
action in the Data Security Incident Manager.
3) Select a sensitivity to indicate how narrowly or widely to conduct the search. Select Wide for the strictest
security. Wide has a looser set of detection criteria than Default or Narrow, so false positives may result and
performance may be affected. Select Narrow for tighter detection criteria. This can result in false negatives
or undetected matches. Default is a balance between the two. Severity is automatically calculated for these
types.
11
Forcepoint Web Security Cloud | Data Loss Prevention in Forcepoint Web Security Cloud
Use this section if you want to detect intellectual property or sensitive data using custom phrases,
dictionaries, or regular expressions containing business-specific terms or data.
Steps
1) Select the classifiers that you want to enable for the policy. If you skipped the section Create content
classifiers, go there now to populate the list.
2) Select a severity for each classifier to indicate how severe a breach would be. Select High for the most
severe breaches. Severity is used for reporting purposes. It allows you to easily locate High, Medium, or Low
severity breaches when viewing reports.
12
Forcepoint Web Security Cloud | Data Loss Prevention in Forcepoint Web Security Cloud
b) Indicate how many times this classifier should be matched to trigger an incident. You can indicate a
range if desired, such as between 3 and 10. By default, the threshold is 1.
c) Indicate whether you want the system to count each match, even if it is a duplicate, against the
threshold, or whether you’d prefer to only count unique matches.
d) Click OK.
Related tasks
Create content classifiers on page 3
Trusted domains
Select Enable trusted domains if you do not want certain domains to be monitored, then enter URLs for the
trusted domains separated by commas.
13
Forcepoint Web Security Cloud | Data Loss Prevention in Forcepoint Web Security Cloud
The system does not analyze content passed between trusted domains. This means users can send them any
type of sensitive information via HTTP, HTTPS, or other web channels from your network.
The domains you enter apply only to data security and only to the current web policy.
Duplicate URLs are not permitted. Wildcards and ‘?’ are supported.
By default, incident data is not captured, stored, or displayed. Administrators with permission to view incident
data are able to see the number of matches in the report, but not the match values or context.
Select Store and display incident data under Data Security Incident Settings if you want the values that
triggered data security incidents to be captured, stored in the incident database, and displayed in reports.
Credit card numbers, social security numbers, and email addresses are masked when they are stored, as are
passwords in certain instances.
Changing this setting has no impact on incident data that has already been collected.
14
Forcepoint Web Security Cloud | Data Loss Prevention in Forcepoint Web Security Cloud
Steps
1) Navigate to Account > Settings > Contacts.
3) In Contact Details, click the user name (email address) to view the contact login details.
5) Under Account Permissions, select View All Reports and Data Security Reports, and then click Save.
Next steps
This enables users to view data security reports, which may or may not contain incident forensics and trigger
data, depending on your privacy protection settings. It does not change their ability to manage data security
configuration settings.
Steps
1) Go to the Web > Policy Management > Block & Notification Pages page.
2) Expand General.
15
Forcepoint Web Security Cloud | Data Loss Prevention in Forcepoint Web Security Cloud
4) Click in the title or body to edit the default text. You can replace logos and other images as well.
16
Forcepoint Web Security Cloud | Data Loss Prevention in Forcepoint Web Security Cloud
View reports
Before you begin
For a more granular view, access the data security reports.
Steps
1) Go to the Reporting > Report Catalog page.
2) Select Standard Reports > Data Security from the left navigation pane, and then select a report category:
Content Type, Incidents, or Sources & Destinations.
3) Select a report from the list. The following table provides descriptions of each report
1) Report Description
Content Type
Compliance Summary Details the compliance rules are most often violated in your organization, and
provides a breakdown of the incident count for each policy or rule.
Custom Classifier Shows which custom classifiers triggered the most incidents during the
Summary designated period.
Data Theft Summary A list of data theft classifiers that triggered the most incidents during the
designated period.
Incidents
17
Forcepoint Web Security Cloud | Data Loss Prevention in Forcepoint Web Security Cloud
Report Description
Incident List A list or chart of all data loss incidents that were detected during the designated
period, along with incident details such as the destination, severity, and
transaction size.
Destination Summary The destination URLs or IP addresses involved with the most violations, broken
down by severity.
Users Summary The users, machines, or IP addresses most frequently violating data security
policies and the severity of their breaches.
4) After you select a report, select a time period (last 7 days by default) and any required attributes, then click
the Update Report button .
Tip
To view only incidents that meet a certain threshold (not every single match), filter the report
using the Top Matches attribute.
Top Matches indicates the number of matches on the incident's most violated rule. For example,
if rule A in MyPolicy has 2 matches, rule B has 5 matches, and rule C has 10 matches, top
match equals 10.
When you apply the filter, enter the threshold to include in the report, and then select the
operator to use: equal to, greater than, etc.
Refer to the Forcepoint Cloud Security Gateway Portal Help for details on adding attributes to a report.
18
Forcepoint Web Security Cloud | Data Loss Prevention in Forcepoint Web Security Cloud
19
© 2024 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.
All other trademarks used in this document are the property of their respective owners.
Published 08 August 2024