All About Forcepoint DLP
All About Forcepoint DLP
1. Licensing
Forcepoint subscription came in .xml files.
They are
uploaded to FSM.
They can be opened and read
In case the subscription got expire the analytics of it will not
work properly
2. Stages of data
Data in use
DLP agent is install on the end point machine which will monitor the application even a little
communication like something is being copied to another. The agent will keep assure of all the
communication and protect the network
Data in Motion
When data is being transmitted over some email with smtp or transmitting through the
webserver using https.
Data in rest
When data is not being transmitted or it’s not doing anything just staying at the rest in cloud or
in database
3. DLP terminology
Policies
Classifier: It’s way to identify the data that is monitored by the policies on some
Deploy: When you create a policy or you do any changes in policy then you
Incidents
Transaction: Movement of data from one point to another or any use of data
which is being monitored by the policy engine
4. Protectors scan the data. If needed, they ask Supplemental Servers to help with analysis.
5. If it violates rules:
6. The Analytics Engine looks for risky patterns or behaviors over time.
The forensic repository is where the system keeps copies of data that
triggered DLP policies.
For example: If someone tries to email a salary sheet and it’s blocked, the
system may store a snapshot of that attempt for auditing.
It's useful for investigation later—admins can see what data was involved
and who tried to send it.
DLP POLICIES
Quick Policies:
Predefined Policies:
Custom Policies: