Example: air traffic controller

Installation and Deployment Guide - Forcepoint

And Deployment GuideForcepoint One endpoint Solutions 2020 ForcepointForcepoint and the Forcepoint logo are trademarks of Forcepoint . All other trademarks used in this document are the property of their respective 2020 Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein.

Dec 08, 2020 · Forcepoint™ One Endpoint solutions provide complete real-time protection against advanced threats and data theft for both network and roaming users. Forcepoint advanced technologies help yo u discover and protect sensitiv e data stored on endpoint machines and provide actionable forensic insight into potential attacks.

Tags:

  Protection, Endpoint

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of Installation and Deployment Guide - Forcepoint

1 And Deployment GuideForcepoint One endpoint Solutions 2020 ForcepointForcepoint and the Forcepoint logo are trademarks of Forcepoint . All other trademarks used in this document are the property of their respective 2020 Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein.

2 The information in this documentation is subject to change without modified 8-Dec-2020 Installation and Deployment Guide iContentsChapter 1 Introducing Forcepoint One endpoint .. 1 About this Guide .. 2 Related materials .. 2 Forcepoint One endpoint documentation .. 2 Forcepoint Support site and Knowledge Base .. 3 Management server Installation documentation .. 3 Forcepoint One endpoint configuration documentation .. 4 About Forcepoint One endpoint .. 4Do I have a Forcepoint One endpoint agent or a conventional Forcepoint endpoint agent?.. 5 Forcepoint One endpoint package builder.

3 6 Forcepoint Web Security endpoint .. 6 Forcepoint Proxy Connect endpoint .. 7 Forcepoint Direct Connect endpoint .. 7 Remote Filtering Client .. 8 Forcepoint DLP endpoint .. 8 Forcepoint endpoint Context Agent .. 9 Forcepoint CASB endpoint .. 9 Compatibility .. 9 Forcepoint Web Security endpoint .. 9 Forcepoint DLP endpoint .. 10 Forcepoint endpoint Context Agent .. 10 endpoint compatibility in a mixed Deployment .. 10 System requirements .. 11 Hardware requirements .. 11 Operating system requirements .. 11 Virtual Desktop Infrastructure (VDI) (DLP and ECA only).

4 11 Browser support .. 12 Forcepoint Web Security endpoint .. 12 Forcepoint DLP endpoint .. 12 Forcepoint DLP endpoint channel support .. 12 Email clients.. 12 Printer drivers.. 13 Application controls .. 13 Supported removable media .. 13 LAN control .. 14 Destination channels by operating system .. 14 Chapter 2 Obtaining or Creating the Installation Package .. 17 Preparing for your Forcepoint endpoint Context Agent Installation .. 18 Contentsii Forcepoint One endpoint SolutionsContentsAuthenticating Forcepoint ECA using client certificates .. 18 Configuring Forcepoint endpoint Context Agent settings in the SMC.

5 19 Downloading Forcepoint Web Security endpoint Installation packages (Cloud deployments) .. 20 Guidelines for creating an anti-tampering password .. 21 Using special characters (Mac operating systems) .. 21 Using special characters (Windows operating systems) .. 21 Creating Installation packages from the package builder (On-premises and Hybrid deployments) .. 22 Downloading the package builder.. 22 Checking file integrity.. 23 Creating the Installation package from the package builder .. 24 Forcepoint DLP endpoint .. 30 Forcepoint Web Security Direct Connect endpoint .

6 33 Forcepoint Web Security Proxy Connect endpoint .. 35 Remote Filtering Client .. 37 Forcepoint endpoint Context Agent .. 40 Forcepoint CASB endpoint .. 41 Global settings .. 42 Chapter 3 Deploying Forcepoint One endpoint in your Enterprise .. 43 Before you begin .. 43 Disabling automatic updates for Forcepoint Web Security endpoint .. 44 Adding a custom file to a Forcepoint Web Security Direct Connect endpoint Installation package .. 45 Deploying Windows endpoints .. 45 Manually deploying Forcepoint One endpoint agents on a Windows endpoint machine.

7 46 Stand-alone Forcepoint DLP endpoint packages .. 46 Combined Forcepoint DLP endpoint and Forcepoint CASB endpoint pack-ages .. 47 Forcepoint Web Security endpoint packages downloaded from the Force-point Cloud Security Gateway Portal (Cloud deployments) .. 47 Forcepoint Web Security Proxy Connect endpoint or mixed packages made via the package builder .. 48 Forcepoint Web Security Direct Connect endpoint or mixed packages made via the package builder .. 50 Forcepoint endpoint Context Agent packages made via the package builder50 Testing your Deployment .

8 51 Troubleshooting a Forcepoint endpoint Context Agent Deployment .. 52 Deploying Mac endpoints.. 53 Manually deploying Forcepoint One endpoint agents on a Mac endpoint machine .. 54 Deploying Forcepoint DLP endpoint using Jamf.. 55 Enabling full disk access on macOS and macOS 11 ( Forcepoint DLP Installation and Deployment Guide iiiContentsEndpoint only).. 55 Creating the file (Proxy Connect endpoint only) .. 56 Testing your Deployment 58 Deploying Forcepoint One endpoint agents and the Neo agent on an endpoint machine (Windows only) .. 58 Configuring and managing Forcepoint One endpoint agents.

9 59 Configuring Forcepoint DLP endpoint .. 59 Configuring the Forcepoint DLP endpoint Confirmation Dialog (Windows only) .. 59 Configuring Forcepoint Web Security endpoint .. 60 Configuring Forcepoint endpoint Context Agent .. 60 Configuring Remote Filtering Client .. 60 Configuring Forcepoint CASB endpoint .. 60 Uninstalling Forcepoint One endpoint software .. 61 Uninstalling Forcepoint One endpoint from a Windows endpoint machine . 61 Manually uninstalling Forcepoint One endpoint from a Windows endpoint machine .. 61 Uninstalling Forcepoint One endpoint using a Deployment server.

10 61 Uninstalling Forcepoint One endpoint using a distribution system .. 62 Uninstalling Forcepoint One endpoint from a Mac endpoint machine .. 63iv Forcepoint One endpoint SolutionsContents1 Installation and Deployment Guide 1 Introducing Forcepoint One EndpointInstallation and Deployment Guide | Forcepoint One endpoint | One endpoint solutions provide complete real-time protection against advanced threats and data theft for both network and roaming users. Forcepoint advanced technologies help you discover and protect sensitive data stored on endpoint machines and provide actionable forensic insight into potential attacks.


Related search queries