Forcepoint Web Security Admin Course
Forcepoint Web Security Admin Course
Forcepoint Web Security Admin Course
5
Administrator Course
Appliance Overview
Deployment Overview
Delegated Administration
Extended Multiple
protection to deployment
roaming users options
Forcepoint Cloud
platform
Add-on Capability
Web Hybrid Platform Web protection and policy enforcement to remote users
Web DLP Powerful, contextually aware DLP engine for added outbound
protection against data theft
Cloud Sandbox / Behavioural sandboxing for automatic and manual analysis of
Advanced Malware malware files
Detection
Mobile Security Policies and protection to iOS and Android users
New bypass options allow requests to Office 365 to bypass either Content Gateway
user authentication, the Content Gateway proxy, or both
• User Identification
Logging /
Integration Management
Report
Forcepoint Manager
(Apache Tomcat)
Copyright © 2018 Forcepoint. All rights reserved.
Policy Determination/Enforcement
Filtering
1
Master
http://download.forcepoint.com
DB Service
Networking/
URL RegEx Policy Integration
Determination /
Enforcement
Transparent ID
2 Agent
Blocked Page
Policy
5 Usage
3 Server
Monitor
Transparent ID
Clients
4 User
Service
6 Reporting/
Alerting
Copyright © 2018 Forcepoint. All rights reserved.
Considerations when Using Multiple Policy Servers
Policy and most global configuration settings are shared between Policy Servers that
share a Policy Database.
• Risk class definitions
• Alerting options
Because policy information is managed by Policy Broker, policy changes are made
available to all Policy Server instances when you click Save and Deploy.
Configuration settings that are specific to a single Policy Server (like its Filtering Service
and Network Agent connections) are stored locally by each Policy Server and not
distributed.
In order to apply time-based actions correctly, one or more instances of Forcepoint State
Server is required.
Policy Server Limits Filtering Service Best Practices Log Server Limits
Each Policy Server instance can The number of Filtering Service instances for a • One instance of the Log
support: Policy Server depends on: Server per Policy Server
• Up to 10 Filtering Service • The number of users per Filtering Service
instances • The configuration of the Policy Server and Multiple Log Server
• Caches Policy Data up to 14 days Filtering Service machines instances can send data to
• 1 User Service • The volume of Internet requests a central Log Server, which
• 1 Usage Monitor • The quality of the network connection sends the data to the Log
• 1 Web Security Log Server between the components Database
• 1 State Server
• 1 Multiplexer
• 1 Directory Agent
User Networking
Origin
Web Server
User Service XID Agents
Configuration
Authentication Management
Provides user information via a Filtering
directory service
Allows transparent
identification
WEB module
Reporting /
Alerting Copyright © 2018 Forcepoint. All rights reserved.
User Authentication
User
Service
User Filtering
Authentication 1
Service
5 2 3
XID
Agents User
4 xyz\j_doe
Security Manager
On-prem Off-site/
Users Remote Users
Transparent Identification
DC RADIUS RADIUS
Agent Agent Agent
On-prem Off-site/
Users Remote Users
Filtering Hybrid
Service Service
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
QUESTION
Which of the following are new features in version 8.5 (pick two)?
A. Report Center
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
Logging and Reporting Components
• Store logs from filtering service
Log
DB
(Microsoft SQL)
Multiplexer
TRITON Manager
Log Server
Reporting Tools
wslogdb_1
Incoming Web Partitions
Transactions
Catalog DB
wslogdb
ETL, this job runs continuously, receiving data and then inserting it into the partition
database
Database Maintenance, this job performs database maintenance tasks and preserves
optimal performance
IBT, this job analyzes the data and calculates browse time
Runs nightly, by default.
AMT ETL, the data processed by this job shows on the Threats Dashboard of Web
Security Manager
Trend Job, this job is responsible for processing trend data available in Security Manager
• Source, Destination IP
Where • Ports
• URL
• Time
When • Transaction Duration
Policy Policy
Web Filter Policy
Server Broker
DB
(PostgreSQL)
Logging /
Report
Forcepoint Manager
(Apache Tomcat)
Citrix
ICAP Service
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
QUESTION
Which three of the following statements are true about web protection
components?
A. All components, except Content Gateway, can reside on Windows
servers.
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
Let’s Take a Break
Forcepoint V5000 G2 / G3
Forcepoint V10000 G4R2
Forcepoint V20000 G1
Forcepoint V10000 G4
Is the active mode when you log on for the first time
Provides access to config and diagnose modes
Allows the following commands:
clear session
Ends a config session allowing another admin
to enter config mode.
exit
Closes the ssh session.
help
Lists the commands available in view mode.
help <command>
Lists information about the full syntax of a command.
show
Lists 25+ commands to display current configurations. These commands are detailed on the following slides.
Branch DMZ
Internet
Corporate Network
DMZ Active Mail Branch
Directory Server Users
Server
Active Mail
Directory ArcSight
Server Logger
Server
Branch DMZ
Internet
Forcepoint Manager
Corporate Network
ACE DMZ Active Mail Branch
Directory Server Users
THREATSEEKER Server
FORCEPOINT
Update servers Local Users VLAN Database
VLAN Active Mail
Directory ArcSight
Server
Server Logger
• Content Gateway
• Policy Broker
• Policy Server
• Filtering Service
• Off-Box components • Network Agent
• XID agents • User Service
• Additional policy
enforcement
components
Log Server
• Security Manager
• Reporting Tools
• Real-Time Monitor
• Content Gateway
• Security Manager
Log Server • Reporting Tools
• Real-Time Monitor
Network Agent
Internet
3
2 2
4
LAN
Explicit Proxy
• User’s client software is configured to send requests directly to Content Gateway
• Manual browser configuration
• Supports GPO, WPAD or PAC File
Transparent Proxy
• User requests are transparently redirected to a Content Gateway proxy, typically by a switch
or router, on the way to their eventual destination
• Supports WCCP, PBR Layer 4 Switch
Client HTTP Direct connection to proxy by Redirected to proxy by network Direct connection to parent
request browser to port 8080 (default) device using GRE proxy from child proxy
encapsulation or by rewriting the
L2 destination MAC address to
the proxy's address
Exception Exclude site, CIDR, etc., using Static or dynamic bypass rules Child/parent proxy configuration
management browser configuration settings and rules
PAC file settings.
Proxy user Proxy challenge using 407 Proxy Challenge using server-based Proxies in a chain may share
authentication Authentication Required code authentication scheme (client is credential information, or a
not aware of proxy) single proxy in the chain can
perform authentication.
Redundancy Proxy virtual IP pool shared across WCCP pool with multiple Parent/child configuration points
multiple proxies proxies to proxy virtual IP addresses.
Proxy Management clustering Management clustering Management clustering
management
Load balancers Supported N/A Supported
Copyright © 2017 Forcepoint. All rights reserved. | 57
Explicit Proxy: Pros and Cons
Pros Cons
Easy to troubleshoot
3 4 Internet
Easy, accurate authentication Users
1 2
Copyright © 2017 Forcepoint. All rights reserved. | 58
Web Security
Administration
Console Address
https://<IP address>:9443/cm/
Forcepoint Security
Appliance Manager For example:
https://172.31.0.155:9443/cm/
records.config
vs
Subscription data appears only after the Master Database is downloaded and processed
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
Delegated
Administration
Global Security
Administrator
Security Manager
Delegated Administrators
m a n a g e d c l i e n t s
Super Administrator
Unconditional / Conditional
Delegated
administration Investigative
Policy role reporting
management
and reporting
Product components
Product administration
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
Thank you!
(End of Module 1)
FORCEPOINT
© 2018 Forcepoint
HOMEWORK
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
HOMEWORK
Complete all 1.4.1: Configure User Directory Service Settings
seven (7) lab
activities 1.4.2: Become Familiar with the Default Policy as a
belonging to Super Admin
1.4: Perform
Delegated
Administration. 1.4.3: Become Familiar with the Categories and
Protocols Blocked and Locked by Default
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
HANDS-ON LAB
1.4: Perform Delegated Administration
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
1.4.1: Configure User Directory Service Settings
1. Navigate to Web > Settings > General > Directory Services.
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
1.4.2: Become Familiar with the Default Policy as a Super Admin
1. Go to Main > Policy Management > Policies to view the Default policy details.
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
1.4.3: Become Familiar with the Categories and Protocols Blocked and
Locked by Default
1. Go to the Filter Lock > Categories page. 2. Go to the Filter Lock > Protocols page. Notice
Notice the categories that are blocked and that P2P File Sharing and related apps are
locked by default: blocked and locked by default:
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
1.4.4: Configure Directory Service Settings for Administrator Accounts
1. Click to go to Global Settings > General > User Directory and set the Active Directory
server.
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
1.4.5: Create Administrator Accounts
1. Go to Global Settings > General > Administrators.
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
(cont.) 1.4.5: Create Administrator Accounts
3. Grant administrator access to AD users David Villa and Chad Smith.
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
1.4.6: Create Delegated Administration Roles
1. Go to Web > Main > Policy Management > Delegated Administration to create three roles
with the following settings:
Role Name Role Type Administrator Clients Permission
Account(s)
Global executives Policy management and David Villa • Executives Policy management > Full policy
reporting • IT
Intern (auditor) Policy management and Chad Smith • Engineering Policy management > Auditor
reporting
IT reporting and Investigative reporting infosec_admin • Accounting Reporting
auditing • Engineering
• Executives
• HR
• IT
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
(cont.) 1.4.6: Create Delegated Administration Roles
The role settings should match the following:
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
1.4.7: Access Security Manager using Delegated Administration
1. Log on to Security Manager using the following accounts (in the following order):
• csmith
• dvilla
• infosec_admin
Make sure to log off before using the next account.
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
(cont.) 1.4.7: Access Security Manager using Delegated Administration
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
Module 2:
Policy Enforcement
and Filtering
Policy Management
Policy Enforcement
Limited Govern
Category Protocol
access Schedule Internet
filters filters
filters access
Best Practice:
• Edit the Default policy first, to set the baseline for Internet access at your
organization.
• Create custom policies as needed to provide the levels of access needed for
different groups in your organization.
Category Filters
Define which website categories
to apply filter actions
Protocol Filters
Define which non-HTTP protocols
to apply filter actions
Computers
Networks
Directory
Digital
Certificate
Trusted CAs
Digital
Certificate
Trusted CAs
Copyright © 2018 Forcepoint. All rights reserved.
Intercepting SSL: Trusted Man-in-the-Middle (MITM)
HTTP/s sites
ARM Proxy
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
QUESTION ANSWER
Which two of the following descriptions Answers are C and D.
best describe Content Gateway?
A. Like Network Agent, Content Gateway is
a proxy through which clients connect to
Web content.
Analyzes web traffic that is not blocked and passing through the on-premises proxy
Uses a set of data files to perform the following advanced analysis features, in this
order:
• Tunneled protocol detection
• Content categorization
• Content security
• File analysis
• Outbound security analysis
• Other options: Content Categorization and Scanning Sensitivity Level, Content Delay Handling, Scanning
Timeout, Scan Size Limit, and Content Stripping
Hostname exceptions
• List of trusted or untrusted sites
• Always scanned or never scanned
• Content Gateway allows exceptions
for tunneled protocol detection
Client exceptions
• List of trusted users that are never
scanned
• Exception precedence
For sites requiring client certificates, configure Content Gateway to tunnel a specific URL
• Bypass traffic without decryption (default setting)
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
2.3.1: Configure Content Gateway for Windows Authentication
and HTTPS Inspection
1. Access Content Gateway Manager from Security Manager.
2. Enable Integrated Windows Authentication
and join the fpcert.com domain.
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
2.3.3: Enable and Test Link Analysis
1. Enable link analysis.
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
2.3.4: Test Search Filtering
1. On Security Manager, verify that search filtering is disabled (Web > Settings >
General > Filtering > Search Filtering).
2. In Client-W10, launch a web browser, and then search for a word that will trigger the
Adult content policy.
Result: Real-time Monitor > Link Analysis categorizes the request as Sex.
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
2.3.5: Configure Outbound Scanning
1. On Security Manager, ensure that Security Threats: Content Scanning is enabled.
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
2.3.6: Adjust Content Scanning Sensitivity Level
Modify the sensitivity level and re-run some of the earlier tests and see if the results differ.
Web > Settings > Scanning > Scanning Options > Advanced Options
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
Policy
Enforcement
Master Client
ACE
DB requests
User
User
authentic
identity
ation
Policy
Filtering
Service
Filter
Action
• XID agent
• Manual authentication
using network credentials
• Content Gateway user
authentication
IWA
Legacy
NTLM
LDAP Content Gateway Policy
User Enforcement
Authentication
RADIUS
Rule-based
authentication
5. The Default
1. User 2. IP address 3. Groups 4. Domain (OU)
policy
Policy
matches?
Cloud App Yes
Filtering
Policy
matches?
No Filtering Result
Category
Filtering Policy
matches?
Yes/No
Limited
Permit No Block No
Access
All? All? Filter?
Yes Yes
No Yes
Permitted
Sites
Permit/Display
URL
Block URL
Copyright © 2018 Forcepoint. All rights reserved.
URL Filtering: Steps 2-5
Non-
HTTP Re-
Unfiltered No No No Master
data classified
URLs? DB
requeste URLs?
d?
Permitted
Protocol?
Permitted
No
Sites
Yes Yes No
No
Permit/Display URL
Block URL
No No Click
Permitted Quota
Confirm Continue
? Time?
?
No
Yes
Yes
Yes
Use No
Quota
Yes Time?
Block URL
Permit/Display
URL Permit for a limited time
User
Computer
IP Address
Network
IP Address /
Range
Group
Organizational
Unit (OU)
Default Policy
Advanced analysis
Policy enforcement
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
Thank you!
(End of Module 2)
FORCEPOINT
© 2018 Forcepoint
Module 3:
Monitoring
Web Security Activities
Reports
Advanced File
Scheduler
Analysis Report
Log Server must be deployed to enable reporting features (except Real-Time Monitor)
Version, Source Server IP, Time, Disposition, Source Address, Destination Address, Protocol, Full URL, Port, Category,
Application Type, Bytes Sent, Bytes Received, Duration, Keyword, User Path
Stores the records of Internet activity and the associated filtering actions
Includes one catalog database and one standard logging partition database, by default
Multiple standard logging partition databases are created as Internet activity is recorded
Has a collection of five jobs each with its own functionality inside the Log Database
Threat Protection
Appliance (a.k.a. Forcepoint
Advanced Malware Detection
Appliance for Web
Web Sandbox
module
Web Security
FORCEPOINT
© 2018 Forcepoint
Module 4:
Disaster Response and
Recovery
Incident Response
System Health
Disaster Recovery
Active Alerts
Shows the status of monitored
Web Security components
If an error or warning appears in the summary, click the alert message to open the Alerts
page, where more detailed information is available
Forcepoint.com
• Product Installers
• Patches & Hotfixes
• Upgrades
What version is my
installation on?
• Security Manager
• Content Gateway Manager
• Appliance CLI
Other installers for other OS’s will also be found in this section, and any other
additional file not found on the compiled installer (full installer)
Example:
•Major disasters
occur mostly •Many minor
without warning; disasters provide
Can
some with a sense Natural
damage
little warning
disaster
of warning reputation
Planning
Do a self-assessment to identify mission and
business-critical apps/servers and channels
that need protection.
Implementing Testing
Consider all areas: protection, Is backup and recovery
cloud services, communication sufficient?
servers and others.
Internet
Backup locations:
• Appliance backups
• Security Manager backups
• Web Security backups
• Content Gateway Manager snapshots
• Remote
• Full Backup
• Web Security
• Can be scheduled
Appliance CLI
• Local Backup # create backup schedule
• Full Backup
• Web Security
• Can be scheduled
Disabled by default
Needs extra configuration, backup directory, credentials, etc.
Part of the Windows task scheduler
Backs up all Web Security configuration
Located in C:\Program Files (x86)\Websense\EIP Infra\
Task executes EIPBackup.vbs
IMPORTANT:
This backup
does NOT save
any Web Security
settings.
An EIPBackup directory is created on the first time the Windows backup task
runs
• Inside this folder are the different backups sorted by time stamps
IMPORTANT:
This backup does NOT
save any Web Security
settings.
PGSetup
• Saves a copy of the Policy Database and client objects
• Only runs on Policy Broker machines
• Runs via DOS command line:
PgSetup -- save FileName.db
PgSetup -- save \\Server\Directory\File_Path\
WSBackup
• Saves a copy of all configuration files and folders needed to restore a Web Security installation
• Can be scheduled
• Exports two files:
Backup configuration parameters
Compressed file with all files backed up in .tar.gz format
Linux syntax:
/wsbackup -b -d <directory>
• Make sure to export libraries:
export LD_LIBRARY_PATH=
• To schedule a backup:
./wsbackup -b -s -t \"<m> <h> <day_of_month> <month> <day_of_week>\" -d <directory>
IMPORTANT:
Restart is required for
restored snapshots
to take full effect.
Option 1: Option 2:
• Restore from Remote Server
• Full Appliance
• Web Security configuration
Appliance CLI
# restore backup
• Restore from Local Backup
• Full Appliance
• Web Security
Use the Forcepoint Security Setup > Use Backup data option
WsBackup
• Restores configuration of previously installed components
• Cross-platform restore is not supported
• Syntax:
Wsbackup –r (Restore flag) –f (directory and file name of restore file)
PgSetup
• PgSetup --restore FileName.db
FORCEPOINT
Copyright © 2018 Forcepoint.
© 2 0 1 8 FAll
o r rights
c e p o ireserved.
nt
- End of the Course -
FORCEPOINT
© 2018 Forcepoint