Forcepoint F1E ep_install guide
Forcepoint F1E ep_install guide
23.11
Install Guide
Revision A
© 2024 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.
All other trademarks used in this document are the property of their respective owners.
Every effort has been made to ensure the accuracy of this document. However, Forcepoint
makes no warranties with respect to this documentation and disclaims any implied
warranties of merchantability and fitness for a particular purpose. Forcepoint shall not
be liable for any error or for incidental or consequential damages in connection with the
furnishing, performance, or use of this manual or the examples herein. The information in
this documentation is subject to change without notice.
Install Guide
Contents
1 Introducing Forcepoint F1E................................................................................................................................ 5
About the Product.......................................................................................................................................... 5
Forcepoint F1E Agent components............................................................................................................... 5
About this guide............................................................................................................................................. 6
Related Materials........................................................................................................................................... 6
About Forcepoint F1E.................................................................................................................................... 8
Compatibility................................................................................................................................................. 11
System requirements................................................................................................................................... 13
3
Install Guide
4
Chapter 1
Introducing Forcepoint F1E
Contents
This guide covers the full range of functionality available in the Forcepoint F1E agents.
(Forcepoint NGFW) Engine managed by the Security Management Center (SMC). Forcepoint ECA is only
available for Windows endpoint machines. Requires Forcepoint NGFW v6.10 (or later).
Important
While Forcepoint F1E can be deployed in an enterprise environment using MDM services such
as Jamf, Forcepoint does not document the full deployment process for third-party products in our
guides. For more information about deploying Forcepoint F1E agents using MDM, please consult
the documentation for the individual products.
Related concepts
Introducing Forcepoint F1E on page 5
Obtaining or Creating the Installation Package on page 19
Related reference
Deploying Forcepoint F1E in your Enterprise on page 45
Related Materials
Note
Note Forcepoint DLP and Forcepoint Web Security are installed as modules on the Forcepoint
Security Manager. For more information about the Forcepoint Security Manager, see the Forcepoint
Security Manager Help.
Note
Note The Remote Filtering Client has not transitioned to the Forcepoint F1E platform. You can build
conventional Remote Filtering Client installation packages through this package builder. They will
have the same build number (for example, v21.07.5133) as the installation packages created for
Forcepoint F1Es.
Important
The Forcepoint DLP v8.8.x and later installation no longer contains the package builder used to
create the Forcepoint DLP Endpoint installation package. To prepare the latest Forcepoint DLP
Endpoint, you must download the latest package builder from the Forcepoint Downloads page.
Note
Tip When creating the installation package with Package Builder on macOS, you can disable the
installation of browser extensions. These extensions should then be deployed using our MDM
solution. For an example, see Deploying the Forcepoint DLP Endpoint Chrome Extension on Mac
Endpoints using Jamf.
Note
Important You can deploy a mix of Forcepoint Proxy Connect Endpoint, Forcepoint Direct Connect
Endpoint, and Remote Filtering Client agents within your organization. However, you can only install
one agent option on an individual endpoint machine.
■ Forcepoint Proxy Connect Endpoint redirects HTTP and HTTPS traffic to the hybrid or cloud service with an
encrypted token that identifies the user, enabling the correct policy to be applied and reporting data to be
correctly logged. No password or other security information is included.
■ For supported browsers, Forcepoint Proxy Connect Endpoint manipulates proxy settings in real time. For
example, if Forcepoint Proxy Connect Endpoint detects it is at a hotspot, but the user has not finished
registration, it removes its proxy settings until the gateway has successfully opened.
You can enable Forcepoint Proxy Connect Endpoint for some or all machines managed by the cloud or hybrid
service.
Important
Although Forcepoint Direct Connect Endpoint can provide improved security coverage as outlined
in the use cases above, check that the networking requirements and level of feature support are
acceptable in your intended deployment.
Compatibility
DLP EP
DCEP
PCEP
RF
ECA
CASB EP
System requirements
Hardware requirements
Windows
Windows endpoint machines must meet the following minimum hardware requirements.
■ At least i3 or similar (1.8 GHz or above)
■ At least 8 GB RAM
■ At least 1.5 GB free hard disk space
Mac
Mac endpoint machines must meet the following minimum hardware requirements.
■ At least 8 GB RAM
■ At least 1.5 GB free hard disk space
Browser support
Email clients
Forcepoint DLP analyzes all email messages sent from Forcepoint DLP Endpoint users, even if they send them
to external web mail services like Yahoo.
On Windows endpoint machines, Forcepoint DLP can analyze endpoint email generated by Microsoft Outlook
and IBM Notes. However, rules are not enforced on Notes messages if Notes is configured to send mail directly
to the Internet, rather than through the Domino server.
Forcepoint DLP supports the desktop version of Outlook 2010, 2013, and 2016, but not the Windows 8 touch
version. Forcepoint DLP supports IBM Notes versions 8.5.1, 8.5.2 FP4, 8.5.3, and 9.
On Mac endpoint machines, Forcepoint DLP can analyze email generated by Outlook 2011, Outlook 2016, and
Apple Mail.
Forcepoint DLP can detect incidents in S/MIME encrypted messages sent from Outlook 2013 (Windows), Outlook
2016 (Windows), and Outlook 2016 (Mac).
Printer drivers
You can monitor data being sent from an endpoint machine to a local or network printer. Forcepoint DLP supports
drivers that print to a physical device, as well as those that print to file or PDF.
Application controls
You can monitor or prevent sensitive data from being cut, copied and pasted from an application like Microsoft
Word or a web browser. This is desirable, because endpoint machines are often disconnected from the corporate
network and can pose a security risk.
Forcepoint DLP can monitor cut, copy and paste operations on most browsers, such as Edge, Firefox, Safari, and
Chrome.
It can also control access to files. For example, you can monitor uploads to cloud storage clients like DropBox
and also VOIP clients like GoToMeeting.
For more information about the applications that Forcepoint DLP can monitor out of the box, see Applications
Monitored in the Endpoint Application channel for Forcepoint DLP Endpoint. You can also add custom
applications.
Note
Forcepoint DLP endpoint only supports flash based removable media devices on Windows
endpoints. It does not support SCSI over USB or similar.
Forcepoint DLP Endpoint provides two methods to encrypt sensitive data that is being copied to removable
media devices. You can:
■ Encrypt with profile key: Windows only. Encrypt with a password deployed in the endpoint profile. This
option is for users on authorized machines—ones with Forcepoint DLP Endpoint installed—when they try
to decrypt files.
Select Encrypt with profile key when configuring your action plans for endpoint removable media. The
action defaults to permitted on Mac endpoint machines regardless of your action plan setting.
■ Encrypt with user password: Windows only. Encrypt with a password supplied by the Forcepoint DLP
Endpoint user. This option is for users decrypting files from machines without Forcepoint DLP Endpoint
installed. Select Encrypt with user password when configuring your action plans for endpoint removable
media. The action defaults to permitted on Mac endpoint machines regardless of your action plan setting.
See Configuring encryption for removable media in the Forcepoint DLP Administrator Help for more
information.
Forcepoint DLP Endpoint supports block and permit actions on file transfers to Windows Portable Devices
(WPD), but does not support the encryption of data transferred to a WPD from a Windows endpoint machine.
■ CD/DVD writers - Forcepoint DLP monitors unencrypted data being copied to native Windows and Mac CD/
DVD burner applications. It monitors non-native Windows CD/DVD burner applications as well, but only blocks
or permits operations without performing content classification.
Non-native CD/DVD blocking applies to CD, DVD, and Blu-ray read-write devices on Windows 8, Windows
Server 2012, and Windows Server 2016 endpoint machines.
■ Mobile devices - On Windows 10 (Creators Update, version 1703 and later), Forcepoint DLP can monitor
unencrypted data being copied to mobile devices through the WPD protocol. This allows you to use
application file access monitoring on software clients like Apple iTunes and Samsung Kies when needed.
Forcepoint DLP Endpoint does not support the encryption of data transferred to a WPD from a Windows
endpoint machine.
LAN control
Users commonly take their laptops home and then copy data through a LAN connection to a network drive or
share on another endpoint machine. With Forcepoint DLP, you can control LAN operations to protect your data.
Endpoint LAN control is applicable to Microsoft sharing only.
HTTP/HTTPS
Printing
Application control
Removable media
LAN
*The cut, copy, paste, file access, and download operations are not supported for cloud applications on Windows
endpoint machines when they are used through a Windows Store browser.
For Forcepoint Web Security Endpoint Cloud deployments, download the installation package from the Forcepoint
Cloud Security Gateway Portal. For all other onpremises and hybrid deployments, use the Forcepoint F1E package
builder to create Forcepoint F1E installation packages.
Before beginning the Forcepoint F1E installation process, you must install the Forcepoint server-side product that is
relevant to your environment: Forcepoint DLP, Forcepoint URL Filtering, Forcepoint Web Security (cloud or hybrid),
or Forcepoint Next Generation Firewall (Forcepoint NGFW). For Forcepoint CASB Endpoint, you must have a valid
license for the cloud-based Forcepoint CASB product.
Note
The Forcepoint DLP v8.8.x and later installation no longer contains the package builder used to install
Forcepoint DLP Endpoint. To install the latest Forcepoint DLP Endpoint, you must download the package
builder from one of the following sections on the Forcepoint Downloads page.
■ Endpoint (DLP) in Data Loss Prevention (DLP)
■ Endpoint (Web) in Web Security
■ Endpoint (NGFW) in Next Generation Firewall (NGFW)
Related concepts
Guidelines for creating an anti-tampering password on page 23
Creating installation packages from the package builder (On-premises and Hybrid deployments) on page
24
Related tasks
Preparing for your Forcepoint Endpoint Context Agent installation on page 20
Downloading Forcepoint Web Security Endpoint installation packages (Cloud deployments) on page 22
Steps
1) Authenticate Forcepoint ECA using client certificates
The Forcepoint NGFW Engine uses a client certificate to authenticate endpoint machines running Forcepoint
ECA. In this procedure, you must establish a certificate authority (CA) for Forcepoint ECA, create the client
certificate template, then deploy a unique client certificate to each endpoint machine. See Authenticating
Forcepoint ECA using client certificates for the full procedure.
Related tasks
Authenticating Forcepoint ECA using client certificates on page 20
Configuring Forcepoint Endpoint Context Agent settings in the SMC on page 21
Steps
1) In the Management Client component of the SMC, establish a CA for Forcepoint ECA in one of the following
ways:
a) Import your existing Active Directory Certificate Services (AD CS) CA certificates to the SMC, if they
have already been used to deploy client computer authentication certificates within your organization.
The deployed certificates must have the Client Authentication application policy enabled. If such
certificates have been deployed to each endpoint machine where the Forcepoint ECA software will be
deployed, skip step 2.
b) In the domain where the Forcepoint ECA clients are located, create a CA, then import the CA to the
SMC as a Trusted Certificate Authority element. For more information, see Knowledge Base article
Create a certificate authority for Forcepoint Endpoint Context Agent. Forcepoint ECA uses the customer-
provided CA to authenticate the endpoint machine and uses the SMC’s internal CA to authenticate the
NGFW Engines.
2) After the CA is established, create a new certificate template in AD CS and enroll it to each endpoint
machine where Forcepoint ECA is to be installed. This certificate is required to authenticate the endpoint
machine with the Forcepoint NGFW Engines. When you create the certificate template in AD CS, you must
select the Client Authentication application policy extension.
Note
Note Each endpoint machine must have a unique certificate. Only computer certificates are
supported. User certificates are not supported.
After the CA is established and each endpoint machine has a valid client certificate, continue with the
configuration steps in the next section.
Steps
1) In the Management Client component of the SMC, create a Forcepoint ECA Configuration element that uses
the newly created CA.
2) Enable Forcepoint ECA on the NGFW Engine, and use the newly created Forcepoint ECA Configuration
element.
3) Export the Forcepoint ECA configuration XML file (eca_client_yyyymmdd_hhmmss.xml) from the Engine
Editor. This configuration file is added to the installation package through the package builder (see
Forcepoint Endpoint Context Agent).
The configuration file contains the details of all the NGFW Engines that use the same ECA Configuration
element. If additional NGFW Engines are added to the configuration, the updated configuration file is
automatically sent to the endpoint machines when they connect to the NGFW Engines.
Related tasks
Forcepoint Endpoint Context Agent on page 41
Customers with a full-cloud deployment (Forcepoint Web Security Cloud) download specific Forcepoint Web
Security Endpoint installation packages from the Forcepoint Cloud Security Gateway Portal.
Steps
1) Log on to the Forcepoint Cloud Security Gateway Portal.
3) Click Set Anti-Tampering Password. You must set an anti-tampering password to enable the package
download links. For more information about creating an anti-tampering password, see Guidelines for creating
an anti-tampering password.
4) Select the type of Forcepoint Web Security Endpoint you want to download: Direct Connect or Proxy
Connect. You can deploy a combination of Direct Connect and Proxy Connect Endpoint clients in your
organization. However, only one type can be installed on an individual endpoint machine.
5) Select a Platform. Forcepoint Web Security Endpoint packages are available for Windows 32-bit, Windows
64-bit, and Mac endpoint machines.
Related concepts
Guidelines for creating an anti-tampering password on page 23
Note
The packages created by the Forcepoint F1E package builder are backwards compatible with
Forcepoint Security Manager and Forcepoint Web Security v8.5.3 and later, and Forcepoint DLP
v8.8.x and later.
The Forcepoint ECA installation package is backwards compatible with Forcepoint NGFW versions
6.10 and later.
4) Click Download.
A ZIP file named ForcepointOneEndpointPackage.zip downloads. It contains:
■ The package builder utility: The Windows utility that creates Windows 32-bit, 64-bit and Mac installation
packages.
■ DLP Endpoint Classifier files: Configuration files that must be copied to a client sub-folder on the
Forcepoint DLP Manager.
■ EPA.msi : The Endpoint Classifier file for Windows 32-bit endpoint machines.
■ EPA64.msi : The Endpoint Classifier file for Windows 64-bit endpoint machines.
■ WebsenseEPClassifier.pkg.zip : The Endpoint Classifier file for Mac endpoint machines.
■ Updated endpoint message templates: If you have deployed Forcepoint DLP Endpoint v19.06 or later and
do not see the new messages for the confirmation dialog box (added in v19.06) or message 10010047
(added in v20.09), you might need to replace the default message template. For more information, see
the Updating Confirmation Dialog message files in Forcepoint F1E Knowledge Base article.
If you use a custom message XML file, you need to add your custom XML file to your installation:
■ You can add the custom XML file to the package builder before you create your installation packages.
For more information, see the Replacing the Message XML in the Forcepoint Endpoint All-in-One
Package Builder Knowledge Base article.
■ You can install the custom XML file on the Forcepoint DLP server. For more information, see the
“Install the new XML file” section in the Customizing Forcepoint DLP Endpoint client messages
Knowledge Base article.
Steps
1) Log on to the Forcepoint Downloads page and locate the download listing for the file you want to verify. The
checksums are listed in the Details section.
4) Compare the displayed output to the checksum listed on the Downloads page. They must match.
Warning
Do not use a file that has an invalid checksum. If downloading the file again does not help,
contact Forcepoint Support to resolve the issue.
Important
Due to a compatibility issue with older Windows Endpoint Classifier files, you must use
the Windows Endpoint Classifier files provided in this ZIP file when you build a Windows
Forcepoint DLP Endpoint installation package using this package builder.
If you use older Windows Endpoint Classifier files, the package builder shows an error
message and does not build the installation package.
3) On the Select Forcepoint One Endpoint Components screen, select one or more of the following:
■ Forcepoint Web Security Endpoint (requires Forcepoint Web Security). If you select Forcepoint Web
Security Endpoint here, you must select an option in step 4 below.
■ Forcepoint DLP Endpoint (requires Forcepoint DLP)
■ Forcepoint Endpoint Context Agent (requires Forcepoint NGFW)
4) If you selected Forcepoint Web Security Endpoint, also select one of the following:
■ Direct Connect Endpoint: Choose this option to create a Forcepoint Web Security Direct Connect
Endpoint installation package for a full cloud deployment (requires Forcepoint Web Security Cloud) or a
hybrid cloud/onpremises deployment (requires the Forcepoint Web Security Hybrid Module).
Direct Connect Endpoint and Forcepoint ECA cannot be installed together. If you selected Forcepoint
Endpoint Context Agent above, you cannot select Direct Connect Endpoint here.
■ Proxy Connect Endpoint: Choose this option to create a Forcepoint Web Security Proxy Connect
Endpoint installation package for a full cloud deployment (requires Forcepoint Web Security Cloud) or a
hybrid cloud/onpremises deployment (requires the Forcepoint Web Security Hybrid Module).
■ Remote Filtering Client: Choose this option to provide remote filtering of endpoint machines (requires
Forcepoint URL Filtering).
■ CASB Endpoint (requires Forcepoint CASB license). If you select CASB Endpoint here, the package
builder automatically selects Forcepoint DLP Endpoint. Forcepoint CASB Endpoint is not a part of
Forcepoint Web Security Endpoint, but it is included here so it cannot be selected with a Forcepoint Web
Security Endpoint option. Currently, Forcepoint CASB Endpoint cannot be installed with Forcepoint Web
Security Endpoint.
Note
The Linux option is unavailable for this release.
b) Create the administrator password to be used to uninstall or modify Forcepoint F1E agents. If no
password is specified, users with admin privileges can uninstall the Forcepoint F1E software from the
endpoint machines.
Click Show characters to display the password characters while you type.
For more information about creating an anti-tampering password, see Guidelines for creating an anti-
tampering password.
For security purposes, anyone who tries to modify or uninstall Forcepoint DLP Endpoint or Forcepoint
Web Security Endpoint software is prompted for a password. Standalone Forcepoint ECA installations
are not affected by this password.
When Forcepoint F1E contacts the management server, this password is overwritten with the password
specified by an administrator on the server. Set this password in one of the following locations:
■ Forcepoint DLP Endpoint: In the Data Security module of Forcepoint Security Manager, go to
Settings > General > System > Endpoint, then on the General tab, select Enable endpoint
administrator password, and enter and confirm a password.
■ Forcepoint Web Security Endpoint (Hybrid module): In the Web Security module of Forcepoint
Security Manager, go to Settings > Hybrid Configuration > Hybrid User Identification, then enter
and confirm a password.
■ Forcepoint Web Security Endpoint (Cloud module): In the Forcepoint Cloud Security Gateway Portal,
go to Web > Endpoint > Deployment Settings > Set Anti-Tampering Password, then enter and
confirm a password.
Note that password hashes are stored in an encrypted file. The system does not store passwords in
plain text.
Note
Customers requiring FIPS compliance can set the anti-tampering password during the
Forcepoint DLP Endpoint installation only (Windows and Mac). The anti-tampering
password cannot be set on the Forcepoint DLP server. Customers who do not require FIPS
compliance are not impacted by this change.
c) To enable anti-tampering, click Protect installation directory from modification or deletion. This
prevents users from deleting or modifying the folder where Forcepoint F1E is installed.
Note
Forcepoint recommends that all Forcepoint Web Security Direct Connect Endpoint
installation packages enable anti-tampering on this screen. If anti-tampering is not enabled,
some diagnostics tests do not work correctly in the Diagnostics Tool.
d) To enable the collection of telemetry data, click Collect telemetry data. When you enable this option,
Forcepoint F1E collects data about the Forcepoint One Endpoint installation (such as status) and the
endpoint machine (such as OS, memory, and CPU information), then sends the data back to Forcepoint
for analysis.
Important
Starting in Forcepoint F1E v20.12, the Collect telemetry data option is enabled by default.
a) Specify the folder where the Forcepoint F1E software will be installed on each Windows endpoint
machine. The folder path must contain only English characters.
■ Use default location: The Forcepoint F1E software is installed in the default folder: \Program Files
\Websense\Websense Endpoint (Windows).
■ Use this location: Manually type the installation path for the Forcepoint F1E software. Environment
variables are supported.
If you are creating a Mac only installation package, this screen is not shown. On Mac endpoint
machines, the Forcepoint F1E software is automatically installed in the /Applications folder.
b) If you use custom Firefox preference files within your organization, select Use custom Firefox
preference files.
In the Preference file name field, type the name of the custom preference file (for example,
autoconfig.js ). This file should be located in C:\Program Files\Mozilla Firefox\defaults\pref\ . If
the custom file is not in this folder, Forcepoint F1E cannot use it.
In the Config file name field, type the name of the custom configuration file(for example, mozilla.cfg ).
This file should be located in C:\Program Files\Mozilla Firefox\ . If the custom file is not in this folder,
Forcepoint F1E cannot use it.
Note
If you use custom Firefox preference files and do not add them here, the Forcepoint F1E
installation process overwrites your custom files.
ii) Select this option if you do not want the installer to add the extensions for these browsers.
d) Click Next.
At this point in the installation, the next screen shown depends on the options selected on the Select
Forcepoint One Endpoint Components screen. For example, if you selected Forcepoint DLP
Endpoint, the next screen is the Server Connection screen.
Follow the instructions for the individual endpoint components below, then continue with Global Settings.
Related concepts
Guidelines for creating an anti-tampering password on page 23
Related tasks
Preparing for your Forcepoint Endpoint Context Agent installation on page 20
Forcepoint DLP Endpoint on page 32
Forcepoint Web Security Direct Connect Endpoint on page 35
Forcepoint Web Security Proxy Connect Endpoint on page 37
Remote Filtering Client on page 38
Forcepoint Endpoint Context Agent on page 41
Forcepoint CASB Endpoint on page 42
Global settings on page 44
IP address or hostname: Provide the IP address or hostname of the Forcepoint DLP server that endpoint
machines should use to retrieve initial profile and policy information. When configured, endpoint machines
retrieve policy and profile updates from the endpoint server defined in their profiles.
Note
When configuring the Endpoint Profile in the Forcepoint Security Manager (Data > Settings
> Deployment > Endpoint Profiles ), you can change the primary server and configure
additional servers for load balancing and/or failover. See Adding an endpoint profile, Servers
tab for details.
Receive automatic software updates (Windows endpoint machines only): When a new version of
Forcepoint DLP Endpoint is released, you can upgrade the software on each endpoint machine (manually or
via GPO or SMS), or you can configure automatic updates on this screen.
You cannot use the auto-update feature in the Web Security module of the Forcepoint Security Manager to
automate updates for combined web and DLP endpoints.
This option does not apply to Mac endpoint machines.
To automate software updates for Forcepoint DLP Endpoint:
a) Prepare a server with the latest updates on it (see “Automatic updates for Forcepoint F1E (Forcepoint
DLP Endpoint)” for details).
c) Specify the URL of the server you created. The URL must be HTTP (i.e., http://). It cannot be secure
HTTP (i.e., https://).
d) Indicate how often you want endpoint machines to check for updates.
4) Click Next.
■ If you are only creating a Forcepoint DLP Endpoint package, the Save Installation Package screen is
shown next. Continue with Global settings.
■ If you are creating a package with another agent, continue with the relevant section.
Related tasks
Global settings on page 44
Related reference
DLP Client settings fields on page 34
Because users do not see any notifications, stealth mode is best reserved
for discovery tasks and audit-only policies.
Note that you must reinstall the endpoint machine and deploy a new
profile to switch user interface modes.
Installation Mode Applies to Windows only. Select from the following 2 options:
1) Full: Installs Forcepoint DLP Endpoint with full policy monitoring and
blocking capabilities upon a policy breach. All incidents are reported
in the Forcepoint Security Manager. Full Mode installation requires a
restart of the endpoint machine.
Specify the value for your organization’s WSCONTEXT value. The WSCONTEXT value is displayed in the
GPO script command string on the Settings > Hybrid Configuration > Hybrid User Identification page in
the Web Security module of the Forcepoint Security Manager, or the GPO code string under Deployment
Settings on the Web > Endpoint > General page in the Forcepoint Cloud Security Gateway Portal. See
Forcepoint Web Security Endpoint packages downloaded from the Forcepoint Cloud Security Gateway Portal
(Cloud deployments) for more information.
On the Local Block Pages screen, you can change the description and logo shown at the bottom of the
local block pages. Forcepoint Web Security Direct Connect Endpoint uses local block pages when it is in
Fallback mode and cannot connect to endpoint services. These pages are only shown when in Fallback
mode. If Forcepoint Web Security Direct Connect Endpoint is connected to endpoint services, the default
block page is shown.
a) Click the first Preview button to view the local block page with the changes you made at the top of the
screen.
b) Click the second Preview button to view the Certificate Error notification page with the changes you
made at the top of the screen. The Certificate Error notification page is shown if you attempt to load a
website with an invalid security certificate.
3) Click Next.
■ If you are only creating a Forcepoint Direct Connect Endpoint package, the Save Installation Package
screen is shown next. Continue with Global settings.
■ If you are creating a package with another agent, continue with the relevant section.
Related concepts
Forcepoint Web Security Endpoint packages downloaded from the Forcepoint Cloud Security Gateway Portal
(Cloud deployments) on page 49
Related tasks
Global settings on page 44
Specify the URL for your organization’s PAC file. Replace the default URL with the customized URL for your
deployment.
a) Hybrid deployments
For hybrid deployments, the URL can be found on the Settings > HybridConfiguration > User Access
page in the Web Security module of the Forcepoint Security Manager.
Select the URL appropriate for your environment (either port 8082 or port 80). For example:
Default (port 8082): http://pac.hybridweb. global.blackspider.com:8082/proxy.pac?p=8h6hxmgf
Alternate (port 80): http://pac.hybridweb. global.blackspider.com/proxy.pac?p=8h6hxmgf
In this example, 8h6hxmgf is a unique identifier for an organization. Your identifier is different and
defines your organization.
Note the difference between the sub-domains of the default PAC file URL and the sample customized
URL. The “hybrid-web” sub-domain is used for onpremises Forcepoint Web Security deployments that
use Forcepoint Web Security Endpoint.
In this example, 8h6hxmgf is a unique identifier for an organization. Your identifier is different and
defines your organization.
You can find policy-specific URLs for your cloud deployment on the General tab of a policy in the
Forcepoint Cloud Security Gateway Portal. If you would rather use an account-level PAC file, go to the
Web > General page to find the PAC file URL.
2) Select Allow users to disable endpoints if you want to allow users to disable the Forcepoint Web Security
Proxy Connect Endpoint web protection on their own endpoint machines; for example, if you want them
to edit local proxy settings. Be aware that selecting this option allows users to circumvent the protections
offered by the Forcepoint Web Security Proxy Connect Endpoint software.
3) Click Next.
■ If you are only creating a Forcepoint Proxy Connect Endpoint package, the Save Installation Package
screen is shown next. Continue with Global settings.
■ If you are creating a package with another agent, continue with the relevant section.
Related tasks
Global settings on page 44
2) If you selected Remote Filtering Client on the Select Forcepoint One Endpoint Components screen,
the Internal Connections screen is shown after the Installation Path and Firefox Settings screen:
3) On the Internal Connections screen, enter the internal IP address or hostname and internal Port of each
Remote Filtering Server to which this client will connect. Use the > button to move the information to the
selected list.
Remote Filtering Client sends its heartbeat to these IP addresses and ports to determine whether or not
it is inside the network. If you have multiple Remote Filtering Server instances, Remote Filtering Client
rotates through the list in order until a functioning server is located.
Remote Filtering Server has a 2-minute inactivity timeout period. If the client connects, and then does not
send an Internet request in the timeout period, the server drops the connection. When the next request is
made, Remote Filtering Client goes through its list to connect again. This protects server performance by
reducing the number of unused connections that might otherwise accumulate.
4) When you are finished, click Next to show the External Connections screen.
5) On the External Connections screen, enter the external IP address or hostname and internal Port of
each Remote Filtering Server. Use the > button to move the information to the selected list. Indicate
whether or not to Log user Internet activity seen by Remote Filtering Client instances installed using this
customized installation package.
7) Use the Trusted Sites list to enter up to 4 URLs, IP addresses, or regular expressions for sites that
Remote Filtering Client users can access directly, without being filtered or logged. Click Add to enter a
URL, IP address, or regular expression.
9) Indicate whether or not to Notify users when HTTPS or FTP traffic is blocked, then, if notifications are
enabled, specify how long (in seconds) the message is shown.
Enter and confirm the Pass phrase used for communication with the Remote Filtering Server. This must
match the pass phrase created when the Remote Filtering Server was installed.
Related tasks
Global settings on page 44
Steps
1) If you selected Forcepoint Endpoint Context Agent on the Select Forcepoint One Endpoint
Components screen, the Profile Path screen is shown after the Installation Path and Firefox Settings
screen:
2) Enter the location where you saved the Forcepoint ECA configuration file (XML file). Either manually enter
the folder path to the file or click Browse to find the location.
The package builder can accept a configuration file with any filename, not just the
eca_client_yyyymmdd_hhmmss.xml filename. The configuration file is automatically renamed to eca.conf by
the package builder when it creates the installation package.
For more information about creating the configuration file, see Preparing for your Forcepoint Endpoint
Context Agent installation.
3) Click Next.
■ If you are only creating a Forcepoint ECA package, the Save Installation Package screen is shown next.
Continue with Global settings.
■ If you are creating a package with another agent, continue with the relevant section below.
Related tasks
Global settings on page 44
Preparing for your Forcepoint Endpoint Context Agent installation on page 20
Steps
1) If you selected Forcepoint CASB Endpoint on the Select Forcepoint One Endpoint Components screen,
the Configuration screen is shown after the Installation Path and Firefox Settings screen:
3) Click Next.
■ If you are only creating a Forcepoint CASB Endpoint package, the Save Installation Package screen is
shown next. Continue with Global settings.
■ If you are creating a package with another agent, continue with the relevant section below.
Related tasks
Global settings on page 44
Global settings
Steps
1) When you are done configuring your individual Forcepoint F1E agent selections, the Save Installation
Package screen is shown. Enter a folder path where the installation package is saved to the local machine.
2) Click Finish.
If the package is created successfully, a system message is shown.
If the creation of the package fails, an error message is shown. If this happens, contact Forcepoint Support
for assistance.
3) Click OK.
The packages are created in the designated path configured on the Save Installation Package screen.
Refer to Deploying Forcepoint F1E in your Enterprise for instructions about distributing the package to the
endpoint machines.
Related reference
Deploying Forcepoint F1E in your Enterprise on page 45
This chapter describes how to deploy Forcepoint F1E software on endpoint machines.
It covers the following topics:
Related concepts
Before you begin on page 45
Deploying Windows endpoints on page 47
Deploying Mac endpoints on page 55
Deploying Forcepoint F1E agents and the Neo agent on an endpoint machine on page 64
Configuring and managing Forcepoint F1E agents on page 64
Related information
Uninstalling Forcepoint F1E software on page 66
■ Forcepoint F1E can be installed on an endpoint machine encrypted using full disk encryption. Forcepoint F1E
must be installed after the disk has been encrypted.
■ If you are deploying Forcepoint DLP Endpoint, disable the auto-update feature in the Web Security module of
the Forcepoint Security Manager.
■ For hybrid web deployments, make sure that your user accounts are synchronized with the hybrid service.
To verify, log on to the Web Security module of the Forcepoint Security Manager and select Main > Status >
Hybrid Service. It is okay if you have not yet used the hybrid service.
■ For Forcepoint Endpoint Context Agent (Forcepoint ECA) deployments, ensure that there are no network
address translation (NAT) devices between the Forcepoint Next Generation Firewall (Forcepoint NGFW)
Engine and the endpoint machine.
Related concepts
System requirements on page 13
4) Click OK to cache your changes. Changes are not implemented until you click Save All.
Note
At the completion of any update, you must restart the Forcepoint F1E software for the updates
to take effect.
Steps
1) Create the installation package through the package builder.
2) Open the command line and run the following command to unpack the installation package:
where <full_pathname_to_package> is the full path and filename of the installation package executable file.
For example, if the FORCEPOINT-ONE-ENDPOINT-x64.exe file is located in C:\Test, the full command
would be:
3) The unpacked installation package is now visible in the folder created in step 2 (in this example: C:\Test
\FORCEPOINT-ONE-ENDPOINT-x64).
Copy your DCUserConfig.xml file into this folder.
4) Running the following command from the command line to repack the installation package:
5) Deploy the updated installation package using one of the methods in Deploying Windows endpoints.
Related concepts
Deploying Windows endpoints on page 47
There are a few ways to distribute the Forcepoint F1E software on Windows endpoint machines:
■ Deploy Forcepoint F1E manually on each endpoint machine.
See Manually deploying Forcepoint F1E agents on a Windows endpoint machine.
■ Deploy Forcepoint DLP Endpoint to a shared server that hosts Citrix XenApp, Citrix XenDesktop, or Citrix
Virtual Apps desktop virtualization software, or deploy Forcepoint ECA to a shared server that hosts Citrix
XenDesktop software. This deployment method is similar to the manual deployment, but you deploy the
installation package to a network server instead of each endpoint machine.
Supported Citrix versions are listed in the Certified Product Matrix.
For more information about specific installation and configuration instructions for Forcepoint DLP Endpoint,
see Deploying Forcepoint DLP Endpoint on Citrix XenApp, XenDesktop, and Virtual Apps clients.
For more information about deploying software to a Citrix virtual environment, see the Citrix documentation.
■ Deploy Forcepoint ECA to a limited set of endpoint machines using the ECA Evaluation deployment option.
Forcepoint NGFW 7.0 or later is required to use the ECA Evaluation feature.
For more information, see Knowledge Base article 16193.
■ Deploy Forcepoint F1E using a third-party deployment tool for Windows. Forcepoint F1E can be remotely
deployed using your preferred deployment server or distribution system, as long as it accepts an Executable
(.exe) or ZIP (.zip) file as the input and can run the installation command remotely.
Important
If you deploy Forcepoint F1E using GPO, do not restrict access to the command prompt. The
Disable the command prompt script processing also? option should be set to No.
Related information
Manually deploying Forcepoint F1E agents on a Windows endpoint machine on page 48
2) Double-click the executable file and step through the installation wizard.
In virtual desktop (VDI) environments, install the Forcepoint DLP Endpoint software as if the endpoint machine
were a physical machine, while taking into consideration any additional steps required by the infrastructure for
third-party installations.
2) Double-click the executable file and step through the installation wizard.
Important
You cannot downgrade this combined installation to a previous Forcepoint F1E release, because
the Forcepoint CASB Endpoint was not included in previous Forcepoint F1E installations. To
downgrade, you must manually uninstall Forcepoint F1E, then install the previous version of
Forcepoint DLP Endpoint.
2) From the command prompt, run the following command (with the straight quotes around the msi file name)
as an administrator:
"Websense Endpoint.msi" WSCONTEXT=<token>
where <token> is the WSCONTEXT string shown in the GPO code string on the Settings > Hybrid
Configuration > Hybrid User Identification page in the Web Security module of the Forcepoint Security
Manager or the Web > Endpoint page in the Forcepoint Cloud Security Gateway Portal. For example:
The WSCONTEXT string used to identify your organization to the hybrid or cloud service must be included
in the command string. Each account has its own WSCONTEXT string. Roaming and remote users use this
string to connect to your specific account.
2) Open the command line and run the following command from the folder containing the installation package:
FORCEPOINT-ONE-ENDPOINT-x64.exe /v"XPSWDPXY=<password> WSCONTEXT=<token>" where:
■ <password> is the anti-tampering password used by the Forcepoint Endpoint software already installed
on the endpoint machine (if upgrading) or to be used by the new Forcepoint F1E software.If the password
contains a special character, you must type a ^ character before the special character. For more
information, see Guidelines for creating an anti-tampering password.
■ <token> is the WSCONTEXT string shown in the GPO code string on the Settings > Hybrid
Configuration > Hybrid User Identification page in the Web Security module of the Forcepoint Security
Manager or the Web > Endpoint page in the Forcepoint Cloud Security Gateway Portal.
The WSCONTEXT string used to identify your organization to the hybrid or cloud service must be
included in the command string. Each account has its own WSCONTEXT string. Roaming and remote
users use this string to connect to your specific account.
All arguments passed via the /v parameter must be enclosed in straight quotes, as shown in the example.
To perform a silent install that does not prompt the end user to restart the endpoint machine, add the /
norestart parameter as follows:
FORCEPOINT-ONE-ENDPOINT-x64.exe /v"/qn /norestart XPSWDPXY=<password> WSCONTEXT=<token>"
Note
You must restart the endpoint machine to finish a Forcepoint DLP Endpoint installation. If
you perform a silent install without a restart (using the /norestart parameter), Forcepoint DLP
Endpoint may not function as needed until after the endpoint machine is restarted.
Function Switch
Related concepts
Guidelines for creating an anti-tampering password on page 23
2) Double-click the executable file and step through the installation wizard.
Note
Forcepoint Web Security Direct Connect Endpoint end users must join your organization’s
domain on the endpoint machine. If the end user has not joined and connected to your domain,
the disposition server test fails. For more information, see Testing your deployment.
Related concepts
Testing your deployment on page 53
b) Double-click the executable file and step through the installation wizard
Note
To use the ECA Evaluation feature, you must have Forcepoint NGFW v7.0 or later deployed in your
organization.
Related tasks
Authenticating Forcepoint ECA using client certificates on page 20
Configuring Forcepoint Endpoint Context Agent settings in the SMC on page 21
■
Verify the status from the icon ( ) shown on the task bar’s notification area. If the icon has a check mark
in the lower right corner, Forcepoint CASB Endpoint is connected. Also, if you move your mouse over the
icon, a tooltip is shown with the connection status.
■ Verify the status in the Diagnostics Tool. Right-click the Forcepoint icon on the task bar and select Open
Forcepoint One Endpoint Diagnostics. The status is shown under the System information diagnostics
test.
Most failed Forcepoint F1E software installation issues are permission related. An endpoint installation requires
local administrator rights.
in the Information Message field in the SMC, make sure that the Forcepoint ECA clients use different
certificates. Forcepoint NGFW does not allow two or more connections to share a client certificate. Each
Forcepoint ECA client must have a unique client certificate.
Note
If you are downgrading from Forcepoint F1E v23.11 to an older version, you must uninstall
Forcepoint F1E v23.11 from your system and then install the version which you want to install.
Related tasks
Manually deploying Forcepoint F1E agents on a Mac endpoint machine on page 55
2) MacOS automatically creates a directory named “EndpointInstaller,” which contains a file called
WebsenseEndpoint.pkg.
3) If you are deploying a DLP Endpoint package, add the private key file (key.pem) and the certificate file
(server.pem) to the EndpointInstaller folder. For more information, refer to the Endpoint SSL Identity
document in order to do this.
6) Click Install.
7) Enter a user name and password for a user with administrator rights to install the software.
The System Extension Blocked option pops up.
c) Select Allow.
A confirmation message is shown when the Forcepoint One Endpoint software is successfully installed.
8) If you are installing Forcepoint DLP Endpoint v21.12 or later on macOS 11 (Big Sur) onwards, you are
prompted to enable full disk access (FDA) for 4 new processes:
a) When the installer opens the prompt, click Open Full Disk Access to open the macOS System
Preferences window.
Note
If you are deploying Forcepoint DLP Endpoint using Jamf, you can enable FDA for these
processes using a configuration file. See the Deploying F1E DLP Endpoints on macOS
Environments via Jamf Profile Knowledge Base article.
Note
If you are installing DLP F1E v23.11 or later with Classifier v8.8.1 or later on Windows, a
dialog box may display in the event that certain DLLs require an update. The dialog box
asks you to close applications before continuing the installation. If this dialog box displays,
leave the default option selected (“Automatically close applications...”) and click OK.
Related concepts
Creating the HWSConfig.xml file (Proxy Connect Endpoint only) on page 62
Steps
1) Log on to the Forcepoint Security Manager and open the DATA module.
4) Enter the URL for the specific domain you want to monitor, then click Add. You can add multiple domains. If
you want to monitor all domains, enter *, then click Add.
<ProxySetting>
<Context InitContext="<token>"/>
<PACFile URL="<pacfile>"/>
</ProxySetting>
where
■ <token> is the WSCONTEXT string shown in the GPO code string on the Settings > Hybrid Configuration >
Hybrid User Identification page in the Web Security module of the Forcepoint Security Manager or the Web
> Endpoint page in the Forcepoint Cloud Security Gateway Portal.The WSCONTEXT string used to identify
your organization to the hybrid or cloud service must be included in the command string. Each account has its
own WSCONTEXT string. Roaming and remote users use this string to connect to your specific account.
■ <pacfile> is the URL for your PAC File. For hybrid deployments, the URL can be found on the Settings >
Hybrid Configuration > User Access page in the Web Security module of the Forcepoint Security Manager.
For full cloud deployments, you can find policy-specific URLs for your cloud deployment on the General tab of
a policy in the Forcepoint Cloud Security Gateway Portal. If you would rather use an account-level PAC file, go
to the Web > General page to find the PAC file URL.
Save the HWSConfig.xml file in the same directory as the WebsenseEndpoint.pkg installation package file.
Note
If you already have a HWSConfig.xml file, or one was provided for you, make sure your correct XML
file is in the same directory as the WebsenseEndpoint.pkg installation package file.
Note
If you are using the Firefox browser and the Forcepoint F1E Firefox extension is not installed,
complete one of the following actions:
■ Stop and start the service from the command line:
wepsvc --stop && wepsvc --start
■ Restart the endpoint machine.
Relaunch Firefox. The Firefox extension is now installed and visible in the list of extensions.
Steps
1) On FSM 10 or later, setup your profile to be in browser extensions mode.
2) Install v21.07 or later with 8.9.0 classifier + browser extensions manually or via MDM.
3) Upgrade to latest F1E version with latest classifier using MDM for silent install.
Steps
1) Adding an endpoint profile to the Data Security module of the Forcepoint Security Manager or using the
default. A default profile is automatically installed with the client package. (Settings > Deployment >
Endpoint)
3) Configuring endpoint settings. (Settings > General > System > Endpoint)
4) Creating endpoint resources. (Main > Policy Management > Resources > Endpoint Devices/Endpoint
Applications/Application Groups)
5) Creating or modifying a rule for endpoint channels. (Main > Policy Management > DLP / Discovery
Policies, Destination tab)
6) Defining the type of endpoint machines to analyze, as well as the network location. (Main > Policy
Management > DLP / Discovery Policies, Custom Policy wizard, Source tab).
Use the Network Location field to define the behavior of the endpoint machine on and off the network.
Next steps
See the Forcepoint DLP Manager Help for specific instructions.
Steps
1) Go to DATA > Settings > Deployment > Endpoint Profiles.
3) In the Properties tab, select the check box Show incident details in the confirm dialog and the Log
Viewer.
Next steps
The Confirmation Dialog timeout defaults to 30 seconds, but it is configurable to between 9 and 58 seconds in
Forcepoint DLP. To configure this expiration time, contact Forcepoint Support.
Note
If you configured an administrative password, you must supply it to uninstall the software.
2) Click Yes.
3) You may be prompted to provide an administrative password, if you defined one. If so, enter the password in
the field provided and click OK.
If you are uninstalling Forcepoint DLP Endpoint, restart the endpoint machine. The configuration changes are
applied only when the endpoint machine has restarted.
where:
■ {product_code} is a unique identifier (GUID) that can be found in the setup.ini file of each installation
package or the system registry. It is different for each version and bit type (32-bit versus 64-bit).
■ <password> is the administrator password that you entered when creating the installation package. If the
password contains a special character, you must type a ^ character before the special character. For more
information, see Guidelines for creating an anti-tampering password.
To find the setup.ini file, use a file compression tool like WinZip or 7-Zip to extract the contents of the installation
package executable.
To silently uninstall Forcepoint One Endpoint without a restart, include the /norestart parameter as follows:
msiexec /x {ProductCode} /qn /XPSWDPXY=<password> /norestart
Function Swtich
Related concepts
Guidelines for creating an anti-tampering password on page 23
2) In the Other section, click the icon for the Forcepoint F1E agent.
5) Click OK.
6) If you created an anti-tampering password to block attempts to uninstall or modify Forcepoint F1E software,
enter that password.
Important
Depending on the Forcepoint F1E agent installed, you may need to enter the anti-tampering
password before entering the local administrator password.
Carefully read each prompt before entering the password to make sure you are entering the
correct password.
If the password contains a special character, enclose the password in single quotation marks.