/
Forcepoint Data Loss Prevention

Forcepoint Data Loss Prevention

Data Loss Prevention Overview

As part of the University of Utah Cybersecurity Program, we are rolling out the Forcepoint Data Loss Prevention (DLP) client across all Mac and Windows devices. DLP tools and processes are used to ensure that sensitive data is not lost. misused, or accessed by unauthorized users. Data loss prevention systems help organizations comply with privacy laws and protect sensitive information.

Benefits

The benefits of Forcepoint are that it helps reduce the risk of data breaches. protects against ransomware attacks. prevents data theft, and protects against unauthorized sharing of documents. In case of a security breach, Forcepoint helps users understand the severity of the potential data loss.

What Does the Forcepoint DLP Client Do?

  • Monitors Data Transfers: The client monitors various channels like email, web browsers, USB devices, and cloud services for any potential unauthorized sharing of sensitive data.

  • Prevents Unauthorized Actions: If the client detects an attempt to move or copy sensitive information to unauthorized locations (like personal USB drives or external email services), it will automatically block the action or request approval from IT.

  • Alerts & Notifications: If an action is blocked, the client will provide a clear notification to the user, explaining why the action was prevented and what steps to take next.

What to Expect After Installation

For both Mac and Windows users, the Forcepoint DLP client will be automatically installed as part of the security rollout. Here's what you can expect:

1. Minimal Impact on Performance

  • The client runs silently in the background, using minimal system resources. You should not experience any noticeable performance changes while using your device.

2. Notifications

  • After installation, you may occasionally see pop-up notifications if the DLP client detects any actions involving sensitive data. These notifications will explain the blocked action and provide guidance on how to proceed.

  • Example: “This action is blocked because it involves sharing sensitive information.”

3. Regular Monitoring

  • You won’t need to manually interact with the DLP client. It will automatically monitor your data activity based on security policies set by ISO. In most cases, you won’t notice the client is running unless an action is flagged.

  • You can tell the client is running by the icon (image-20241007-225925.png) in your system tray on Windows or top menu bar on Mac.

4. Mac Install Notifications

  • After the client installs, you’ll see the following pop-up:

  • If you’re a Safari user, you will also be prompted to allow the client additional permissions due to macOS security settings. Follow the instructions below to grant these permissions after opening Safari:

    • The following pop-up will appear (it may take a few seconds of using the browser). Select ‘Open Safari Preferences’:

    • You’ll be taken to this page:

    • Enable the checkbox to the left of ‘SafariExtension’, and then select the ‘Always Allow on Every Website’ button:

    • Confirm the selection:

5. Windows Install Notifications

  • You will be prompted to close any open applications. Save your work and then select ‘Quit All’. You can delay if needed.

  • During the install, you’ll see the following screen. After the install, your computer will restart automatically.

What Should I Do If I Receive a Notification?

If the Forcepoint DLP client blocks an action, carefully read the notification message to understand the reason. If you believe the action is legitimate and should not be blocked, please contact us for assistance, and we will review and adjust the security policy if necessary. You can reach us via phone (801-587-2297), email (it@us.utah.edu), or using the support portal on the web or through Teams.

Related content

Learning Analytics
Learning Analytics
Read with this
University of Utah Cybersecurity Program
University of Utah Cybersecurity Program
More like this
University of Utah Cybersecurity Program Disk Encryption
University of Utah Cybersecurity Program Disk Encryption
More like this
Cybersecurity Policies and Reference
Cybersecurity Policies and Reference
More like this
Zoom - Best Practices
Zoom - Best Practices
More like this