AirWatch integration with Forcepoint lets you use your existing content filtering categories in Forcepoint and apply them to devices you manage within the AirWatch Console.

Allow or block access to Web sites according to the rules you configure in Forcepoint and then deploy a VPN payload to force devices to comply with those rules. Directory users enrolled in AirWatch are validated against Forcepoint to determine which content filtering rules to apply based on the specific end user.

You can enforce content filtering with Forcepoint in one of two ways. Choose to use the VPN profile as described in this topic. This method applies to all Web traffic using browsers other than the AirWatch browser. Or, choose to configure the Settings and Policies page, which applies to all Web traffic using browsers other than the VMware Browser. For instructions on configuring Settings and Policies,refer to the VMware Browser Guide, available on AirWatch Resources.

  1. Navigate to Devices > Profiles & Resources > Profiles > Add. Select Apple iOS .
  2. Configure the profile's General settings.

    These settings determine how the profile deploys and who receives it. For more information on General settings, see Add General Profile Settings.

  3. Select the VPN payload.
  4. Select Websense (Forcepoint) as the Connection Type.
  5. Configure Connection Info including:

    Settings Description
    Connection Name Enter the name of the connection name to be displayed.
    Username Enter the user name to connect to the proxy server.
    Password Enter the password for connection.
  6. You can also optionally Test Connection.
  7. Complete Vendor Configurations including:

    Setting Description
    Vendor Keys

    Select to create custom keys to add to the vendor config dictionary.

    Key Enter the specific key provided by the vendor.
    Value Enter the VPN value for each key.
  8. Select Save & Publish. Directory-based end users can now access permitted sites based on your Forcepoint categories.