Monitoring - Forcepoint is working on an upgrade program for the SIEM Integration feature in Forcepoint Web Security Cloud and Email Security Cloud. These upgrades are as a result of customer feedback to the BETA program and will improve the accessibility of this feature to better serve our customers.
Aug 23, 21:35 UTC

About This Site

Welcome to the new Forcepoint Cloud Service status page. The status of Forcepoint Cloud Services delivered from global data centers are continually monitored, any interruptions and planned maintenance will be displayed here.

Web Security Operational
Ashburn (H) Operational
Chicago (N) Operational
Dallas (O) Operational
Düsseldorf (E) Operational
Slough (J) Operational
Frankfurt (B) Operational
Geneva (F) Operational
Heathrow (A) Operational
Hong Kong (K) Operational
Istanbul (I) Operational
Johannesburg (S) Operational
Miami (Q) Operational
Mumbai (C) Operational
Paris (D) Operational
San Jose (G) Operational
São Paulo (P) Operational
Singapore (R) Operational
Sydney (M) Operational
Amsterdam (X) Operational
Tokyo (T) Operational
Stockholm (U) Operational
Toronto (YYZA) Operational
Docklands (LONB) Operational
New York (NYCA) Operational
Los Angeles (LAXA) Operational
Warsaw (WAWA) Operational
Milan (MILA) Operational
Dubai (DXBA) Operational
Email Security Operational
Ashburn (H) Operational
Düsseldorf (E) Operational
Slough (J) Operational
Frankfurt (B) Operational
Geneva (F) Operational
Heathrow (A) Operational
Hong Kong (K) Operational
Johannesburg (S) Operational
Mumbai (C) Operational
Paris (D) Operational
San Jose (G) Operational
Sydney (M) Operational
Security Portal Operational
Global Operational
Reporting Operational
Ashburn (H) Operational
Chicago (N) Operational
Düsseldorf (E) Operational
Slough (J) Operational
Frankfurt (B) Operational
Geneva (F) Operational
Heathrow (A) Operational
Hong Kong (K) Operational
Johannesburg (S) Operational
Mumbai (C) Operational
Paris (D) Operational
San Jose (G) Operational
Sydney (M) Operational
Toronto (YYZA) Operational
Dallas (O) Operational
Singapore (R) Operational
Hybrid Management Operational
Ashburn (H) Operational
Chicago (N) Operational
Düsseldorf (E) Operational
Slough (J) Operational
Heathrow (A) Operational
Hong Kong (K) Operational
Johannesburg (S) Operational
Paris (D) Operational
San Jose (G) Operational
Sydney (M) Operational
VPN Operational
Ashburn (H) Operational
Chicago (N) Operational
Düsseldorf (E) Operational
Slough (J) Operational
Geneva (F) Operational
Heathrow (A) Operational
Hong Kong (K) Operational
Johannesburg (S) Operational
Mumbai (C) Operational
San Jose (G) Operational
São Paulo (P) Operational
Sydney (M) Operational
Amsterdam (X) Operational
Stockholm (U) Operational
Toronto (YYZA) Operational
Docklands (LONB) Operational
New York (NYCA) Operational
Los Angeles (LAXA) Operational
Warsaw (WAWA) Operational
Milan (MILA) Operational
Dallas (O) Operational
Frankfurt (B) Operational
Istanbul (I) Operational
Miami (Q) Operational
Paris (D) Operational
Singapore (R) Operational
Tokyo (T) Operational
Dubai (DXBA) Operational
Mobile VPN Operational
Ashburn (H) Operational
Düsseldorf (E) Operational
Slough (J) Operational
Heathrow (A) Operational
San Jose (G) Operational
Singapore (R) Operational
Sydney (M) Operational
Advanced Malware Detection Operational
Heathrow (A) Operational
Amsterdam (X) Operational
Miami (Q) Operational
Hosted CPA Operational
Slough (J) Operational
Hong Kong (K) Operational
San Jose (G) Operational
Threatseeker Cloud Operational
Ashburn (H) Operational
Heathrow (A) Operational
Hong Kong (K) Operational
San Jose (G) Operational
Sydney (M) Operational
Reputation Service Operational
Ashburn (H) Operational
Slough (J) Operational
Sydney (M) Operational
File Sandboxing (Legacy) Operational
Sydney (M) Operational
GRE Operational
Heathrow (A) Operational
Hong Kong (K) Operational
Frankfurt (B) Operational
Paris (D) Operational
Dusseldorf (E) Operational
Geneva (F) Operational
San Jose (G) Operational
Ashburn (H) Operational
Istanbul (I) Operational
Slough (J) Operational
Los Angeles (LAXA) Operational
Miami (Q) Operational
Singapore (R) Operational
Sydney (M) Operational
Amsterdam (X) Operational
Tokyo (T) Operational
Stockholm (U) Operational
Toronto (YYZA) Operational
Docklands (LONB) Operational
New York (NYCA) Operational
Warsaw (WAWA) Operational
Milan (MILA) Operational
Chicago (N) Operational
Dallas (O) Operational
Johannesburg (S) Operational
SIEM Integration (BETA) Under Maintenance
Operational
Degraded Performance
Partial Outage
Major Outage
Maintenance
Scheduled Maintenance
As part of Forcepoint's commitment to providing customers with highly available and reliable cloud services, we will be performing maintenance on our Email Reporting infrastructure in San Jose (G). During this time Email Security Cloud customers using San Jose (G) may notice incomplete Message Centre searches in the Forcepoint Security Portal and may be unable to release quarantined email as a result. All data will be made available once the maintenance is complete and no data will be lost.
Posted on Jun 13, 09:35 UTC
Update - We will be undergoing scheduled maintenance during this time.
Jun 7, 19:31 UTC
Scheduled - As part of our commitment to providing customers with highly available and reliable cloud services, Forcepoint will be performing infrastructure maintenance at the Chicago (N) data center.

See below for the services that may be affected.

Web Security Cloud & Hybrid
If you connect to the cloud service via PAC file, Forcepoint Web Security Endpoint, or IPsec tunneling via vpn.forcepoint.net, traffic will automatically be redirected to an alternative data center during the maintenance window. It is not anticipated that Web Security Cloud customers using these connectivity methods will experience any downtime.

If you connect directly to the Chicago (N) data center via another method, such as firewall redirection or proxy chaining, you must take steps to redirect traffic to an alternative data center during the maintenance window. Contact Forcepoint Technical Support for additional guidance.

IPsec and GRE
If you connect to the Chicago (N) data center via IPsec or GRE tunnelling, traffic will fail over to your secondary tunnel during the maintenance window.

Customers who connect directly to the Chicago (N) data center must ensure they have configured a failover connection to redirect traffic to a secondary data center.

Note: for IPsec customers who have configured their devices to connect to the Forcepoint hostname (vpn.forcepoint.net), failover will happen automatically, and no additional action is required.

We recommend that customers check their tunnel configurations before the start of the maintenance window to ensure all tunnels are working correctly. Forcepoint Technical Support will be proactively contacting customers with tunnels that connect to this data center ahead of the planned maintenance.

Reporting
Customers who have the Chicago (N) reporting data storage location configured in their account will be able to run reports as usual throughout the maintenance window. However, there may be occasions where reports take longer to complete than normal. To check your configured data storage locations, go to the Account > Licenses page in the Forcepoint Security Portal.
Jun 7, 19:30 UTC
Update - We will be undergoing scheduled maintenance during this time.
Jun 9, 14:23 UTC
Scheduled - As part of our commitment to providing customers with highly available and reliable cloud services, Forcepoint will be performing infrastructure maintenance at the Chicago (N) data center.

See below for the services that may be affected.

Web Security Cloud & Hybrid
If you connect to the cloud service via PAC file, Forcepoint Web Security Endpoint, or IPsec tunneling via vpn.forcepoint.net, traffic will automatically be redirected to an alternative data center during the maintenance window. It is not anticipated that Web Security Cloud customers using these connectivity methods will experience any downtime.

If you connect directly to the Chicago (N) data center via another method, such as firewall redirection or proxy chaining, you must take steps to redirect traffic to an alternative data center during the maintenance window. Contact Forcepoint Technical Support for additional guidance.

IPsec and GRE
If you connect to the Chicago (N) data center via IPsec or GRE tunnelling, traffic will fail over to your secondary tunnel during the maintenance window.

Customers who connect directly to the Chicago (N) data center must ensure they have configured a failover connection to redirect traffic to a secondary data center.

Note: for IPsec customers who have configured their devices to connect to the Forcepoint hostname (vpn.forcepoint.net), failover will happen automatically, and no additional action is required.

We recommend that customers check their tunnel configurations before the start of the maintenance window to ensure all tunnels are working correctly. Forcepoint Technical Support will be proactively contacting customers with tunnels that connect to this data center ahead of the planned maintenance.

Reporting
Customers who have the Chicago (N) reporting data storage location configured in their account will be able to run reports as usual throughout the maintenance window. However, there may be occasions where reports take longer to complete than normal. To check your configured data storage locations, go to the Account > Licenses page in the Forcepoint Security Portal.
Jun 7, 19:36 UTC
Past Incidents
Jun 20, 2019

No incidents reported today.

Jun 19, 2019
Completed - The scheduled maintenance has been completed.
Jun 19, 19:30 UTC
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Jun 19, 17:30 UTC
Scheduled - As part of Forcepoint's commitment to providing customers with highly available and reliable cloud services, we will be performing maintenance on our Email Reporting infrastructure in Düsseldorf (E). During this time Email Security Cloud customers using Düsseldorf (E) may notice incomplete Message Centre searches in the Forcepoint Security Portal and may be unable to release quarantined email as a result. All data will be made available once the maintenance is complete and no data will be lost.
Jun 5, 11:28 UTC
Resolved - The incident has been resolved, services are performing normally. We apologize for any inconvenience caused.
Jun 19, 13:07 UTC
Investigating - Cloud Portal end-users may be unable to view Messenger Center Data from the Paris pool.

Cloud Operations is investigating and will update this post with more information.
Jun 19, 10:50 UTC
Jun 18, 2019

No incidents reported.

Jun 17, 2019

No incidents reported.

Jun 16, 2019

No incidents reported.

Jun 15, 2019

No incidents reported.

Jun 14, 2019

No incidents reported.

Jun 13, 2019
Completed - The scheduled maintenance has been completed.
Jun 13, 12:00 UTC
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Jun 13, 10:00 UTC
Scheduled - As part of Forcepoint's commitment to providing customers with highly available and reliable cloud services, we will be performing maintenance on our Email Reporting infrastructure in San Jose (G). The maintenance will be performed between 10:00 and 12:00 UTC on Thursday 13th June 2019. During this time Email Security Cloud customers using San Jose (G) may notice incomplete Message Centre searches in the Forcepoint Security Portal and may be unable to release quarantined email as a result. All data will be made available once the maintenance is complete and no data will be lost.
Jun 5, 10:43 UTC
Jun 12, 2019

No incidents reported.

Jun 11, 2019

No incidents reported.

Jun 10, 2019
Completed - The scheduled maintenance has been completed.
Jun 10, 04:15 UTC
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Jun 9, 14:15 UTC
Scheduled - Scheduled
As part of Forcepoint's commitment to providing customers with highly available and reliable cloud services, we will be performing infrastructure maintenance at the Dallas (O) data center.

See below for the services that may be affected:

Web Security Cloud & Hybrid
If you connect to the cloud service via PAC file, Forcepoint Web Security Endpoint, or IPsec tunneling via vpn.forcepoint.net, traffic will automatically be redirected to an alternative data center during the maintenance window. It is not anticipated that Web Security Cloud customers using these connectivity methods will experience any downtime.

If you connect via another method, such as firewall redirection, or proxy chaining, directly to the Dallas (O) data center, you must take steps to redirect traffic to an alternative data center during the maintenance window. Contact Technical Support for additional guidance.

IPsec and GRE
If you connect via IPsec or GRE tunneling to the Dallas (O) data center, traffic will fail over to your secondary tunnel during the maintenance window.

Customers who connect directly to the Dallas (O) data center must ensure they have configured a failover connection to redirect traffic to a secondary data center.

Note: for IPsec customers who have configured their devices to connect to the Forcepoint hostname (vpn.forcepoint.net), failover will happen automatically, and no additional action is required.

We recommend customers check their tunnel configuration before the start of the maintenance window to ensure all tunnels are working correctly. Forcepoint Technical Support will be proactively contacting customers with tunnels that connect to this data center ahead of the planned maintenance.

Local PoP – Mexico City
Web Security Cloud traffic for the MEXA (Mexico City) local point of presence is processed at the Dallas (O) data center. During the maintenance window, content localization for customers located in Mexico may be affected.

Reporting
Customers who have the Dallas (O) reporting data storage location configured in their account will be able to run reports as usual throughout the maintenance window. However, there may be occasions where reports take longer to complete than normal. To check your configured data storage locations, go to the Account > Licenses page in the Forcepoint Security Portal.
Jun 9, 14:11 UTC
Jun 9, 2019
Completed - The scheduled maintenance has been completed.
Jun 9, 04:30 UTC
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Jun 8, 01:00 UTC
Scheduled - As part of Forcepoint's commitment to providing customers with highly available and reliable cloud services, we will be performing infrastructure maintenance at the Dallas (O) data center.

See below for the services that may be affected:

Web Security Cloud & Hybrid
If you connect to the cloud service via PAC file, Forcepoint Web Security Endpoint, or IPsec tunneling via vpn.forcepoint.net, traffic will automatically be redirected to an alternative data center during the maintenance window. It is not anticipated that Web Security Cloud customers using these connectivity methods will experience any downtime.

If you connect via another method, such as firewall redirection, or proxy chaining, directly to the Dallas (O) data center, you must take steps to redirect traffic to an alternative data center during the maintenance window. Contact Technical Support for additional guidance.

IPsec and GRE
If you connect via IPsec or GRE tunneling to the Dallas (O) data center, traffic will fail over to your secondary tunnel during the maintenance window.

Customers who connect directly to the Dallas (O) data center must ensure they have configured a failover connection to redirect traffic to a secondary data center.

Note: for IPsec customers who have configured their devices to connect to the Forcepoint hostname (vpn.forcepoint.net), failover will happen automatically, and no additional action is required.

We recommend customers check their tunnel configuration before the start of the maintenance window to ensure all tunnels are working correctly. Forcepoint Technical Support will be proactively contacting customers with tunnels that connect to this data center ahead of the planned maintenance.

Local PoP – Mexico City
Web Security Cloud traffic for the MEXA (Mexico City) local point of presence is processed at the Dallas (O) data center. During the maintenance window, content localization for customers located in Mexico may be affected.

Reporting
Customers who have the Dallas (O) reporting data storage location configured in their account will be able to run reports as usual throughout the maintenance window. However, there may be occasions where reports take longer to complete than normal. To check your configured data storage locations, go to the Account > Licenses page in the Forcepoint Security Portal.
Apr 30, 19:00 UTC
Jun 7, 2019

No incidents reported.

Jun 6, 2019

No incidents reported.