Creating user-specific Access rules
You can use User and User Group elements as the source or destination of a rule to create user-specific rules.
You can optionally use
                                                                                    the Forcepoint User ID Service, the McAfee Logon Collector, or
                                                                                    the Integrated User ID Service with Forcepoint NGFW to associate IP addresses
                                                                                    with users in an Active Directory database. This makes it possible to use User and User Group elements as the source
                                                                                    or destination of a rule to create user-specific rules without requiring user authentication. The Integrated User ID
                                                                                    Service is primarily meant for demonstration purposes and proof-of-concept testing of user identification
                                                                                                    services.
Note:  For Forcepoint NGFW version 6.4 or higher, we recommend that you use the Forcepoint User ID Service. 
User-specific rules do not replace user authentication; they are a tool to simplify the configuration of access control, and improve the end-user experience by allowing transparent access to services. They are intended to be used for trusted users in a trusted environment where strong authentication is not required. User-specific rules can be used together with user authentication rules to allow some user groups to access a service, while otherwise requiring authentication for the same service.