Adding or Modifying Components > Adding Email Security components
|
Only two Email Security Gateway components may be added on a machine: TRITON - Email Security and Email Security Log Server. All other Email Security Gateway components run on a Websense appliance and are managed through the Appliance Manager.
If you chose to keep installation files (see Keeping installer files) navigate to Start > All Programs > Websense > Websense TRITON Setup. This starts the installer without having to re-extract files.
2.
3.
4.
If TRITON Infrastructure is currently installed on this machine, Email Security components automatically use the database engine and database login credentials entered when TRITON Infrastructure was installed. The Email Security Installer reads this information from configuration files created by TRITON Infrastructure Setup.
5. If TRITON Infrastructure is not found already installed on this machine, the Log Database screen appears. Specify the location of a database engine and how you want to connect to it.
Log Database IP: Enter the IP address of the database engine machine. If you want to use a named database instance, enter it the form <IP address>\<instance name>. Note that the instance must already exist. See your SQL Server documentation for instructions on creating instances.
If you chose to install SQL Server Express as part of the installation of the TRITON Unified Security Center, the log database IP address should be that of the TRITON Unified Security Center machine.
Database login type: Select how Email Security Log Server should connect to the database engine.
Trusted connection:connect using a Windows trusted connection.
Database account:connect using a SQL Server account.
If using a trusted connection, enter the domain\username of the account to be used. This account must be a trusted local administrator on the database engine machine.
If using a database account, enter the name of a SQL Server account. This account must have certain roles assigned; see Installing with SQL Server.When you click Next, connection to the database engine is verified. If the connection test is successful, the next installer screen appears.
6. On the Email Security Database File Location screen, specify where Email Security database files should be located and then click Next.It is a best practice to use the default location. If you want to create the Log Database in a different location (or if you already have a Log Database in a different location), enter the path to the database files.The path entered here is understood to refer to the machine on which the database engine is located. The path entered must specify a directory that already exists.
7.
8. The Installing Websense Email Security screen appears, as components are being installed.
9.
Adding or Modifying Components > Adding Email Security components
|