If network and security requirements dictate that you need to add new agents or other modules to your deployment, go to the machine where you want to install them and run the Data Security installation wizard.
When you install the module, you are asked to provide the FQDN of the TRITON management server and the credentials for a TRITON administrator with Data Security system modules permissions. When you do, the module is automatically registered with the management server.
If you accept the default configuration, all you have to do is click Deploy in TRITON - Data Security (on the management server) to complete the process. If you want to customize the configurations, go into the System Modules screen and click the module to edit.
For information on adding and configuring modules, see Managing System Modules > Adding modules in the TRITON - Data Security Help.
Policy engines analyze transactions sent from various agents and protectors. The protector monitors network traffic and sends transactions to policy engines for analysis. The CPU load on the protector is much lighter than on a policy engine; therefore, when scaling up, you should add more policy engines (not protectors) and load-balance the analysis between them.