Deployment and Installation Center
Websense TRITON Enterprise v7.6.x

Go to the table of contents Go to the previous page Go to the next page Go to the index
Choosing and Deploying Data Security Agents

Choosing and Deploying Data Security Agents
Websense Data Security monitors and protects data by using a series of agents that are deployed according to your organization's needs.
These agents are installed on the relevant servers (ISA agent on the ISA server, printer agent on the print server, etc.) to enable Data Security to access the data necessary to analyze the traffic from these servers. Agents, such as the Data Endpoint, enable administrators to analyze content within a user's working environment (PC, laptop, etc.) and block or monitor policy breaches.
The protector is a standard part of Websense Data Security deployments. It is a soft appliance with a policy engine and a fingerprint repository, and it supports analysis of SMTP, HTTP, HTTPS, FTP, plain text, and IM traffic (chat and file transfer). The protector is also an integration point for third-party solutions that support ICAP (when Websense Content Gateway is not used for this purpose).
See Protector for more information.
SMTP is the protocol used for sending email to recipients outside the organization. The SMTP agent monitors SMTP traffic. It receives all outbound email from the mail server and forwards it to the Data Security policy engine. It then receives the analyzed email back from the policy engine, and blocks or forwards it to the mail gateway as directed
See SMTP agent for more information.
The ISA agent receives Web (HTTP) connections from a Microsoft ISA or Forefront TMG Server network (for HTTPS) and forwards them to the Data Security policy engine. It then receives the analyzed information back from the policy engine and forwards it to the recipients on the Web.
See Microsoft ISA/TMG agent for more information.
Data Endpoint monitors all data activity on endpoint machines and reports on data at rest on those machines. With the endpoint agent, you can monitor application operations such as cut, copy, paste, and print screen and block users for copying files, or even parts of files, to endpoint devices such as thumb drives. The endpoint agent can also monitor or block print operations.
The printer agent is installed on a Microsoft print server. It monitors data that is sent to network printers through optical character recognition (OCR) technology.
See Printer agent for more information.
Policy engine (Web Content Gateway)
This module is embedded in the Websense Content Gateway. It is not active until registered with a TRITON management server, at which point Content Gateway can communicate with it internally. It is required for Websense Web Security Gateway and Web Security Gateway Anywhere deployments.
See Websense Content Gateway for more information.
Policy engine (Email Security Gateway)
This module is part of an Email Security Gateway appliance. It is not active until registered with a TRITON management server, at which point Email Security Gateway can communicate with it internally. It is required for Websense Email Security Gateway and Email Security Gateway Anywhere deployments.
The mobile agent monitors and blocks activities on mobile devices that perform synchronization operations with the Exchange server. With the mobile agent, you can monitor and block data transmitted in email messages, calendar events, and tasks. It is on a Websense appliance, or you can install it on your own hardware. The mobile agent supports ActiveSync, which is a wireless communication protocol used to push resources, such as email, from applications to mobile devices.
See Mobile agent for more information.
The Integration agent allows third-party products to send data to Websense Data Security for analysis. It is embedded in third-party installers and communicates with Data Security via a C-based API.
See Integration agent for more information.
The crawler is the name of the agent that performs discovery and fingerprinting scans. The crawler is installed automatically on the TRITON Management Server and other Data Security servers. If you want to improve scanning performance in high transaction volume environments, you can install it stand-alone on another server as well.
See The crawler for more information.
Important 
Data Security agents and machines with a policy engine (such as a Data Security Server or Websense Content Gateway machine) must have direct connection to the TRITON management server. When deployed in a DMZ or behind a firewall, the relevant ports must be allowed.
Each agent supports different actions—permit, block, encrypt—and each is installed using the standard TRITON installer. Note that the various agent options become available only when you are performing the installation on a required server. For example, if you are running the installation wizard on an ISA Server, the ISA agent is shown as an option in the wizard.


Go to the table of contents Go to the previous page Go to the next page Go to the index
Choosing and Deploying Data Security Agents