Deployment and Installation Center
Websense TRITON Enterprise v7.6.x

Go to the table of contents Go to the previous page Go to the next page Go to the index
Planning Data Security Deployment > Planning network resources

Disk space for archiving fingerprint and forensic repositories is allocated by the Websense Data Security by default. The default settings are the nominal values defined by Websense; however, you can modify these values. The tables below indicates the default and maximum disk space for archives, forensics repository and endpoint client incident storage, log file and fingerprint storage.
Default Setting
The disk space of the incident archive folder on a local or external partition.
Forensic repository
The disk space of the forensic records stored in the archive folder.
Default Setting
Endpoint client incident storage
The disk space that each endpoint client should allocate for incident storage when the endpoint host is disconnected from the TRITON Management Server.
Endpoint client log file
Endpoint client PreciseID fingerprint storage
The disk space that each endpoint client should allocate for storing directory and SharePoint fingerprints.
Follow the instructions below to modify the default disk-space settings for either archives, endpoint client incident storage, PreciseID fingerprint or forensic repositories.
a.
Archives:
Select Settings > Configuration > System > Archive Storage. In the Maximum archive disk space field, modify the value.
b.
Forensics repository:
Select Settings > Deployment > System Modules. In the list of modules, select the Forensics Repository entry. In the Maximum Disk Space field, set the value.
c.
Endpoint client (incident storage, log file and fingerprint storage):
Select Settings > Configuration > System > Endpoint. In the section labeled Disk Space, modify the relevant disk-space value.
3.
Click OK. The disk space values are set and changes saved.
4.
Click Deploy to deploy your settings.
Websense Data Security supports multi-site, distributed deployments. You can have a local policy engine on the protector, for example, and distributed (primary and secondary) fingerprint repositories.
You can utilize the crawlers on the Data Security servers alone to do your fingerprint and discovery scans, or you can install the crawler agent on additional servers to improve performance.
See Most common deployments for distributions our customers commonly use.
In a multi-component system, you can configure load-balancing by selecting Settings > Deployment > System Modules in TRITON - Data Security and then clicking the Load Balancing button at the top of the screen.
Load balancing enables you to manage how each module sends its data to specified policy engines for analysis. This lets you distribute the load, but more important, it ensures that your vital email and HTTP performance is never harmed. For example, you can designate 1-2 dedicated servers to analyze inline HTTP traffic (where analysis latency is critical) and use another set of servers to analyze other channels.
An agent or a protector service can be analyzed by all listed policy engines or it can be analyzed by specifically selected policy engines. (Note that protector services can be analyzed only by local or Windows-based policy engines.) In addition, you can choose which policy engine analyzes a specific agent or service of the protector.
Note 
Click each item in the tree to define which policy engine it should be analyzed by. For further information on load balancing, refer to the TRITON - Data Security Help.


Go to the table of contents Go to the previous page Go to the next page Go to the index
Planning Data Security Deployment > Planning network resources