Disk space for archiving fingerprint and forensic repositories is allocated by the Websense Data Security by default. The default settings are the nominal values defined by Websense; however, you can modify these values. The tables below indicates the default and maximum disk space for archives, forensics repository and endpoint client incident storage, log file and fingerprint storage.
|
|
|
|
|
The disk space of the incident archive folder on a local or external partition.
|
|
|
|
|
|
|
|
|
|
|
Endpoint client incident storage
|
The disk space that each endpoint client should allocate for incident storage when the endpoint host is disconnected from the TRITON Management Server.
|
|
|
|
|
|
|
Endpoint client PreciseID fingerprint storage
|
The disk space that each endpoint client should allocate for storing directory and SharePoint fingerprints.
|
|
|
Follow the instructions below to modify the default disk-space settings for either archives, endpoint client incident storage, PreciseID fingerprint or forensic repositories.
Websense Data Security supports multi-site, distributed deployments. You can have a local policy engine on the protector, for example, and distributed (primary and secondary) fingerprint repositories.
You can utilize the crawlers on the Data Security servers alone to do your fingerprint and discovery scans, or you can install the crawler agent on additional servers to improve performance.
See Most common deployments for distributions our customers commonly use.
In a multi-component system, you can configure load-balancing by selecting Settings > Deployment > System Modules in TRITON - Data Security and then clicking the
Load Balancing button at the top of the screen.
Load balancing enables you to manage how each module sends its data to specified policy engines for analysis. This lets you distribute the load, but more important, it ensures that your vital email and HTTP performance is never harmed. For example, you can designate 1-2 dedicated servers to analyze inline HTTP traffic (where analysis latency is critical) and use another set of servers to analyze other channels.
An agent or a protector service can be analyzed by all listed policy engines or it can be analyzed by specifically selected policy engines. (Note that protector services can be analyzed only by local or Windows-based policy engines.) In addition, you can choose which policy engine analyzes a specific agent or service of the protector.