Deployment and Installation Center
Websense TRITON Enterprise v7.6.x

Go to the table of contents Go to the previous page Go to the next page Go to the index
Upgrading to Data Security 7.6.0 > Upgrading a Data Security Protector

Important 
If you are upgrading your protector to new hardware, be sure to keep the original IP address/host name if you want to retain settings and information from the original machine.
If you assign a new IP, the protector's settings are cleared to default when it registers with the management server. In this case, you should manually delete the protector with the original IP address from the system modules page of TRITON - Data Security.
Important 
5.
If, when upgrading Data Security Management Server, you moved management functions to a different machine (i.e., created a TRITON management server on a different machine), reregister Protector with the new TRITON management server:
Note 
Even if you did not move management functions to a different machine, reregister Protector if you changed the domain membership or IP address of the Data Security Management Server machine.
When you upgrade a Data Security server or protector, it takes time for it to download the information necessary for resolving source and destination resources such as people, computers, and printers. Routing traffic through the system before this is complete may result in:
Important 
1.
In the version 7.6 TRITON Unified Security Center (either on the upgraded Data Security Management Server machine or the machine to which you migrated Data Security Management Server during upgrade) go to Data Security module > Settings > System Modules and delete Protector.
3.
In the version 7.6 TRITON Unified Security Center (either on the upgraded Data Security Management Server machine or the machine to which you migrated Data Security Management Server during upgrade) go to Data Security module > Settings > System Modules and modify the settings for the added Protector to match those in place prior to upgrade.
When you upgrade a Data Security server or protector, it takes time for it to download the information necessary for resolving source and destination resources such as people, computers, and printers. Routing traffic through the system before this is complete may result in:


Go to the table of contents Go to the previous page Go to the next page Go to the index
Upgrading to Data Security 7.6.0 > Upgrading a Data Security Protector