Installing Data Security Components > Installing supplemental Data Security servers
|
Notes:
|
|
1.
|
4.
|
Select Custom.
|
5.
|
6.
|
7.
|
In the Destination Folder screen, specify the folder into which to install the server software.
|
8.
|
9.
|
The Fingerprinting Database screen appears. To choose a location other than the default shown, use the Browse button.
|
10.
|
The Virtual SMTP Server screen appears. This is because an SMTP agent is included with supplemental Data Security server installations.
|
11.
|
In the Server Access screen, select the IP address to identify this machine to other Websense components.
|
12.
|
In the Register with the Data Security Server screen specify the location and log on credentials for the TRITON management server.
|
13.
|
In the Local Administrator screen, supply a user name and password as instructed on-screen. The server/host name portion of the user name cannot exceed 15 characters. If you are installing Data Security v7.7.0, this password cannot exceed 19 characters. If you are installing version 7.7.2 or beyond, password length doesn't matter.
|
14.
|
If you installed a Lotus Notes client on this machine so you can perform fingerprinting and discovery on a Lotus Domino server, the Lotus Domino Connections screen appears.
|
a.
|
On the Lotus Domino Connections page, select the check box labeled Use this machine to scan Lotus Domino servers.
|
b.
|
In the User ID file field, browse to one of the authorized administrator users, then navigate to the user's user.id file.
|
c.
|
In the Password field, enter the password for the authorized administrator user.
|
15.
|
In the Installation Confirmation screen, if all the information entered is correct, click the Install button to begin installation.
|
16.
|
Once installation is complete, the Installation Complete screen appears to inform you that your installation is complete. Click Finish.
|
17.
|
Log onto TRITON - Data Security and click Deploy to fully connect the supplemental server with the management server.
|
Installing Data Security Components > Installing supplemental Data Security servers
|