Go to the table of contents Go to the previous page Go to the next page
Mobile agent
Deployment and Installation Center | Data Security Solutions | Version 7.7.x
The mobile agent is a Linux-based appliance that lets you secure the type of email content that is synchronized to users' mobile devices when they connect to the network. This includes content in email messages, calendar events, and tasks.
The mobile agent analyzes content when users synchronize their mobile devices to your organization's Exchange server. If content or data being pushed to their device breaches the organization's mobile DLP policy, it is quarantined or permitted accordingly.
Deploying the mobile agent
In your network, the appliance connects to the Data Security Management Server and to your Microsoft Exchange agent to provide this function. DLP analysis is done on the appliance or on other Data Security servers (rather than on the management server) to optimize performance and balance the load.
Outside your DMZ, the mobile agent connects to any Microsoft ActiveSync-compatible mobile device over 3G and wireless networks, such as i-pads, Android mobile phones, and i-phones. (ActiveSync is a wireless communication protocol used to push resources, such as email, from applications to mobile devices.)
Unlike the protector, the mobile agent appliance acts as a reverse proxy, because it retrieves resources, such as email, from the Exchange server on behalf of the mobile device.
The following diagram illustrates the system architecture of a typical mobile agent deployment. Depending on your network and security requirements, you can also go through an edge device, such as a Microsoft ISA Server, that acts as a reverse proxy to the mobile agent.
For system requirements, see Mobile Agent hardware requirements.
For the default port numbers used by the mobile agent, see Mobile agent. If you have a security policy in place, exclude these ports from that policy so the mobile agent can operate properly. You can lock down or harden your security systems once these ports are open.
Deploying the Data Security mobile agent comprises the following basic steps:
1.
2.
3.
Mobile agent installations include:
*
*
Hardware requirements
The mobile agent is a soft appliance. If you are using your own hardware, it must meet the following hardware requirements:
 
Required ports
The following ports must be kept open for the mobile agent:
Installing the mobile agent software
The mobile agent must be installed on hardware that meets the requirements described in Mobile Agent hardware requirements. Websense appliances meet these requirements, or you can host the agent on your own Linux-based hardware.
 
Note 
You access the installation wizard for your mobile agent through a putty Command Line Interface (CLI).
To install the mobile agent, do the following:
1.
If you are using your own hardware:
a.
*
*
*
*
*
b.
The mobile agent software is provided on an ISO image. Download the image, WebsenseDataSecurityProtector77x.iso, from MyWebsense and burn it to a CD.
c.
d.
An installer page appears. If you are using a regular keyboard and screen, type kvm and press Enter. If you are using a serial console, press Enter. The machine is automatically restarted.
2.
You're prompted to enter a user name and password. Enter root for user name and admin for password.
3.
4.
 
5.
When the wizard requires data entry, it prompts you. In some cases, a default setting is provided:
*
*
If the default setting is acceptable, press <Enter> to keep the default value.
STEP 1: Accept license agreement
Each time the installation wizard opens, the end-user license agreement appears. Use the page-down/ scroll / space keys to read/scroll to the end of the agreement.
Carefully read the license agreement and when prompted, type yes to accept the license agreement.
 
 
STEP 2: Set administrator password
Type in and confirm a new password for the "admin" account. For security reasons, it is best practice to change the default password.
 
Important 
The Operating System (OS) prompts you to change (refresh) your password every 90 days.
STEP 3: Set root password
Type in and confirm a new password for the root user. The root account provides full access to the device and should be used carefully.
 
Important 
STEP 4: Network configuration
1.
2.
 
3.
a.
b.
c.
d.
 
4.
a.
b.
c.
d.
 
Note 
If you type Enter, a list of available NICs display, allowing you to define other NICs.
e.
 
f.
*
*
*
 
 
Note 
g.
 
Note 
*
If you type n, the network configuration is not saved, and you are prompted to configure the network again.
*
If you type y, the details for the network configuration are saved and the network service is reloaded with the new parameters. The new parameters, such as IP address, network prefix, and gateway for the NIC display on the wizard.
5.
STEP 5: Define the host name
1.
2.
This can be used to secure the connections between mobile devices and the mobile agent using the default certificate. The default certificate is a self-signed certificate automatically generated by Websense.
STEP 6: Define the domain name server
Optionally, in the wizard, type the IP address of the Domain Name Server (DNS) that will service this mobile agent. A DNS will allow access to other network resources using their names instead of their IP addresses.
 
Important 
STEP 7: Set the date, time and time zone
1.
2.
3.
STEP 8: Register with a Data Security Server
In this step, a secure channel will be created connecting the mobile agent to a Data Security Server. This can be the Data Security Management Server or a supplemental server, depending on your set up.
1.
2.
3.
Step 9: Reboot the mobile agent appliance
For best practice, reboot the mobile agent appliance. You can reboot later if desired. This completes the IPv6 disabling process that the wizard starts.
Final step: Verification
In the Data Security module of TRITON Unified Security Center, verify that the Websense mobile agent is no longer pending and that the icon displays its active status. Refresh the browser.
Click Deploy.
The mobile agent is now ready to be configured. See Configuring the mobile agent for instructions.
 
Note 
Configuring the mobile agent
1.
2.
3.
4.
5.
a.
*
*
 
Important 
b.
 
Note 
6.
*
*
*
*
a.
b.
c.
For more information, see the TRITON - Data Security Help.
7.
 
Note 
*
Select the Allow on fail option (the default option is Block on fail). Selecting Allow on fail enables failed messages to be received on the mobile device. If you do not select Allow on fail, these messages will be dropped and are not tracked nor released.
*
Define the sender's email address, outgoing mail server, and port to Notify Users of Breach. To do so, navigate to Settings > System > Alerts > Email Properties.
8.
Navigate to Main > Resources > Notifications and select the mobile policy violation template. Add sender details, then use the Outgoing mail server field to define a next hop relay for outbound mail. If you do not, the mobile agent may not send block notifications.
9.
Wait for the agent to fully deploy. This may take a few minutes.
 
Tip 
Configuring a mobile DLP policy
To begin analysis, configure the mobile DLP policy or create a custom policy. To configure the mobile DLP policy, Navigate to Main > DLP Policies > Mobile DLP Policy. See TRITON - Data Security Help for more configuration information.
To create a custom policy, navigate to Main > DLP Policies > Manage Policies. Select Mobile Email on the Destination tab for each rule to support Mobile events.

Go to the table of contents Go to the previous page Go to the next page
Copyright 2016 Forcepoint LLC. All rights reserved.