Go to the table of contents Go to the previous page Go to the next page
Web Security Deployment Recommendations > Maximizing Web Security system performance
Maximizing Web Security system performance
Deployment and Installation Center | Web Security Solutions | Version 7.7.x
 
Adjust Websense components to improve filtering and logging response time, system throughput, and CPU performance.
Network Agent
As the number of users grows, or if Network Agent does not block Internet requests as expected, place Network Agent on a different machine from Filtering Service and Policy Server. You can also deploy additional Network Agent instances and divide network monitoring between them.
If Websense software is running in a high-load environment, or with a high capacity Internet connection, you can increase throughput and implement load balancing by installing multiple Network Agent instances. Install each agent on a different machine, and configure each agent to monitor a different portion of the network.
*
*
*
HTTP request logging
You can use Network Agent or an integration product to track HTTP requests and pass the information to Websense software, which uses the data to filter and log requests.
Network Agent and some integration products also track bandwidth activity (bytes sent and received), and the duration of each permitted Internet request. This data is also passed to Websense software for logging.
When both Network Agent and the integration product provide logging data, the amount of processor time required by Filtering Service increases.
If you are using both Network Agent and an integration product, you can avoid extra processing by configuring Websense software to use Network Agent to log HTTP requests (enhanced logging). When this feature is enabled, Websense software does not log HTTP request data sent by the integration product. Only the log data provided by Network Agent is recorded.
Consult the TRITON - Web Security Help for configuration instructions.
Microsoft SQL Server (Log Database)
Under high load, Microsoft SQL Server operations are resource intensive, and can be a performance bottleneck for Websense software reporting. For best results:
*
*
*
*
SQL Server clustering is supported for failover or high availability.
Consult your Microsoft documentation for detailed information about optimizing Microsoft SQL Server performance.
Log Database sizing considerations
Log Database disk space requirements vary, based on:
*
*
*
*
It is important to host the database engine and Log Database on hardware that matches or exceeds the requirements for expected load and for historical data retention.
Depending on the volume of Internet traffic in your network, and how much data your organization is required to store (based on organizational policy or compliance regulations, for example), the Log Database can become very large.
To help determine an effective logging and reporting strategy for your organization, consider:
*
Schedule resource intensive database and reporting jobs at lower-volume times to improve logging and reporting performance during peak periods.
See the TRITON - Web Security Help for information about scheduling database jobs, investigative reports, and presentation reports.
*
Automatically delete partitions and trend data (stored in the catalog database) after they reach this age to reduce the amount of disk space required for the Log Database.
See the TRITON - Web Security Help for information about managing Log Database partitions.
*
To decrease Log Database size, consider:
*
*
*
*
*
All of these logging settings can be customized in TRITON - Web Security. Tune your logging settings to achieve the appropriate balance of size savings and report detail for your organization.
Logging visits (default) vs. logging hits
When you log visits, one log record is created for each Web page requested by a user, rather than each separate file included in the Web page request. This creates a smaller database and allows faster reporting.
When you log hits, a separate log record is generated for each HTTP request to display any element of a Web page, including graphics and ads. This type of logging results in a larger and more detailed database than the logging visits option.
Logging full URLs
Enabling full URL logging creates a larger database than with logging hits, and also provides the most detailed reports. Log records include the domain name and the full path to specific pages requested. Use this option if you want reports of real-time scanning activity.
If the Log Database is growing too quickly, you can turn off full logging to decrease the size of each entry and slow growth.
Consolidation
Consolidation helps to reduce the size of the database by combining Internet requests that share the same value for all of the following elements, within a certain interval of time (1 minute, by default):
*
*
*
*
*
For example, the user visits www.cnn.com and receives multiple pop-ups during the session. The visit is logged as a record.
*
*
Protocol logging
If your deployment includes Network Agent, you have the option to log non-HTTP protocol traffic (for example, instant messaging or streaming media traffic) in addition to HTTP and HTTPS traffic.
The more protocols you choose to log, the greater the impact on the size of the Log Database. You can specify whether or not to log a specific protocol in each protocol filter that you create.
Selective category logging
By default, requests for URLs in all categories are logged. If your organization does not want to report on Internet requests for some categories, you can disable logging for those categories to help reduce Log Database size.

Go to the table of contents Go to the previous page Go to the next page
Web Security Deployment Recommendations > Maximizing Web Security system performance
Copyright 2016 Forcepoint LLC. All rights reserved.