Table of Contents You are at the beginning of the document Go to the next page

Table of Contents

Deployment and Installation Center
System requirements for this version
Preparing for installation
Obtaining Microsoft SQL Server
Web Security Deployment Recommendations
Deploying Web Security core components
Understanding Web Security standalone and integrated modes
Extending your Web Security deployment
Additional reporting considerations
Web Security required external resources
Maximizing Web Security system performance
Deploying Web Security hybrid filtering components
Deploying transparent identification agents
Hardware recommendations for standalone Web Security deployments
Standalone deployment guidelines for Network Agent
Positioning Network Agent in the network
Deploying Remote Filtering Server and Client
Using the TRITON management server as policy source for filtering-only appliances
Deploying Web Security for a distributed enterprise
Web Security basic distributed enterprise topology
Web Security filtering remote sites
Web Security distributed enterprise deployment models
Web Security distributed deployments and secure VPN connections
Content Gateway Deployment
Content Gateway deployment issues
Content Gateway explicit and transparent proxy deployments
Special Content Gateway deployment scenarios
Chaining Content Gateway with other proxies
Planning Data Security Deployment
Deciding what data to protect
Determining where your confidential data resides
Determining your information flow
Defining the business owners for the data
Deciding who will manage incidents
Planning access control
Analyzing network structure
Planning network resources
Most common deployments
Planning a phased approach
Integrating Data Security with Existing Infrastructure
Working with existing email infrastructure
Working with Web proxies
Working with shared drives
Performing discovery on Novell file systems
Performing discovery on Windows NFS shares
Working with user directory servers
Working with Exchange servers
Working with IBM Lotus Domino and Lotus Notes
Scaling Data Security
When does your system need to grow?
Adding modules to your deployment
Email Security Gateway Deployment
System requirements
Single-appliance deployments
Multiple-appliance deployments
Installation Overview: TRITON Enterprise
Creating a TRITON Management Server
Installing TRITON - Web Security
Installing TRITON - Data Security
Installing TRITON - Email Security
Installing Web Security solutions
Installation overview: Web Filter and Web Security
Installation overview: Web Security Gateway
Installation overview: Web Security Gateway Anywhere
Installing via the Web Security All option
Installing Web Security Components on Linux
Starting the Web Security Linux installer
Installing all Web security filtering components on Linux
Installing Web Security components on Linux
Installing Websense Content Gateway
Installing Web Security components to work with Websense Content Gateway
Preparing to install Websense Content Gateway
Installing Websense Content Gateway
Requirements for Red Hat Enterprise Linux
Installing appliance-based Websense solutions
Websense appliance-based solutions
Web Security
Web Security Gateway or Web Security Gateway Anywhere
Email Security Gateway or Email Security Gateway Anywhere
Web Security and Email Security Gateway (Anywhere)
Web Security Gateway (Anywhere) and Email Security Gateway (Anywhere)
Summary of appliance solution components
Installation steps for appliance-based solutions
Setting Up Websense V-Series Appliances
Set up the appliance hardware
V10000 G2 hardware setup
V5000 G2 hardware setup
Serial port activation
Perform initial command-line configuration
Configure the appliance
Network interface configuration
Appliance Controller Interface (C)
Websense Content Gateway Interfaces (P1 and P2)
Network Agent Interface (N)
Email Security Gateway Interfaces (E1 and E2, or P1 and P2)
Interface bonding
Routing configuration
Alerting
Configuring Web Security components
Install off-appliance or optional components
Restoring to Factory Image
Installing Data Security Solutions
Installing Data Security on a virtual machine
Installing the ESXi platform
Customizing ESXi
Installing the VMware Client
Installing the license and setting the time
Configuring an additional NIC
Creating the Data Security virtual machine
Installing Data Security Components
Installing supplemental Data Security servers
Installing Data Security agents
Protector
Mobile agent
SMTP agent
Microsoft ISA/TMG agent
Printer agent
Integration agent
The crawler
Troubleshooting Data Security agent installation
Installing components via the Custom option
Starting a custom installation
Installing TRITON Infrastructure
Installing Web Security components
Policy Server Connection Screen
Policy Broker Connection Screen
Filtering Service Communication Screen
Multiple Network Interfaces Screen
Active Directory Screen
Computer Browser Screen
Integration Option Screen
Select Integration Screen
Network Agent and Firewall Screen
Network Card Selection Screen
Database Information Screen
Log Database Location Screen
Optimize Log Database Size Screen
Filtering Feedback Screen
Directory Service Access Screen
Remote Filtering Communication Screen
Remote Filtering Pass Phrase Screen
Filtering Service Information for Remote Filtering Screen
Turning on the Computer Browser service
Installing with SQL Server
Installing Data Security components
Installing Email Security components
Installing SQL Server 2008 R2 Express (without TRITON Infrastructure)
Installing and Deploying Websense Endpoint Clients
Deploying Websense endpoints
Uninstalling endpoint software
Multiple agent limitations
Integrating Web Security with Check Point
Deployment considerations for integration with Check Point products
Getting started with a Check Point integration
Configuring Check Point products to work with Web Security solutions
Configuring CheckPoint secure communication
Troubleshooting Check Point integration
Integrating Web Security with Cisco
Deployment considerations for integration with Cisco products
Getting started with a Cisco integration
Configuring a Cisco Security Appliance
Cisco integration configuration procedure
User-based filtering for Cisco integration
Configuring a Cisco IOS Router
Cisco IOS startup configuration
Cisco IOS configuration commands
Cisco IOS executable commands
Configuring a Cisco Content Engine
Cisco Content Engine Web-based interface
Cisco Content Engine console or telnet session
Verifying Cisco Content Engine configuration
Configuring firewalls or routers when integrating with Cisco Content Engine
Cisco Content Engine and browser access to the Internet
Integrating Web Security with Citrix
Deployment considerations for integration with Citrix products
Other integrations for Web Security
Filtering Citrix server users
Citrix Integration Service installation overview
Install Filtering Service and Network Agent to integrate with Citrix
Obtain the Citrix Integration Service configuration package
Configure the Citrix Integration Service installation package
Use the installation package to install Citrix Integration Service on a Citrix server
Upgrading Citrix Integration Service to 7.7
Configuring user access on Citrix servers
Initial Setup of Citrix integration
Integrating Web Security with Microsoft Products
Deployment considerations for integration with Forefront TMG
Installing Web Security to integrate with Forefront TMG
Upgrading Web Security when integrated with ISA Server or Forefront TMG
Removing the ISAPI Filter Plug-In
Converting to an integration with Forefront TMG
Forefront TMG initial setup
Enabling communication with the Log Database when integrated with Forefront TMG
Configuring for TMG using non-Web-Proxy clients
Configuring the ISAPI Filter plug-in to ignore specific traffic
User identification and authentication with Forefront TMG
Troubleshooting integration with Forefront TMG
Integrating Web Security using ICAP Service
Installing Web Security to integrate with ICAP Service
Configuring the proxy to communicate with ICAP Service
Configuring ICAP Service
Installing Web Security for Universal Integrations
Upgrading Websense Security Solutions to v7.7.x
Upgrading solutions that include Web, Email, and Data Security
Before upgrading Web, Email, and Data Security
Upgrade sequence for solutions that include Web, Email, and Data Security
Upgrade procedure for solutions that include Web, Email, and Data Security
Upgrading the TRITON management server
Upgrading Websense Web Security Solutions
Upgrading from Web Security version 7.1.x or earlier
Upgrading from Web Security Gateway, Web Security Gateway Anywhere, or V-Series Appliance v7.5.x
Before upgrading Web Security to v7.7
Placing the Web Security management console (v7.5 only)
Backing up Web Security configuration
Backing up TRITON infrastructure settings
Preparing the Web Security Log Database for upgrade
Web Security upgrade order
Upgrading Web Filter or Web Security software-only deployments from v7.5.x
Upgrading Web Security or Web and Data Security solutions from v7.6
v7.7 Web Security software upgrade instructions (Windows)
v7.7 Web Security software upgrade instructions (Linux)
Upgrading Content Gateway to v7.7.x
Upgrading V-Series Appliances to v7.7
Upgrading Data Security to v7.7.x
Upgrading the Data Security Management Server
Upgrading supplemental Data Security servers or standalone agents
Upgrading a Data Security protector or mobile agent
Upgrading Data Security endpoints
Upgrading Data Security to v7.6.0
Preparing for upgrade of Data Security
Upgrading the Data Security Management Server to v7.6.0
Upgrading a supplemental Data Security server or standalone agents to v7.6.0
Upgrading a Data Security protector to v7.6.0
Upgrading Content Gateway with Data Security
Upgrading Data Security endpoints
Upgrade Notes and Exceptions
Migrating Web Security to a new operating system
Order of migration and upgrade steps
Migrating management components (Websense Manager or TRITON - Web Security)
Moving Web Security policy components to a new machine
Updating the operating system on an existing Web Security machine
Upgrading Email Security Gateway to v7.7
Versions supported for upgrade
Preparing for the upgrade
Upgrade instructions
Post-upgrade activities
Recovery procedures
Initial Configuration for All Websense Modules
Web Security initial configuration
Additional configuration for Web Security Gateway Anywhere
Data Security initial configuration
Email Security Gateway initial configuration
Content Gateway initial configuration
Network Agent and stealth mode NICs
Adding, Modifying, or Removing Components
Adding or modifying Windows components
Modifying TRITON Infrastructure
Adding Web Security components
Adding or modifying Data Security components
Recreating Data Security certificates
Repairing Data Security components
Changing the Data Security service account
Changing the domain of a Data Security Server
Adding Email Security components
Removing components
Removing TRITON Infrastructure
Removing Web Security components
Removing Content Gateway
Removing Data Security components
Removing Email Security components
Quick Reference
Starting and stopping Web Security services
Websense TRITON Enterprise default ports
Data Security ports
Email Security Gateway ports
Excluding Websense files from antivirus scans
Creating Apache SSL certificates
Configuring Websense Apache services to use a trusted connection
Component Reference
TRITON management server
TRITON Unified Security Center
TRITON Infrastructure
SQL Server 2008 R2 Express
Policy Broker
Policy Server
Filtering Service
Network Agent
Usage Monitor
TRITON - Web Security
Web Security Log Server
User Service
DC Agent
Logon Agent
Logon Application
eDirectory Agent
RADIUS Agent
State Server
Multiplexer
Filtering Plug-in
Remote Filtering Client
Remote Filtering Server
Linking Service
Sync Service
Directory Agent
Real-Time Monitor
Websense Content Gateway
TRITON - Data Security
Protector
Mobile agent
SMTP agent
Microsoft ISA/TMG agent
Data Endpoint
Printer agent
Integration agent
Crawler
TRITON - Email Security
Email Security Log Server
Migration Reference
Upgrading or merging administrator accounts
Migrating from MSDE to SQL Server 2008 R2 Express
Changing the TRITON management server IP address, name, or domain
Changing the IP address of the TRITON management server
Changing the hostname or domain of the TRITON management server
Configuring TRITON Infrastructure to new IP address, hostname, or domain
Configuring Tomcat to a use new local IP address
Updating the IP address for Email Security Log Server
Updating the log database location for Email Security Gateway
Re-registering Email Security Gateway with Data Security
Configuring a new hostname for TRITON - Web Security
Changing the IP address of the Data Security Management Server
Changing the hostname of the Data Security Management Server
Changing the domain of the Data Security Management Server
Re-registering Data Security components
Data Security Protector CLI

Table of Contents You are at the beginning of the document Go to the next page
Copyright 2016 Forcepoint LLC. All rights reserved.