Go to the table of contents Go to the previous page Go to the next page
Installing components via the Custom option > Installing Data Security components
Installing Data Security components
Deployment and Installation Center | Data Security Solutions | Version 7.8.x
You use the same Websense installer to install most Data Security components as you do to install the TRITON Unified Security Center and TRITON infrastructure.
If you plan to install a Data Security component, the TRITON components must already be installed in your network along with the Data Security Management Server software. See Creating a TRITON Management Server.
To install an additional Data Security component:
1.
2.
3.
Click the Install link for Data Security.
4.
Not all Data Security components may show in the Select Components screen. The components that are offered depends on the operating system of the machine and applications detected by the installer. For example, if a print server is found, then the Printer Agent option appears. If ISA Server is found, the ISA agent is offered.
Possible options include:
*
Crawler Agent: scans networks transparently to locate confidential documents and data on endpoints, laptops and servers. It also performs fingerprinting, and scans databases as well as documents.
*
Printer Agent: enables integration between printer servers and the Data Security Server intercepting print jobs from the printer spooler. Websense recommends you install the printer agent on a dedicated print server.
*
SMTP Agent: enables integration between the SMTP Server and the Data Security Server enabling analysis of all external email, before forwarding it to the mail gateway.
*
ISA/TMG Agent: receives all Web connections from Microsoft ISA Server or Forefront TMG and enables the Data Security Server to analyze them. Note that ISA Agent requires 1 GB free disk space on the ISA Server machine. The installer will not allow you to install ISA Agent if available space is less.
For instructions on installing each agent, refer to Installing Data Security Servers and Agents. Each agent has prerequisites and best practices that must be followed.
This chapter also describes how to install Linux-based components such as the protector and mobile agent.

Go to the table of contents Go to the previous page Go to the next page
Installing components via the Custom option > Installing Data Security components
Copyright 2016 Forcepoint LLC. All rights reserved.