Go to the table of contents Go to the previous page Go to the next page
Installing components via the Custom option > Installing Email Security components
Installing Email Security components
Deployment and Installation Center | Email Security Solutions | Version 7.8.x
Websense Email Security Gateway is an appliance-based solution. All components run on the appliance except the Email Security manager (the Email Security module of the TRITON Unified Security Center) and Email Security Log Server. These are the only two Email Security components that may be installed using the Websense installer.
On the Custom Installation dashboard, click the Install link for Email Security.
On the Introduction screen, click Next.
If TRITON Infrastructure is not detected, then the Email Security Installer operates in custom mode.
In the Select Components screen specify whether you want to install Email Security Log Server.
Email Security Log Server is selected for installation by default. To install Email Security Log Server, SQL Server or SQL Server Express must already be installed and running in your network. (See System requirements for this version for supported database systems.)
If you choose to install Email Security Log Server, the Email Security Log Server Configuration utility is also installed. This utility can be accessed by selecting Start > All Programs > Websense > Email Security > Email Security Log Server Configuration.
If TRITON Infrastructure is not found already installed on this machine, the Email Security Database screen appears. Specify the location of a database engine and how you want to connect to it.
Log Database IP: Enter the IP address of the database engine machine. If you want to use a named database instance, enter in the form <IP address>\<instance name>. Note that the instance must already exist. See your SQL Server documentation for instructions on creating instances.
If you chose to install SQL Server Express as part of the installation of the TRITON Unified Security Center, the log database IP address should be that of the TRITON Unified Security Center machine.
Please note the following issues associated with using this encryption feature:
Database login type: Select how Email Security Log Server should connect to the database engine.
Trusted connection: connect using a Windows trusted connection.
Database account: connect using a SQL Server account.
Then enter a user name and password.
When you click Next, connection to the database engine is verified. If the connection test is successful, the next installer screen appears.
On the Email Security Database File Location screen, specify where Email Security database files should be located and then click Next.
This screen appears only if you chose to install Email Security Log Server.
A default location for the Log Database is automatically shown. Information about the location of the database engine and connection credentials were entered when TRITON Infrastructure was installed on this machine. The Email Security Installer reads this information from configuration files created by TRITON Infrastructure Setup.
It is a best practice to use the default location. However, if you want to create the Log Database in a different location (or if you already have a Log Database in a different location), enter the path to the database files.
The path entered here is understood to refer to the machine on which the database engine is located. The path entered must specify a directory that already exists.
If any Email Security components (e.g., Email Security Gateway manager or another instance of Email Security Log Server) have already been installed in your deployment, the following message appears:
The Email Security database exists, do you want to remove it?
This occurs because the database was created upon installation of the other Email Security components. Click No to continue using the existing database. In general, you should keep the database if you are sure the database was created only during the course of installing other components in your current deployment.
Clicking Yes removes the database.
On the Installation Folder screen, specify the location to which you want to install Email Security Log Server and then click Next.
To select a location different than the default, use the Browse button.
Email Security Log Server will be installed in its own folder under the parent folder you specify here.
On the Pre-Installation Summary screen, review the components to be installed. If they are correct, click Install.
The Installing Websense Email Security screen appears, as components are being installed.
Wait until the Installation Complete screen appears, and then click Done.

Go to the table of contents Go to the previous page Go to the next page
Installing components via the Custom option > Installing Email Security components
Copyright 2016 Forcepoint LLC. All rights reserved.