Technical Library
|
Support
Installing Data Security Solutions
Installing Data Security Solutions
Deployment and Installation Center | Data Security Solutions | Version 7.8.x
To install Data Security, you perform 2 basic steps.
1.
Install the TRITON infrastructure. This includes the TRITON console, settings database, and reporting database.
2.
Install Data Security management components. This includes the a policy engine, crawler, fingerprint repository, forensics repository, and endpoint server.
(Data Security supports installations over Virtual Machines (VM), but Microsoft SQL Server must be present to support the incident and policy database.)
Once you've installed management components, you may choose to install Data Security agents on print servers, TMG servers, or endpoint client machines. You can also install extra Data Security servers and crawlers for system scaling.
See the
Data Security Installation Guide
for step-by-step instructions.
It includes system requirements, port requirements, installation steps, as well as pre- and post-installation steps for each component when required.
It also covers how to add, modify, and remove components.
Installing Data Security Solutions
Copyright 2016 Forcepoint LLC. All rights reserved.