Go to the table of contents Go to the previous page Go to the next page
Installing TRITON Enterprise > Creating a TRITON Management Server > Installing Email Security management components
Installing Email Security management components
Deployment and Installation Center | Email Security Solutions | Version 7.8.x
Follow these instructions to install the Email Security module of the TRITON Unified Security Center. In addition to the Email Security module (also referred to as Email Security manager), you will be given the option to install Email Security Log Server on this machine.
1.
2.
Once the Email Security Installer is launched, the Introduction screen appears, click Next to begin Email Security installation.
3.
On the Select Components screen, choose whether to install Email Security Log Server on this machine and then click Next.
Email Security manager (i.e., the Email Security module of the TRITON Unified Security Center) will be installed automatically. You cannot deselect it.
 
Note 
Email Security Log Server is selected for installation by default. To install Email Security Log Server, SQL Server or SQL Server Express must already be installed and running in your network (see System requirements for this version for supported versions of SQL Server). If you chose to install SQL Server Express during TRITON Infrastructure installation, then it is already installed on this machine.
If you choose to install Email Security Log Server, the Email Security Log Server Configuration utility is also installed. This utility can be accessed by selecting Start > All Programs > Websense > Email Security > Email Security Log Server Configuration.
You can install Email Security Log Server on another machine; it is not required to be installed on the same machine as the TRITON console. To install Log Server on a different machine, deselect the Email Security Log Server option here (in the Select Components screen) and complete Email Security installation. Then run TRITON Unified Security Setup on the machine on which you want to install Email Security Log Server. Perform a custom installation of Email Security components (see Installing Email Security components).
4.
On the Email Security Database screen, specify the IP address or IP address and instance name (format: IP address\instance) for the Email Security database.
You may specify whether the connection to the database should be encrypted.
Please note the following issues associated with using this encryption feature:
*
*
*
Designate the login type for the database, either Windows authentication or SQL authentication.
5.
On the Email Security Database File Location screen, specify where Email Security database files should be located and then click Next.
A default location for the Log Database is automatically shown. Information about the location of the database engine and connection credentials were entered when TRITON Infrastructure was installed on this machine. The Email Security Installer reads this information from configuration files created by TRITON Infrastructure Setup.
It is a best practice to use the default location. However, if you want to create the Log Database in a different location (or if you already have a Log Database in a different location), enter the path to the database files.
The path entered here is understood to refer to the machine on which the database engine is located. The path entered can specify a directory that already exists, or you can create a new directory via the browse function.
6.
On the Email Security Gateway screen specify the Email Security Gateway appliance to be managed by this installation of the TRITON Unified Security Center and then click Next.
Enter the IP address of the C or E (E1 or E2) interface of the Email Security Gateway appliance. You must specify an IP address only. Do not use a fully-qualified domain name (FQDN).
When you click Next, communication with the specified appliance will be verified. Communication may be unsuccessful if:
*
*
*
If the Appliance network communication popup message appears, click OK and enter your subscription key in the appropriate entry field.
*
*
*
*
*
7.
On the Installation Folder screen, specify the location to which you want to install Email Security components and then click Next.
To select a location different than the default, use the Browse button.
Each component (Email Security manager and/or Email Security Log Server) will be installed in its own folder under the parent folder you specify here.
8.
On the Pre-Installation Summary screen, review your settings for the components to be installed. If they are correct, click Install.
Click Back to return to any screen on which you want to modify settings.
9.
The Installing Websense Email Security screen appears, as components are being installed.
10.
Wait until the Installation Complete screen appears, and then click Done.
11.

Go to the table of contents Go to the previous page Go to the next page
Installing TRITON Enterprise > Creating a TRITON Management Server > Installing Email Security management components
Copyright 2016 Forcepoint LLC. All rights reserved.