Table of Contents You are at the beginning of the document Go to the next page

Table of Contents

Deployment and Installation Center
Planning your deployment
Installing your security solution
Upgrading your security solution
System requirements for this version
Preparing for installation
Obtaining Microsoft SQL Server
Installing the reporting database in a custom folder with SQL Server 2012
Deployment Planning for TRITON Solutions
TRITON Enterprise deployment overview
Web Security Deployment Recommendations
High-level deployment diagrams
Deploying Web Security core components
Deploying hybrid Web Security components
Understanding Web Security standalone and integrated modes
Hardware recommendations for standalone Web Filter or Web Security deployments
Extending your Web Security deployment
Additional reporting considerations
Web Security required external resources
Maximizing Web Security system performance
Deploying transparent identification agents
Deployment guidelines for Network Agent
Locating Network Agent in a single-segment network
Locating Network Agent in a multiple-segment network
Network Agent on a gateway
Deploying Remote Filtering Server and Client
Deploying Web Security for a distributed enterprise
Web Security basic distributed enterprise topology
Web Security for remote users or locations
Web Security distributed enterprise deployment models
Web Security distributed deployments and secure VPN connections
Content Gateway Deployment
Content Gateway deployment issues
Content Gateway explicit and transparent proxy deployments
Special Content Gateway deployment scenarios
Chaining Content Gateway with other proxies
Planning Data Security Deployment
Email Security Gateway Deployment
System requirements
Single-appliance deployments
Multiple-appliance deployments
Installing TRITON Enterprise
Creating a TRITON Management Server
Installing Web Security management components
Installing Data Security management components
Installing Email Security management components
Installing Web Security solutions
Installing via the Web Security All option
Using the TRITON management server as policy source for filtering-only appliances
Installing Web Security Components on Linux
Starting the Web Security Linux installer
Using the Filtering option to install Web Security components on Linux
Installing Websense Content Gateway
Installing Web Security components to work with Websense Content Gateway
Preparing to install Websense Content Gateway
Installing Websense Content Gateway
Requirements for Red Hat Enterprise Linux
Installing appliance-based Websense solutions
Setting Up Websense V-Series Appliances
Set up the appliance hardware
V10000 G2/G3 hardware setup
V5000 G2 hardware setup
Serial port activation
Perform initial command-line configuration
Configure the appliance
Network interface configuration
Appliance Controller Interface (C)
Websense Content Gateway Interfaces (P1 and P2)
Network Agent Interface (N)
Email Security Gateway Interfaces (E1 and E2, or P1 and P2)
Interface bonding
Routing configuration
Configuring Web Security components
Install off-appliance or optional components
Restoring to Factory Image
Installing Data Security Solutions
Installing components via the Custom option
Starting a custom installation (Windows)
Installing TRITON Infrastructure
Installing Web Security components
Policy Server Connection Screen
Policy Broker Connection Screen
Filtering Service Communication Screen
Multiple Network Interfaces Screen
Active Directory Screen
Computer Browser Screen
Integration Option Screen
Select Integration Screen
Network Card Selection Screen
Database Information Screen
Log Database Location Screen
Optimize Log Database Size Screen
Filtering Feedback Screen
Directory Service Access Screen
Remote Filtering Communication Screen
Remote Filtering Pass Phrase Screen
Filtering Service Information for Remote Filtering Screen
Turning on the Computer Browser service
Installing with SQL Server
Installing Data Security components
Installing Email Security components
Installing SQL Server 2008 R2 Express (without TRITON Infrastructure)
Websense Endpoint Clients
Integrating Web Security with Cisco
Deployment considerations for integration with Cisco products
Getting started with a Cisco integration
Configuring a Cisco Security Appliance
Cisco integration configuration procedure
User-based policies and Cisco integration
Configuring a Cisco IOS Router
Cisco IOS startup configuration
Cisco IOS configuration commands
Cisco IOS executable commands
Integrating Web Security with Citrix
Managing Internet requests from Citrix server users
Citrix Integration Service installation overview
Install Filtering Service and Network Agent to integrate with Citrix
Obtain the Citrix Integration Service configuration package
Configure the Citrix Integration Service installation package
Use the installation package to install Citrix Integration Service on a Citrix server
Upgrading the Citrix Integration Service
Configuring user access on Citrix servers
Initial Setup of Citrix integration
Integrating Web Security with Microsoft Products
Deployment considerations for integration with Forefront TMG
Installing Web Security to integrate with Forefront TMG
Upgrading Web Security when integrated with ISA Server or Forefront TMG
Removing the ISAPI Filter Plug-In
Converting to an integration with Forefront TMG
Forefront TMG initial setup
Enabling communication with the Log Database when integrated with Forefront TMG
Configuring for TMG using non-Web-Proxy clients
Configuring the ISAPI Filter plug-in to ignore specific traffic
User identification and authentication with Forefront TMG
Troubleshooting integration with Forefront TMG
Integrating Web Security using ICAP Service
Installing Web Security to integrate with ICAP Service
Configuring the proxy to communicate with ICAP Service
Configuring ICAP Service
Installing Web Security for Universal Integrations
Upgrading TRITON Enterprise
Upgrade procedure for solutions that include Web, Email, and Data Security
Upgrading the TRITON management server
Upgrading Websense Web Security Solutions
Web Security or Web and Data Security upgrade outline
Upgrading from Web Security version 7.5.x or earlier
Before upgrading Web Security to v7.8
Backing up Web Security configuration
Backing up TRITON infrastructure settings
Preparing the Web Security Log Database for upgrade
Web Security upgrade order
Upgrading Web Security or Web and Data Security solutions from v7.6 or v7.7
v7.8 Web Security software upgrade instructions (Windows)
v7.8 Web Security software upgrade instructions (Linux)
Upgrading Content Gateway to v7.8.x
Upgrading V-Series Appliances to v7.8.x
Upgrading Data Security to v7.8.x
Migrating Web Security to a new operating system
Order of migration and upgrade steps
Migrating Web Security management components
Moving Web Security policy components to a new machine
Updating the operating system on an existing Web Security machine
Upgrading Email Security Gateway Solutions
Backup procedures
Recovery procedures
Initial Configuration for All Websense Modules
Web Security initial configuration
Additional configuration for Web Security Gateway Anywhere
Data Security initial configuration
Email Security Gateway initial configuration
Content Gateway initial configuration
Network Agent and stealth mode NICs
Adding, Modifying, or Removing Components
Adding or modifying Windows components
Modifying TRITON Infrastructure
Adding Web Security components
Adding Email Security components
Removing components
Removing TRITON Infrastructure
Removing Web Security components
Removing Content Gateway
Removing Data Security components
Removing Email Security components
Quick Reference
Websense TRITON Enterprise default ports
Data Security ports
Email Security Gateway ports
Excluding Websense files from antivirus scans
Configuring Websense Apache services to use a trusted connection
Component Reference
TRITON management server
TRITON Unified Security Center
TRITON Infrastructure
SQL Server 2008 R2 Express
Websense Content Gateway
Data Security manager
Mobile agent
SMTP agent
Microsoft ISA/TMG agent
Data Endpoint
Printer agent
Microsoft FCI agent
Integration agent
Email Security manager
Email Security Log Server
Data Security Protector CLI

Table of Contents You are at the beginning of the document Go to the next page
Copyright 2016 Forcepoint LLC. All rights reserved.