Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Administering Websense Databases > Overview of Websense databases
Overview of Websense databases
Administering Websense Databases | Web, Data, and Email Security Solutions | v7.6.x - v7.8.x
Websense TRITON solutions use a variety of databases for different purposes: configuration information, reporting data, URL categorization, fingerprinting, and forensics. Several data formats are used, including SQL, PostgreSQL, and Websense proprietary formats.
These databases include:
See "The Websense Master Database" in the v7.6, v7.7, or v7.8 Web Security Help for further details.
Administrators can specify when Real-Time Monitor captures data on the Settings > Reporting > Preferences page in Web Security manager. No other aspect of database behavior is configurable.
Enable or disable the forensics repository, and configure its location and size on the Settings > Reporting > Dashboard page in Web Security manager.
Configure the size and location of the forensics repository in Data Security manager. Navigate to the Settings > Deployment > System Modules page and click Forensics Repository under the management server.
Websense Data Security Fingerprint Database
One of the ways that you can classify data in Websense Data Security is by "fingerprinting" it. This lets Data Security detect sensitive information despite manipulation, reformatting, or other modification. Fingerprints enable the protection of whole or partial documents, antecedents, and derivative versions of the protected information, as well as snippets of the protected information whether cut and pasted or retyped.
When you fingerprint data, the fingerprints are stored in the Data Security Fingerprint Database on the TRITON management server and pushed to other Data Security components for fast analysis on those machines.
To tune performance, you can configure the disk space and cache size of the database on the management server in Data Security manager. To do so:
1.
2.
Navigate to Settings > Deployment > System Modules.
3.
Select Primary Fingerprint Repository under the management server.
4.
Secondary repositories are maintained by Websense Content Gateway and Email Security Gateway. You can configure Data Security to detect fingerprints from repositories local to those machines (best practice) or from a remote machine, such as the management server.
Periodically, you must synchronize the fingerprints in the secondary repositories with the ones on the management server. How often you synchronize depends on your business needs. For best performance, select a time with low traffic volume.
To configure these settings:
1.
Navigate to Settings > Deployment > System Modules.
2.
Select Secondary Fingerprint Repository under the component or solution of interest.
3.
4.
See "Configuring the fingerprint repository" in the v7.6, v7.7 or v7.8 Data Security Help for instructions on configuring these settings.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Administering Websense Databases > Overview of Websense databases
Copyright 2016 Forcepoint LLC. All rights reserved.