TRITON - Data Security Help/content/support/library/data/v753/help/ep deploy.aspx

TRITON - Data Security Help v7.5.3

Deploying the endpoint

Deploying endpoint systems in your network is comprised of the following basic steps:
  1. Installing the Data Security Management Server as described in the Websense Data Security Deployment Guide.
  2. Building a package for the endpoint client and deploying it on users’ computers (PC, laptops, etc.) as described in the deployment guide.
  3. Addng an endpoint profile to TRITON - Data Security or using the default. A default profile is automatically installed with the client package. (Settings > Deployment > Endpoint.)
  4. Rearranging endpoing profiles. (Settings > Deployment > Endpoint.)
  5. Configuring endpoints' settings. (Settings > Configuration > System > Endpoint, or Settings > Deployment > Endpoint, Settings button.)
  6. Creating endpoint resources. (Main > Policy Management > Resources > Endpoint Devices / Endpoint Applications / Endpoint Application Groups.)
  7. Creating or modifying a rule for endpoint channels. (Main > Policy Management > Data Usage / Data Discovery Policies, Destination tab.)
  8. Defining the type of endpoint machines to analyze, as well as the network location. (Main > Policy Management > Data Usage / Data Discovery Policies, Rule Wizard - Source tab.) Use the Network Location field to define the behavior of the endpoint on and off the network. LI>Deploying endpoint configuration settings. (Deploy button.)
  9. Viewing the status of endpoint systems. (Main > Status & Logs > Endpoint Status.)
  10. Viewing incidents detected by endpoints, and taking a number of actions on them, including editing the incident details, changing the severity of the incident, or escalating the incident to a manager. (Main > Incidents & Reports > Data Usage.)

In special circumstances, you can also bypass an endpoint client—that is, stop monitoring or protecting it for a period of time.

Click View Complete Document for more.