TRITON - Data Security Help/content/support/library/data/v753/help/ep deploy.aspx
TRITON - Data Security Help v7.5.3
Deploying the endpoint
Deploying endpoint systems in your network is comprised of the following basic steps:
- Installing the Data Security Management Server as described in the Websense Data Security Deployment Guide.
- Building a package for the endpoint client and deploying it on users’ computers (PC, laptops, etc.) as described in the deployment guide.
- Addng an endpoint profile to TRITON - Data Security or using the default. A default profile is automatically installed with the client package. (Settings > Deployment > Endpoint.)
- Rearranging endpoing profiles. (Settings > Deployment > Endpoint.)
- Configuring endpoints' settings. (Settings > Configuration > System > Endpoint, or Settings > Deployment > Endpoint, Settings button.)
- Creating endpoint resources. (Main > Policy Management > Resources > Endpoint Devices / Endpoint Applications / Endpoint Application Groups.)
- Creating or modifying a rule for endpoint channels. (Main > Policy Management > Data Usage / Data Discovery Policies, Destination tab.)
- Defining the type of endpoint machines to analyze, as well as the network location. (Main > Policy Management > Data Usage / Data Discovery Policies, Rule Wizard - Source tab.) Use the Network Location field to define the behavior of the endpoint on and off the network. LI>Deploying endpoint configuration settings. (Deploy button.)
- Viewing the status of endpoint systems. (Main > Status & Logs > Endpoint Status.)
- Viewing incidents detected by endpoints, and taking a number of actions on them, including editing the incident details, changing the severity of the incident, or escalating the incident to a manager. (Main > Incidents & Reports > Data Usage.)
In special circumstances, you can also bypass an endpoint client—that is, stop monitoring or protecting it for a period of time.
Click View Complete Document for more.