Data Security Deployment and Installation Guide/content/support/library/data/v753/install/deploy_protector.aspx
The protector is an essential component of Websense Data Security, providing monitoring and blocking capabilities, preventing data loss and leaks of sensitive information. Using PreciseID technology, the protector can be configured to accurately monitor sensitive information-in-transit on any port.
When to use the protector
The protector works in tandem with the Data Security server. The Data Security server provides advanced analysis capabilities, while the protector sits on the network, intercepts traffic and can either monitor or block the traffic, as needed. The protector supports analysis of SMTP, HTTP, FTP, plain text, IM traffic (chat and file transfer), Yahoo and MSN. The protector is also an integration point for third-party solutions that support ICAP.
The protector fits into your existing network with minimum configuration and necessitates no network infrastructure changes.
If you want to monitor SMTP traffic, the protector is your best choice. You configure a span port to be connected to the protector. This span contains your SMTP traffic.
If you want email blocking capabilities, you can use either the protector’s inline MTA mode or the SMTP agent (see below). Websense recommends the SMTP agent for blocking, because it’s easier to configure, monitor, and debug.
We do not recommend that you use both options for the same traffic, although some companies prefer monitoring one point and enforcing policies on another, due to differences in network traffic content and load.
If you want to monitor or block HTTP or HTTPS traffic, you can use the protector to do so, or you can integrate Data Security with the Websense Content Gateway or another Web proxy.
If you want to monitor FTP, plain text, or IM traffic, you should use the protector. (The protector cannot block traffic on these channels, however.)
The first decision that needs to be made when installing a protector is its location on the network. You can deploy the protector in SPAN/mirror port mode or in inline mode.
Click View Complete Document for more.