Choosing and Deploying Agents /content/support/library/deployctr/v76/dic_ds_dep_agents.aspx

Deployment and Installation Center

Choosing and Deploying Data Security Agents

Websense Data Security monitors and protects data by using a series of agents that are deployed according to your organization's needs.

These agents are installed on the relevant servers (ISA agent on the ISA server, printer agent on the print server, etc.) to enable Data Security to access the data necessary to analyze the traffic from these servers. Agents, such as the Data Endpoint, enable administrators to analyze content within a user's working environment (PC, laptop, etc.) and block or monitor policy breaches.

This chapter is designed to help you decide which agents to deploy and to instruct you on how to deploy them.

Below is a summary of the Data Security agents.

Protector - The protector is a standard part of Websense Data Security deployments. It is a soft appliance with a policy engine and a fingerprint repository, and it supports analysis of SMTP, HTTP, HTTPS, FTP, plain text, and IM traffic (chat and file transfer). The protector is also an integration point for third-party solutions that support ICAP (when Websense Content Gateway is not used for this purpose). Note: For HTTPS traffic, the protector works with a Web proxy such as Websense Content Gateway. See Protector for more information.

SMTP agent - SMTP is the protocol used for sending email to recipients outside the organization. The SMTP agent monitors SMTP traffic. It receives all outbound email from the mail server and forwards it to the Data Security policy engine. It then receives the analyzed email back from the policy engine, and blocks or forwards it to the mail gateway as directed See SMTP agent for more information.

Click View Complete Document for more.