Configuring endpoint deployment/content/support/library/data/v763/help/ep%20deploy.aspx
TRITON - Data Security Help
Configuring Endpoint Deployment
Deploying endpoint systems in your network is comprised of the following basic steps:
- Installing the Data Security Management Server as described in the Websense Data Security Deployment Guide.
- Building a package for the endpoint client and deploying it on users’ computers (PC, laptops, etc.) as described in the deployment guide.
- Adding an endpoint profile to TRITON - Data Security or using the default. A default profile is automatically installed with the client package. (Settings > Deployment > Endpoint.)
- Rearranging endpoint profiles. (Settings > Deployment > Endpoint.)
- Configuring endpoints’ settings. (Settings > General > System > Endpoint, or Settings > Deployment > Endpoint, Settings button.)
- Creating endpoint resources. (Main > Policy Management > Resources > Endpoint Devices / Endpoint Applications / Endpoint Application Groups.)
- Creating or modifying a rule for endpoint channels. (Main > Policy Management > DLP / Discovery Policies, Destination tab.) See Selecting endpoint destination channels to monitor.
- Defining the type of endpoint machines to analyze, as well as the network location. (Main > Policy Management > DLP / Discovery Policies, Custom Policy Wizard - Source tab.) Use the Network Location field to define the behavior of the endpoint on and off the network.
- Deploying endpoint configuration settings. (Deploy button.)
- Viewing the status of endpoint systems. (Main > Status > Endpoint Status.) See Viewing endpoint status.
- Viewing incidents detected by endpoints, and taking a number of actions on them, including editing the incident details, changing the severity of the incident, or escalating the incident to a manager. (Main > Reporting > Data Loss Prevention.) See Viewing the incident list.
In special circumstances, you can also bypass an endpoint client—that is, stop monitoring or protecting it for a period of time. See Bypassing endpoint clients for more information on this capability.
For information on what end users see on their machine, refer to Using the endpoint client software.
Click View Complete Document for more.