Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Configuring Endpoint Deployment
Configuring Endpoint Deployment
Data Security Manager Help | TRITON AP-DATA | Version 8.2x
Deploying endpoint systems in your network requires a subscription to TRITON AP-ENDPOINT DLP. It is comprised of the following basic steps:
Adding an endpoint profile to the Data Security manager or using the default. A default profile is automatically installed with the client package. (Settings > Deployment > Endpoint Profiles.)
Rearranging endpoint profiles. (Settings > Deployment > Endpoint Profiles.)
Endpoints' settings. (Settings > General > Endpoint, or Settings > Deployment > Endpoint Profiles, Settings button.)
Creating or modifying a rule for endpoint channels. (Main > Policy Management > DLP / Discovery Policies, Destination tab.) See Selecting endpoint destination channels to monitor.
Defining the type of endpoint machines to analyze, as well as the network location. (Main > Policy Management > DLP / Discovery Policies, Custom Policy Wizard - Source tab.) Use the Network Location field to define the behavior of the endpoint on and off the network.
In special circumstances, you can also bypass an endpoint client—that is, stop monitoring or protecting it for a period of time. See Bypassing endpoint clients for more information on this capability.
For information on what end users see on their machine, refer to "Using endpoint client software" in the Forcepoint Technical Library. You can distribute this document to your end users as desired.
Endpoint profiles
Endpoint profiles are templates that set service permissions. A profile describes the required behavior of an endpoint client: how it connects to endpoint servers, which user interface options are available on the client, and how it uses encryption keys to protect the transfer of sensitive data. Each profile is deployed to selected endpoint clients.
Endpoint clients
The endpoint client is a piece of Forcepoint software that gets installed on an endpoint machine. It monitors real-time traffic and applies customized security policies to applications and storage media as well as data at rest. The client application enables administrators to analyze content within a user's working environment and block or monitor policy breaches as defined by the endpoint profiles. Administrators can create policies that allow full visibility of content without restricting device usage.
When an endpoint client is installed on a computer, it attempts to connect to a TRITON AP-DATA server to retrieve its policies and endpoint profile(s). As soon as its settings are deployed, the endpoint client starts running according to its profile settings.
Endpoint servers
The endpoint server component is installed automatically on the TRITON management server and supplemental Data Security servers. Endpoint servers receive incidents from, and send configuration settings to, endpoint clients.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Configuring Endpoint Deployment
Copyright 2016 Forcepoint LLC. All rights reserved.