Custom Deployment > Installing Email Security Components
|
Websense Email Security Gateway is an exclusively appliance-based solution. All components run on the appliance exclusively except for TRITON - Email Security (i.e. the Email Security module of the TRITION Unified Security Center) and Email Security Log Server. These are the only two Email Security components that may be installed using the Websense installer.
1. It is assumed you have already launched the Websense installer, chosen the Custom installation type. If not, see Deployment.
2.
4.
5. If the Email Security Installer detects TRITON Infrastructure on this machine, it operates as if it is part of a TRITON Unified Security Center installation. See Installing the Email Security module for TRITON Unified Security Center for instructions.If TRITON Infrastructure is not detected, then the Email Security Installer operates in custom mode, see the remaining steps below.
6. In the Select Components screen specify whether you want to install Email Security Log Server.Email Security Log Server is selected for installation by default. To install Email Security Log Server, SQL Server or SQL Server Express (see System Requirements for supported database systems) must already be installed and running in your network.If you choose to install Email Security Log Server, the Email Security Log Server Configuration utility is also installed. This utility can be accessed by selecting Start > All Programs > Websense > Email Security > Email Security Log Server Configuration.
7. If TRITON Infrastructure is not found already installed on this machine, the Log Database screen appears. Specify the location of a database engine and how you want to connect to it.
Log Database IP: Enter the IP address of the database engine machine. If you want to use a named database instance, enter it the form <IP address>\<instance name>. Note that the instance must already exist. See your SQL Server documentation for instructions on creating instances.
If you chose to install SQL Server Express as part of the installation of the TRITON Unified Security Center, the log database IP address should be that of the TRITON Unified Security Center machine.
Database login type: Select how Email Security Log Server should connect to the database engine.
Trusted connection:connect using a Windows trusted connection.
Database account:connect using a SQL Server account.
If using a trusted connection, enter the domain\username of the account to be used. This account must be a trusted local administrator on the database engine machine.
If using a database account, enter the name of a SQL Server account. This account must have certain roles assigned; see Installing with SQL Server.When you click Next, connection to the database engine is verified. If the connection test is successful, the next installer screen appears.
8. On the Email Security Database File Location screen, specify where Email Security database files should be located and then click Next.This screen appears only if you chose to install Email Security Log Server. A default location for the Log Database is automatically shown. It is a best practice to use the default location. If you want to create the Log Database in a different location (or if you already have a Log Database in a different location), enter the path to the database files. The path entered here is understood to refer to the machine on which the database engine is located. The path entered must specify a directory that already exists.If any Email Security components (e.g., TRITON - Email Security or another instance of Email Security Log Server) have already been installed in your deployment, the following message appears:
The Email Security database exists, do you want to remove it?This occurs because the database was created upon installation of the other Email Security components. Click No to continue using the existing database. In general, you should keep the database if you are sure the database was created only during the course of installing other components in your current deployment.Clicking Yes removes the database..
If any Email Security log data has been written to the database it will be lost if you remove the database. If you want to keep this data, back up the esglogdb76 and esglogdb76_n databases. See your SQL Server documentation for backup instructions.
If you remove the database, any currently quarantined email will no longer be accessible.
9. On the Installation Folder screen, specify the location to which you want to install Email Security Log Server and then click Next.
The full installation path must use only ASCII characters. Do not use extended ASCII or double-byte characters.To select a location different than the default, use the Browse button.Email Security Log Server will be installed in its own folder under the parent folder you specify here.
10. On the Pre-Installation Summary screen, review the components to be installed. If they are correct, click Install.
11. The Installing Websense Email Security screen appears, as components are being installed.
12.
Custom Deployment > Installing Email Security Components
|