Deployment and Installation Center
Websense TRITON Enterprise v7.6.x

Go to the table of contents Go to the previous page Go to the next page Go to the index
Integrating Data Security with Existing Infrastructure > Working with IBM Lotus Domino and Lotus Notes

Starting with v7.6.3, you can fingerprint and perform discovery on documents stored in an IBM Lotus Domino Data Management System (DMS). Data Security supports IBM Lotus Domino and IBM Lotus Notes (Basic and Standard Editions) v7.x and 8.x on Windows Server 2003 or Windows Server 2008R2.
Domino environments normally consist of one or more servers working together with data stored in Notes Storage Format (NSF) files. There are usually many NSFs on any given Domino server. Each entry in the NSF may have a title, one or more body fields, and attachments. For example:
1.
Install Lotus Notes on the machine where you will install the Data Security crawler. This can be the machine where you plan to install the Data Security server software; or it can be a stand-alone machine where you plan to install the crawler agent.
Important 
The crawler you will use for Domino fingerprinting and discovery must be on the same machine as Lotus Notes.
3.
Connect to the Lotus Domino server from the Lotus Notes client. This should be done by the user who will be installing the crawler. For best practice, do not run Lotus Notes on this machine again after the crawler is installed.
1.
Run the Data Security installation wizard on a machine with the Lotus Notes client. For best practice, do not run the Lotus Notes client on the machine on which the Data Security crawler is installed.
a.
Select the check box labeled Use this machine to scan Lotus Domino servers.
b.
In the User ID file field, browse to one of the authorized users, then navigate to the user's user.id file.
Note 
Select a user that has permission to access all folders and Notes Storage Format (NSF) files of interest, otherwise certain items may not be scanned.
c.
In the Password field, enter the password for the authorized user.
Note 
If you need to update the User ID and Password fields, run the installation wizard and select Modify.
Lotus Domino discovery treats a document (body and attachments) as one unit. This way, a breach is reported even if the sensitive content is scattered in different parts of the document that individually would not cause an incident.
a.
Navigate to Main > Policy Management > Discovery Policies.
b.
Select Locate regulatory & compliance data or Create custom policy.
c.
Complete the steps in the wizard as described in the TRITON - Data Security Help. You can choose dictionary, RegEx, fingerprinting, or other classifiers as needed.
a.
Navigate to Main > Policy Management > Discovery Policies.
b.
Select Add network task > Lotus Domino Task.
3.
To deploy the policy and task to the Lotus Domino server, click Deploy. The Domino server will be crawled for your sensitive data at the next scheduled time. Incidents are reported under Main > Reporting > Discovery.
Lotus Domino fingerprinting treats the body of a document and each of its attachments as a separate item. This enables the system to show the full path down to the item inside a document that caused a breach.
a.
Navigate to Main > Policy Management > Content Classifiers > File Fingerprinting.
b.
Select New > Lotus Domino Fingerprinting.
a.
Navigate to Main > Policy Management > DLP Policies.
b.
Select Create custom policy.
c.
Complete the steps in the wizard as described in the TRITON - Data Security Help. Be sure to select the fingerprinting classifier on the Condition page.
3.
To deploy the policy and classifier to the Lotus Domino server, click Deploy. The data on your Domino server will be fingerprinted at the next scheduled time. Incidents are reported under Main > Reporting > Data Loss Prevention.


Go to the table of contents Go to the previous page Go to the next page Go to the index
Integrating Data Security with Existing Infrastructure > Working with IBM Lotus Domino and Lotus Notes