Go to the table of contents Go to the previous page Go to the next page
Installing TRITON - Data Security
Deployment and Installation Center | Data Security Solutions | Version 7.7.x
Follow these instructions to install Data Security management components on the TRITON management server. This includes:
Once the Websense Data Security Installer is launched, the Welcome screen appears, click Next to begin Data Security installation.
In the Select Components screen, click Next to accept the default selections.
If there is insufficient RAM on this machine for Data Security Management Server components, a message appears. Click OK to dismiss the message. You are allowed to proceed with the installation. However, it is a best practice to install only if you have sufficient RAM.
If prompted, click OK to indicate that services such as ASP.NET and SMTP will be enabled.
Required Windows components will be installed. You may need access to the operating system installation disc or image.
On the Fingerprinting Database screen, accept the default location or use the Browse button to specify a different location.
Note that you can install the Fingerprinting database to a local path only.
Use the options on the Import Data From Previous Version screen to restore data from a backup of another Data Security Server if necessary.
Select the Load data from previous version check box and then use the Browse button to specify the location of the backup data you want restored.
For more information about backups, see the TRITON - Data Security Help.
Archiving lets you manage the size of your incident database and optimize performance. Backup lets you safeguard your policies, forensics, configuration, data, fingerprints, encryption keys, and more.
If you do not plan to archive incidents or perform system backup and restore, you do not need to fill out this screen.
Before proceeding, create a folder in a location that both the database and TRITON management server can access. (The folder must exist before you click Next.) On average, this folder will hold 10 GB of data, so choose a location that can accommodate this.
On the Temporary Folder Location screen, complete the fields as follows:
Enable incident archiving and system backup: Check this box if you plan to archive old or aging incidents and perform system backup or restore. This box does not appear when you run the installer in Modify mode and perform a disaster recovery restore operation.
From SQL Server: Enter the path that the SQL Server should use to access the temporary folder. For best practice, it should be a remote UNC path, but local and shared network paths are supported. For example: c:\folder or \\\folder. Make sure the account used to run SQL has write access to this folder.
From TRITON Management Server: Enter the UNC path the management server should use to access the temporary folder. For example: \\\folder. Enter a user name and password for a user who is authorized to access this location.
To grant this permission, issue the following T-SQL commands on the SQL Server instance:
USE master
After installation of Data Security components, you can revoke this permission:
USE master
In the Installation Confirmation screen, click Install to begin installation of Data Security components.
If the following message appears, click Yes to continue the installation:
Data Security needs port 80 free.
In order to proceed with this installation, DSS will free up this port.
Click Yes to proceed OR click No to preserve your settings.
Clicking No cancels the installation.
A similar message for port 443 may appear. Click Yes to continue or No to cancel the installation.
The Installation progress screen appears. Wait for the installation to complete.
When the Installation Complete screen appears, click Finish to close the Data Security installer.
Otherwise, you are returned to the Installer Dashboard and the next component installer is launched.
For information on installing other Data Security components, such as the protector, mobile agent, printer agent, SMTP agent, TMG agent, or endpoint client, see Installing Data Security Components.

Go to the table of contents Go to the previous page Go to the next page
Copyright 2016 Forcepoint LLC. All rights reserved.