Go to the table of contents Go to the previous page Go to the next page
System requirements
Deployment and Installation Center | Email Protection Solutions | v8.4.x
To view complete hardware, software, and web browser requirements for Forcepoint Email Security, see System requirements for this version.
Every Forcepoint Email Security deployment includes the following components at a minimum:
In the DMZ
*
Email traffic volume in your network may determine which type of appliance you use and how many appliances your deployment needs.
In the internal LAN
*
*
*
*
*
 
Note 
The network DMZ contains the devices that have direct contact with the Internet. This zone is a buffer between the Internet and the internal LAN. In our examples, the appliance and any router, switch, or load balancer adjacent to the firewall are located in the DMZ.
Forcepoint appliances
The Forcepoint V Series, X Series, and Virtual Appliances provide the majority of email protection functions. Incoming email flows from the Forcepoint Email Security Hybrid Module (if purchased and enabled) to the Forcepoint appliance and to the mail server. The Forcepoint appliance also provides the Personal Email Manager and Secure Messaging end-user facilities.
Forcepoint Email Security can occupy individual blade servers on an X Series appliance. The X Series chassis may include a combination of Email Security and Web Security blade servers.
Forcepoint management server
The Forcepoint management server hosts the Forcepoint Security Manager. This machine includes Forcepoint Management Infrastructure and any installed Forcepoint management modules. In a Forcepoint Email Security deployment, the Forcepoint management server includes both the Email Security and Data Security modules.
Email Log Server
The Forcepoint management server often includes the Email Log Server component, although this component can also be installed on a separate machine. The Log Server passes message data to the SQL Server reporting database (Email Log Database) for use in generating dashboard charts and reports, messages, and Message Log data.
During installation, a user configures certain aspects of Log Server operation, including how Log Server interacts with the Email Security module. These settings can be changed when needed via the Email Log Server Configuration utility. Other details about Log Server operation are configured in this utility as well. The utility is installed on the same machine as Log Server.
Email Log Database (Microsoft SQL Server)
Microsoft SQL Server handles the system and message log database and stores some Email Security module configuration settings. SQL Server may be installed on the Forcepoint management server or on a dedicated server. For optimal performance, Forcepoint recommends that a full SQL Server (2008, 2008 R2, 2012, 2014, or 2016) be installed on a separate machine. (SQL Server Express, which can be installed as part of the Forcepoint Security Manager installation, is recommended only for evaluation purposes.) For information about database systems in Forcepoint products, see Administering Forcepoint Databases.
Personal Email Manager
The email appliance is the portal for Personal Email Manager end users who are authorized to manage their own blocked mail. Personal Email Manager end-user options are configured in the Security Manager Email Security module interface (Settings > Personal Email). A Personal Email Manager administrator can determine:
*
*
*
*
*
Secure Messaging portal
The email appliance also provides the Secure Messaging end-user portal to allow an organization to maintain a secure area for its customers to view and manage messages that contain sensitive data. Customers can view received messages and reply to or forward a received message in this portal.

Go to the table of contents Go to the previous page Go to the next page
Copyright 2017 Forcepoint. All rights reserved.