Table of Contents You are at the beginning of the document Go to the next page

Table of Contents

Deployment and Installation Center
Planning your deployment
Installing your security solution
Upgrading your security solution
System requirements for this version
Preparing for installation
Obtaining Microsoft SQL Server
Installing the reporting database in a custom folder with SQL Server 2012 or later
Deployment Planning for Forcepoint Solutions
Forcepoint security solutions deployment overview
Deploying Web Protection Solutions
High-level deployment diagrams
Deploying core web protection components
Deploying Forcepoint Web Security Hybrid Module components
Understanding standalone and integrated modes for web protection solutions
Hardware recommendations for standalone Forcepoint URL Filtering deployments
Extending your deployment with additional web protection components
Additional reporting considerations
Required external resources for web protection solutions
Maximizing system performance for web protection solutions
Deploying transparent identification agents
Deployment guidelines for Network Agent
Locating Network Agent in a single-segment network
Locating Network Agent in a multiple-segment network
Network Agent on a gateway
Deploying Remote Filtering Server and Client
Web protection distributed deployments
Web protection basic distributed enterprise topology
Web protection for remote users or locations
Web protection distributed deployment models
Web protection distributed deployments and secure VPN connections
Content Gateway Deployment
Content Gateway deployment issues
Content Gateway explicit and transparent proxy deployments
Special Content Gateway deployment scenarios
Chaining Content Gateway with other proxies
Installing Forcepoint Web Security components to work with Content Gateway
Planning Forcepoint DLP Deployment
Deploying Email Protection Solutions
System requirements
Single-appliance Forcepoint Email Security deployments
Multiple-appliance Forcepoint Email Security deployments
Installing Forcepoint Security Solutions
Creating a Forcepoint management server
Installing the Web Security module of the Forcepoint Security Manager
Installing the Data Security module of the Security Manager
Installing the Email Security module of the Security Manager
Installing Web Protection Solutions
Installing via the Forcepoint Web Security or Forcepoint URL Filtering All option
Using the management server as policy source for filtering-only appliances
Installing Web Protection Components on Linux
Starting the Web Linux installer
Using the Policy Enforcement option to install web components on Linux
Installing Email Protection Solutions
Setting Up Forcepoint Appliances
Restoring to Factory Image
Installing Forcepoint DLP
Installing components via the Custom option
Starting a custom installation (Windows)
Installing Forcepoint Infrastructure
Installing web protection components
Policy Server Connection Screen
Policy Broker Connection Screen
Select Policy Broker Screen
Filtering Service Communication Screen
Multiple Network Interfaces Screen
Active Directory Screen
Computer Browser Screen
Integration Option Screen
Select Integration Screen
Network Card Selection Screen
Database Information Screen
Log Database Location Screen
Optimize Log Database Size Screen
Feedback Screen
Directory Service Access Screen
Remote Filtering Communication Screen
Remote Filtering Pass Phrase Screen
Filtering Service Information for Remote Filtering Screen
Turning on the Computer Browser service
Installing with SQL Server
Installing Forcepoint DLP components
Installing email protection components
Installing SQL Server Express (without Forcepoint Infrastructure)
Installing Forcepoint F1E Solutions
Integrating Forcepoint URL Filtering with Cisco
Deployment considerations for integration with Cisco products
Getting started with a Cisco integration
Configuring a Cisco Security Appliance
Cisco integration configuration procedure
User-based policies and Cisco integration
Configuring a Cisco IOS Router
Cisco IOS startup configuration
Cisco IOS configuration commands
Cisco IOS executable commands
Integrating Forcepoint URL Filtering with Citrix
Managing Internet requests from Citrix server users
Citrix Integration Service installation overview
Install Filtering Service and Network Agent to integrate with Citrix
Obtain the Citrix Integration Service configuration package
Configure the Citrix Integration Service installation package
Use the installation package to install Citrix Integration Service on a Citrix server
Upgrading the Citrix Integration Service
Configuring user access on Citrix servers
Initial Setup of Citrix integration
Integrating Forcepoint URL Filtering with TMG
Deployment considerations for integration with Forefront TMG
Installing Forcepoint URL Filtering to integrate with Forefront TMG
Upgrading Forcepoint URL Filtering when integrated with ISA Server or Forefront TMG
Removing the ISAPI Filter Plug-In
Converting to an integration with Forefront TMG
Forefront TMG initial setup
Enabling communication with the Log Database when integrated with Forefront TMG
Configuring for TMG using non-web-proxy clients
Configuring the ISAPI Filter plug-in to ignore specific traffic
User identification and authentication with Forefront TMG
Troubleshooting integration with Forefront TMG
Integrating Forcepoint URL Filtering using ICAP Service
Installing Forcepoint URL Filtering to integrate with ICAP Service
Configuring the proxy to communicate with ICAP Service
Configuring ICAP Service
Installing for Universal Integrations
Upgrading Multiple Forcepoint Solutions
Upgrade procedure for solutions that include web, email, and data protection
Upgrading the management server
Upgrading Web Protection Solutions
Web protection or web and data protection upgrade outline
Upgrading from web security version 8.1 or earlier
Before upgrading to v8.5.x web protection solutions
Preparing the Log Database for upgrade
Web protection upgrade order
Upgrading web or web and data protection solutions from v8.1.x or later
v8.5.x web protection software upgrade instructions (Windows)
v8.5.x Linux upgrade instructions for web protection products
Upgrading Content Gateway to v8.5.x
Upgrading Forcepoint Appliances to v8.5.x
Upgrading to Forcepoint DLP v8.9.x
Migrating web solutions to a new operating system
Order of migration and upgrade steps
Migrating web management components
Moving web policy components to a new machine
Updating the operating system on an existing web protection machine
Upgrading Email Protection Solutions
Upgrade preparation
Backup procedures
Recovery procedures
Upgrade instructions
Post-upgrade activities
Initial Configuration for All Security Modules
Initial configuration for web protection solutions
Additional configuration for the Web Security DLP Module
Forcepoint DLP initial configuration
Forcepoint Email Security initial configuration
Content Gateway initial configuration
Network Agent and stealth mode NICs
Adding, Modifying, or Removing Components
Adding or modifying Windows components
Modifying Forcepoint Infrastructure
Adding web protection components
Adding email protection components
Adding the Forcepoint Email Security manager or Email Log Server
Removing components
Removing Forcepoint Infrastructure
Removing web protection components
Removing Content Gateway
Removing Forcepoint DLP components
Removing email protection components
Deployment Quick Reference
Default ports for on-premises Forcepoint security solutions
Forcepoint DLP ports
Forcepoint Email Security ports
Excluding Forcepoint files from antivirus scans
Component Reference
Forcepoint management server
SQL Server Express
Content Gateway
Forcepoint DLP Cloud Applications
Protector
Mobile agent
Forcepoint DLP Endpoint
Integration agent
Crawler
The Email Security module
Email Log Server
Using the Forcepoint DLP Protector CLI
Accessing the CLI
Command-line reference
Configuring NTP support

Table of Contents You are at the beginning of the document Go to the next page
Copyright 2023 Forcepoint. All rights reserved.