Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Release Notes for TRITON® Mobile Security : Setting up Mobile Security
Setting up Mobile Security
Topic 40021 / Updated: 1-Aug-2012
Follow these steps to set up TRITON Mobile Security in your organization:
1.
2.
3.
4.
5.
6.
Acquire logon credentials for the Cloud Security portal, if needed
TRITON Mobile Security is administered through the Cloud Security portal, the same portal used for Cloud Web Security and Cloud Email Security. If you don't have logon credentials for this portal—for example, if you are a Web Security Gateway Anywhere customer—you must request credentials through Websense Technical Support. See this knowledgebase article for the details you'll require when making the request.
Generate and upload an Apple Push Notification (APN) certificate
To install mobile security profiles on devices, your organization must request an Apple Push Notification (APN) certificate from Apple and upload it to the Mobile Security System.
In TRITON - Mobile Security, select General > Push Notification Certificate, and then click Create and Upload Certificate.
Click Help for instructions.
Synchronize your user directory information
Cloud Security and Web Security Gateway Anywhere allow you to make use of existing LDAP directories, such as Active Directory, so you don't have to recreate user accounts and groups for your mobile services or manage users and groups in two places.
Although Cloud Security is a cloud-based service, it synchronizes with LDAP directories via a client-resident application known as the Directory Synchronization Client.
If you are not already a Cloud Security customer, you must install a new instance of the Directory Synchronization Client and synchronize your directory entries. For step-by-step instructions, see the Directory Synchronization Client Administrator's Guide.
Configure how Web Security Gateway Anywhere synchronizes user directory data with the hybrid service on the Settings > Hybrid Configuration > Shared User Data page in TRITON - Web Security.
Select specific contexts from the Active Directory global catalogs already configured for on-premises filtering. Only directory entries in the specified contexts are sent to the hybrid service. See "Configure Directory Agent settings for hybrid filtering" in the TRITON - Web Security Help for details.
Define your Web security policies
Web traffic on mobile devices is governed by Web security policies configured in the Web Security tab of the Cloud Security portal, or on the Policy Management > Policies page in TRITON - Web Security.
 
Note 
For more information on Web policy configuration in the Cloud Security portal, see "Defining Web Policies" in the TRITON Cloud Security Help.
For more information about policy configuration in TRITON - Web Security, see "Working with policies" in the TRITON - Web Security Help.
Customize mobile user policies and device profiles
Policies govern end users' device usage. A policy is made up of 2 device profiles (personal and corporate) where you can configure security requirements, allowed device and application functions, and Wi-Fi and email settings.
TRITON Mobile Security includes a predefined policy template that can be customized to meet your needs. To view or edit the policy template settings and profiles, click the policy name on the General > Policies page.
For best practice, apply only security filters to your profiles. If you apply all Web policies to devices, many apps will be blocked. For example, if your Web Security policy applies productivity filters (such as Shopping), the Amazon and eBay apps won't work on users mobile devices.
By default, only security filters are applied to personal profiles, but all Web policies are applied to corporate profiles. To change the setting:
1.
Click a policy name on the General > Policies page.
2.
3.
Scroll to the Restrictions > Traffic and Filtering section.
4.
Deselect Apply all Web policies.
You can also create your own custom policies. To do so, select General > Policies, and then click Add.
Click Help on either of these pages for instructions.
Register mobile devices
To be protected from Web threats and managed by TRITON Mobile Security, mobile devices must first be registered with the system.
Select General > Devices > Register New Device to get started. Here you select users and email them an invitation to register.
Users click a button in the email message and then follow a registration wizard to complete the process.
Note that some users may be unable to receive the message on their mobile device—for example, if they don't have Microsoft Exchange configured on the device.
For these cases, you can customize the email invitation that you send. For example, you can instruct users to open the message in Webmail or forward it to their personal accounts, and then open the message on the device they want to register. Refer to this knowledgebase article for more information.
Javascript must be enabled on users' i-devices to go through the registration process.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Release Notes for TRITON® Mobile Security : Setting up Mobile Security
Copyright 2016 Forcepoint LLC. All rights reserved.