Forcepoint Security Solutions Installation Guide

Installation Guide

Forcepoint Web Security Forcepoint DLP

Forcepoint Email Security

v8.4.x

?2017, Forcepoint All rights reserved. 10900-A Stonelake Blvd, Quarry Oaks 1, Suite 350, Austin TX 78759 Published 2017 Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. Raytheon is a registered trademark of Raytheon Company. All other trademarks used in this document are the property of their respective owners. This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine-readable form without prior consent in writing from Forcepoint. Every effort has been made to ensure the accuracy of this manual. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.

Contents

Chapter 1 Chapter 2

Chapter 3

Preparing for Forcepoint Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Installation overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Installing Forcepoint Management Components . . . . . . . . . . . . . . . . . . . . . . . 5

Installing the Forcepoint Web Security policy source . . . . . . . . . . . . . . . . . . . . . . 5 Creating the Management Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

Step 1: Download the Forcepoint Security Installer . . . . . . . . . . . . . . . . . . . . . 6 Step 2: Select management components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Step 3: Install the Forcepoint Management Infrastructure . . . . . . . . . . . . . . . . 8 Step 4: Install Web management components . . . . . . . . . . . . . . . . . . . . . . . . 11

Policy Server Connection screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Policy Broker Connection screen. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Select Policy Broker Screen. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Filtering Service Communication screen. . . . . . . . . . . . . . . . . . . . . . . . . . 13 Completing the installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Step 5: Install Data management components . . . . . . . . . . . . . . . . . . . . . . . . 14 Step 6: Install Email management components . . . . . . . . . . . . . . . . . . . . . . . 17

Installing Additional Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

Installing web components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Install Web Log Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Installation steps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Install an instance of Filtering Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Using a filtering-only appliance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Installing Filtering Service on Windows . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Installing Filtering Service on Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Install Content Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Installing other web components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

Installing data components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Installing supplemental Forcepoint DLP servers . . . . . . . . . . . . . . . . . . . . . . 28 Installing Forcepoint DLP agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

Install Email Log Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

Installation Guide i

Contents ii Forcepoint Security Solutions

1

Preparing for Forcepoint Deployment

A full Forcepoint deployment includes Forcepoint Web Security with optional Hybrid Module, Forcepoint DLP Network, Forcepoint DLP Endpoint, and Forcepoint Email Security with optional Hybrid Module.

Forcepoint Security Manager, the management interface for Web, Email, and Data products, resides on a Windows server.

Forcepoint Web Security may be deployed on Forcepoint appliances, dedicated Windows or Linux servers, or a combination of platforms. This guide covers the following configuration:

The policy source (the standalone or primary Policy Broker and central Policy Server) reside separate from the management server, on another Windows or Linux server, or on a Forcepoint appliance.

While this is not required and Policy Broker and Policy Server can reside on the management server machine, this configuration is recommended for full Forcepoint deployments to ensure optimum performance.

Web Log Server resides separate from the management server on a Windows machine.

Forcepoint DLP runs on Windows servers, optional protector appliances, and elsewhere in the network.

Forcepoint Email Security enforcement components reside only on Forcepoint appliances. Management and reporting components reside on Windows servers.

Installation Guide 1

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download