When the protector is deployed in public cloud and is provided as a self-extractor package, it can be installed on supported systems.
You can install the package on any CentOS 7.6 or CentOS 7.9, or on RHEL 7.5, RHEL 7.6, RHEL 7.7, RHEL 7.8, RHEL 7.9, or RHEL 8 based system.
Steps
-
Download Forcepoint DLP Protector software package, from the Downloads page in My Account in Forcepoint Customer Hub.
-
Log on as root user to run this installer.
- Verify that the installation file has executable permissions. If not, run:
sudo chmod +x <installation file>
-
In Command Prompt, run the following command:
sudo ./<installation file> <version>-<build>
-
Accept the license agreement.
Read the license agreement. At the prompt, select y to continue, n to exit installation.
Do you accept the license agreement [y/n]? y
-
Installation begins after file extraction is complete.
-
Register with a Forcepoint DLP server.
In this step, a secure channel will be created connecting the protector to a Forcepoint DLP Server. This can be either the management server or a supplemental server.
-
Enter the IP address or FQDN of the Forcepoint DLP Server.
Note: This must be the IP address identified when you installed the server machine. It cannot be a secondary IP address.
-
Enter the user name and password for a Forcepoint DLP administrator
that has privileges to manage system modules.
-
Verify the protector installation.
In the Data Security module of the Security Manager, verify that the protector status is no longer pending and that the icon displays its active status.
-
Refresh the browser, and then click Deploy.