Installing the Protector

Protector installations include all of the following:

  • A policy engine
  • ICAP client (for integration with third-party solutions that support ICAP, such as some web proxies)
  • Secondary fingerprint repository (the primary is on the management server)

There are 3 basic steps to installing the Forcepoint DLP protector(refer to the below topics for information regarding theses steps):

  1. Make sure all prerequisites are met. See Protector installation prerequisites.
  2. Perform the installation. See Before you begin:(topic under "Protector installation prerequisites").
  3. Configure the protector in the Data Security module of the Security Manager. See Final step: Verify the protector installation.