When the protector is deployed in public cloud and is provided as a self-extractor package that can be installed on any CentOS 7.6 or CentOS 7.9, or on RHEL 7.5, RHEL 7.6, RHEL 7.7,
RHEL 7.8, or RHEL 7.9 based system, use the following steps to install it:
Steps
Download Forcepoint DLP Protector software package, from My Account > Downloads page at support.forcepoint.com.
Log on as root user to run this installer.
Verify that the installation file has executable permissions. If not, run:
sudo chmod +x <installation file>
In a Command Prompt, run the following command:
sudo ./<installation file> <version>-<build>
Accept the license agreement.
Read the license agreement. At the prompt, select y to continue, n to exit installation.
Do you accept the license agreement [y/n]? y
Installation begins after file extraction is complete.
Register with a Forcepoint DLP server.
In this step, a secure channel will be created connecting the protector to a Forcepoint DLP Server. This can be either the management server or a supplemental server.
Enter the IP address or FQDN of the Forcepoint DLP Server. Note that
this must be the IP address identified when you installed the server
machine. It cannot be a secondary IP address.
Enter the user name and password for a Forcepoint DLP administrator
that has privileges to manage system modules.
Verify the protector installation.
In the Data Security module of the Security Manager, verify that the protector status is no longer pending and that the icon displays its active status. Refresh the browser.