Installing the Protector
Protector installations include all of the following:
- A policy engine
- ICAP client (for integration with third-party solutions that support ICAP, such as some web proxies)
- Secondary fingerprint repository (the primary is on the management server)
There are 3 basic steps to installing the Forcepoint DLP protector(refer to the below topics for information regarding theses steps):
- Make sure all prerequisites are met. See Protector installation prerequisites.
- Perform the installation. See Before you begin:(topic under "Protector installation prerequisites").
- Configure the protector in the Data Security module of the Security Manager. See Final step: Verify the protector installation.