Installing the Protector
Protector installations include all of the following:
- A policy engine
 - ICAP client (for integration with third-party solutions that support ICAP, such as some web proxies)
 - Secondary fingerprint repository (the primary is on the management server)
 
There are 3 basic steps to installing the Forcepoint DLP protector(refer to the below topics for information regarding theses steps):
- Make sure all prerequisites are met. See Protector installation prerequisites.
 - Perform the installation. See Before you begin:(topic under "Protector installation prerequisites").
 - Configure the protector in the Data Security module of the Security Manager. See Final step: Verify the protector installation.