Installation Guide: Forcepoint DLP
Installation Guide: Forcepoint DLP
Installation Guide: Forcepoint DLP
Forcepoint DLP
v8.4.x
©2017, Forcepoint
All rights reserved.
10900-A Stonelake Blvd, Quarry Oaks 1, Suite 350, Austin TX 78759
Published 2017
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. Raytheon is a registered trademark of Raytheon Company. All other
trademarks used in this document are the property of their respective owners.
This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or
machine-readable form without prior consent in writing from Forcepoint. Every effort has been made to ensure the accuracy of this
manual. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of
merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages
in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is
subject to change without notice.
Contents
Topic 1 Installing the Management Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Management server system requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Preparing for management server installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Install the management server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Topic 2 Installing Supplemental Forcepoint DLP Servers. . . . . . . . . . . . . . . . . . . . . . 17
Supplemental server system requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Supplemental server prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Supplemental server installation steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Step 1: Download and launch the installer . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Step 2: Configure the installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Step 3: Install and activate the new server software . . . . . . . . . . . . . . . . . . . . 21
Topic 3 Installing Forcepoint DLP Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Installing the analytics engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Before installing the analytics engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Analytics engine installation steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Launch the Analytics Setup Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Single-command analytics engine installation. . . . . . . . . . . . . . . . . . . . . . 25
Installing the mobile agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Mobile agent system requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Integration agent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
The crawler. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Troubleshooting Forcepoint DLP agent installation . . . . . . . . . . . . . . . . . . . . . . 38
Topic 4 Installing the Protector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Protector installation prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Installation steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
STEP 1: Accept license agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
STEP 2: Select the hardware to install and confirm hardware requirements . 43
STEP 3: Set administrator and root passwords . . . . . . . . . . . . . . . . . . . . . . . . 43
STEP 4: Set the NIC for management server and SSH connections . . . . . . . 44
STEP 5: Define the hostname and domain name . . . . . . . . . . . . . . . . . . . . . . 45
STEP 6: Define the domain name server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
STEP 7: Set the date, time and time zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
STEP 8: Register with a Forcepoint DLP Server . . . . . . . . . . . . . . . . . . . . . . 47
Final step: Verify the protector installation. . . . . . . . . . . . . . . . . . . . . . . . . . . 47
ii Forcepoint DLP
1 Installing the Management
Server
In this topic:
● Management server system requirements, page 2
● Preparing for management server installation, page 2
● Install the management server, page 5
The first step in installing Forcepoint DLP is to install the management server. The
management server hosts both the Forcepoint Security Manager (the graphical user
interface used to manage all Forcepoint on-premises security solutions) and core
Forcepoint DLP components.
● Installation must be complete on the management server before other Forcepoint
DLP components (secondary servers, protectors, and agents, for example) can be
installed.
● The management server serves as the primary Forcepoint DLP server.
There are 2 parts to installing Forcepoint DLP components on the management server:
1. Install the Forcepoint Management Infrastructure, page 7.
The management infrastructure includes the Forcepoint Security Manager and its
settings database.
2. Install Forcepoint DLP management components, page 12.
The Forcepoint DLP management server components include the policy engine,
crawler, fingerprint repository, forensics repository, and endpoint server.
Forcepoint DLP may be installed on hardware or virtual machines (VM). (Note that
the incident and reporting database is hosted on Microsoft SQL Server, which does
not typically run in a virtualized environment.)
After the management components have been installed, additional Forcepoint DLP
agents, servers, and crawlers may be installed to add functionality and for system
scaling. See Installing Supplemental Forcepoint DLP Servers, page 17, and Installing
Forcepoint DLP Agents, page 23, for more information.
Find system requirements for the Forcepoint management server in the Deployment &
Installation Center.
● For operating system, hardware, virtualization (VM), and database requirements,
see System requirements for this version.
● For port requirements, see Forcepoint DLP ports (the “Forcepoint management
server” section).
Before installing Forcepoint DLP, complete all of the preparatory steps in this section.
Windows considerations
1. Make sure all Microsoft updates have been applied. There should be no pending
updates, especially any requiring a restart of the system.
2. Make sure that the .NET Framework v3.5 and v4.5 are installed on the
management server. If the correct versions are not detected, the setup program
returns an error.
Domain considerations
● The servers running Forcepoint DLP software can be set as part of a domain or as
a separate workgroup. If there are multiple servers, or if the system will be
configured to run commands on file servers in response to discovery, it is best
practice to make the servers part of a domain.
Do not install Forcepoint DLP on a domain controller machine.
● Strict GPOs may interfere with Forcepoint DLP and affect system performance, or
even cause the system to halt. To avoid this issue, when adding Forcepoint DLP
servers to a domain, make them part of an organizational unit that does not
enforce strict GPOs.
● Certain real-time antivirus scanning can downgrade system efficiency. This
problem can be reduced by excluding some directories from that scanning (see
Antivirus, page 3). Please contact Forcepoint Technical Support for more
information on enhancing performance.
2 Forcepoint DLP
Installing the Management Server
Important
If you plan to install SQL Server 2008 R2 Express and will
use it to store and maintain Forcepoint Web Security data,
log on as a domain user to run the Forcepoint Security
Installer.
Synchronizing clocks
If you are distributing Forcepoint components across different machines in your
network, synchronize the clocks on all machines where a Forcepoint component is
installed. It is a good practice to point the machines to the same Network Time
Protocol server.
Note
If the deployment will include one or more Forcepoint
V Series appliances, synchronize the management server’s
system time to the appliance system time.
Antivirus
Disable any antivirus software on the machine prior to installing management server
components. Be sure to re-enable antivirus software after installation. Exclude the
following Forcepoint files and folders from antivirus scans to avoid performance
issues:
● The product installation folder, which, by default, is one of the following:
■ *:\Program Files\Websense
■ *:\Program Files (x86)\Websense
● *:\Program files\Microsoft SQL Server\*.*
● C:\Documents and Settings\<user>\Local Settings\Temp\*.*
● %WINDIR%\Temp\*.*
● The forensics repository (configurable; defaults to the Websense folder)
No underscores in FQDN
Do not install Forcepoint components on a machine whose fully-qualified domain
name (FQDN) contains an underscore. The use of an underscore character in an
FQDN is inconsistent with Internet Engineering Task Force (IETF) standards.
Note
Further details of this limitation can be found in the IETF
specifications RFC-952 and RFC-1123.
Third-party components
The following third-party components are required to install Microsoft SQL Server
2008 R2 Express. Although the Forcepoint Security Installer installs these
components automatically if they are not found, it is a best practice to install the
components before running the setup wizard if you plan to use SQL Server Express.
● .NET Framework 3.5 SP1
Because the installer requires .NET 4.5 as well, both .NET 4.5 and 3.5 SP1 are
required if you are installing SQL Server Express.
● Windows Installer 4.5
● Windows PowerShell 1.0 (available from www.microsoft.com)
Tip
To install the database in a custom folder, see these
instructions. Starting with Microsoft SQL Server 2012, the
database engine service must have access permissions for
the folder where database files are stored.
4 Forcepoint DLP
Installing the Management Server
Use the steps below to install Forcepoint DLP management server components.
Important
Use a dedicated account, and do not change the account
after installation. Installed services use this account (the
service account) when interacting with the operating
system. If the account must later be changed, contact
Forcepoint Technical Support first.
Tip
On exit, the installer offers the option to Keep installation
files. This greatly reduces the time needed to launch the
installer in the future (for example, to add components or
otherwise modify the installation).
To launch the installer from saved files, click Forcepoint
Security Setup on the Start screen, or in the Forcepoint
folder in the Start menu.
4. On the Subscription Agreement screen, select I accept this agreement and then
click Next.
6 Forcepoint DLP
Installing the Management Server
5. On the Installation Type screen, select Forcepoint Security Manager, then select
Forcepoint DLP.
Warning
The Email Gateway for Microsoft Office 365 is not
supported in version 8.4. On the next screen, do not select
the option to install management components for the
Forcepoint Email Azure appliance.
Important
The full installation path must use only ASCII characters.
Do not use extended ASCII or double-byte characters.
3. On the SQL Server screen, specify the location of the database engine.
■ Select Use existing SQL Server on this machine if the Forcepoint Security
Installer has already been used to install SQL Server 2008 R2 Express on this
machine.
■ Select Install SQL Server Express on this machine to install SQL Server
2008 R2 Express on this machine.
A default database instance named mssqlserver is created, by default. If a
database instance with the default name already exists on this machine, an
instance named TRITONSQL2K8R2X is created instead.
If a reboot is required after installing SQL Server Express, use the Forcepoint
Security Setup shortcut to relaunch the installer. The shortcut is found on the
Windows Start screen, or in the Forcepoint folder of the Start menu:
■ (Recommended) Select Use the SQL Server database installed on another
machine to specify the location and connection credentials for a database
server located elsewhere in the network.
Enter the Hostname or IP address of the SQL Server machine, including the
instance name, if any.
○ If you are using a named instance, the instance must already exist.
○ If you are using SQL Server clustering, enter the virtual IP address of the
cluster.
Also provide the Port used to connect to the database (1433, by default).
See Management server system requirements, page 2, to verify your version
of SQL Server is supported.
4. Specify an authentication method and account information for connecting to the
SQL Server database:
a. Select SQL Server Authentication to use a SQL Server account or Windows
Authentication to use a Windows trusted connection.
b. Enter the User Name or Account and its Password.
8 Forcepoint DLP
Installing the Management Server
Note
The system administrator account password cannot contain
single or double quotes.
c. Forcepoint DLP can use SSL to encrypt communication with the database. If
encryption is already configured within Microsoft SQL Server, select
Encrypt connection to enable SSL encryption.
For more information, see Administering Forcepoint Databases.
d. Click Next.
The installer verifies the connection to the database engine. If the connection test
is successful, the next installer screen appears.
If the test is unsuccessful, an “Unable to connect” message is displayed. Click OK
to dismiss the message, verify the connection information, and click Next to try
again.
5. On the Server & Credentials screen, provide the following information:
a. Select an IP address for this machine. If the machine has a single network
interface card (NIC), only one address is listed.
Administrators will use the selected IPv4 address to access the Security
Manager via a web browser. This is also the IP address that remote Forcepoint
components will use to connect to the management server.
b. Specify the Server or domain of the service account to be used by the
Forcepoint Management Infrastructure and Security Manager components.
The hostname cannot exceed 15 characters.
c. Specify the User name and Password for the service account.
d. Click Next.
6. On the Administrator Account screen, enter an email address and password for the
default Security Manager administrator account: admin. This account has full
access to all Security Manager features and functions for all products.
10 Forcepoint DLP
Installing the Management Server
7. On the Email Settings screen, configure the SMTP server to use for system
notifications, then click Next. SMTP settings can also be configured after
installation.
Important
SMTP server configuration must be completed before
password recovery email messages can be sent.
a. Enter the IP address or hostname of the SMTP server through which email
alerts should be sent. In most cases, the default Port (25) should be used.
b. Enter the Sender email address that will appear in notification email
messages.
c. Enter a descriptive Sender name to use in notification email messages. This
can help recipients identify that a message originates from the Security
Manager.
8. On the Pre-Installation Summary screen, verify the information, then click Next
to begin the installation.
Warning
If SQL Server Express is selected for installation, the
machine may be automatically restarted up to two times
during the installation process. Restarts are not required if
all prerequisites were previously installed.
Note
If SQL Server Express is selected for installation, it may
take a couple minutes for the next screen to appear. Wait
for the next screen, then see the next step below.
9. If you chose to install SQL Server Express, PowerShell 1.0 and Windows Installer
4.5 will be installed if not already present. Wait for Windows to configure
components.
a. If the following message appears during this process, click OK:
Setup could not restart the machine. Possible causes are insufficient
privileges, or an application rejected the restart. Please restart the
machine manually and setup will restart.
b. Forcepoint Security Installer starts again. In the Forcepoint Management
Infrastructure Setup Welcome screen, click Next.
c. The Ready to Resume... screen appears. Click Next.
Note
When you click Next, it may take a couple minutes for the
next screen to appear. Wait for the next screen, then
continue with the next step.
10. If SQL Server Express is selected for installation, SQL Server 2008 R2 Setup is
launched. Wait for it to complete.
The Setup Support Files screen appears and then an Installation Progress screen
appears. Wait for these screens to complete automatically. It is not necessary to
click or select anything in these screens.
Note that it may take approximately 10-15 minutes for the SQL Server 2008 R2
Express installation to complete.
11. The Installation screen appears. Wait until all files have been installed.
If the following message appears, determine whether port 9443 is in use on the
machine:
Error 1920. Server ‘Websense TRITON Central Access’ (EIPManagerProxy)
failed to start. Verify that you have sufficient privileges to start system
services.
If port 9443 is in use, release it and then click Retry to continue installation.
12. On the Installation Complete screen, click Finish.
The Installer Dashboard is displayed. After a few seconds, the Forcepoint DLP
component installer launches. Continue with the next section.
Note
If any prerequisites are missing, the Forcepoint DLP
installer attempts to install them.
12 Forcepoint DLP
Installing the Management Server
14 Forcepoint DLP
Installing the Management Server
8. When the Installation Complete screen appears, click Finish to close the
Forcepoint DLP installer.
Depending on whether or not other modules have been selected for installation, when
the Forcepoint DLP installer completes, either the next module installer or the Modify
Installation dashboard is displayed.
For information on installing other Forcepoint DLP components, such as the protector,
mobile agent, or endpoint client, see:
● Installing Supplemental Forcepoint DLP Servers, page 17
● Installing Forcepoint DLP Agents, page 23
● Installing the Protector, page 41
● Installing Web Content Gateway, page 49
● Installing the Cloud Agent, page 61
To later add, change, or remove components from a Forcepoint DLP machine, see
Adding, Modifying, or Removing Components, page 83.
16 Forcepoint DLP
2 Installing Supplemental
Forcepoint DLP Servers
In this topic:
● Supplemental server system requirements, page 18
● Supplemental server prerequisites, page 18
● Supplemental server installation steps, page 19
After Forcepoint DLP has been installed on the management server (as described in
Installing the Management Server, page 1), supplemental Forcepoint DLP servers can
be installed to distribute analysis load. .
Important
Before installing a supplemental server, make sure that the
Forcepoint Management Infrastructure and Forcepoint
DLP management components are already installed.
Do not install any Forcepoint DLP component on a
domain controller.
Medium to large organizations may require more than one Forcepoint DLP server to
perform content analysis efficiently. Having multiple Forcepoint DLP servers
improves performance and allows for custom load balancing, as well as providing for
organizational growth.
The following components are included on supplemental Forcepoint DLP servers:
● Policy engine
● Secondary fingerprint repository (the primary is on the management server)
● Endpoint server
● Optical Character Recognition (OCR) server
● Crawler
Notes:
In production environments, do not install a Forcepoint
DLP server on a Microsoft Exchange, Forefront TMG, or
print server. These systems require abundant resources.
Before installing a Forcepoint DLP server, ensure that all of the following
prerequisites are met:
1. For optimized performance, verify that the operating system is set to use a 4096
byte cluster size.
For more information, refer to the knowledge base article “File System
Performance Optimization” at support.forcepoint.com.
2. Set the installation partition to 1 NTFS Partition.
3. Configure Regional Settings to match the primary location (the location of the
management server). If necessary, add supplemental language support and adjust
the default language for non-Unicode programs.
4. Configure the network connection to have a static IP address.
5. Make sure that the server hostname does not include an underscore sign.
6. Enable Short Directory Names and Short File Names (see support.microsoft.com/
kb/121007).
7. Create a local administrator to be used as a service account.
If the deployment includes more than one Forcepoint DLP server, use a
domain account (preferred), or the use same local user name and password on
each machine. Do not change the service account.
8. Be sure to set the system time accurately on the server.
9. Exclude the following directories from antivirus scanning:
■ The folder where Forcepoint DLP was installed. For supplemental servers,
this is Program Files (x86)\Websense\, by default.
18 Forcepoint DLP
Installing Supplemental Forcepoint DLP Servers
Important
The full installation path must use only ASCII characters.
Do not use extended ASCII or double-byte characters.
Note
Regardless of what drive you specify, the machine must
have a minimum of 4 GB of free disk space on the
Windows partition for the Forcepoint Security Installer.
Important
Before completing the information on this screen, be sure
the prerequisites described in Supplemental server
prerequisites, page 18, have been met.
20 Forcepoint DLP
Installing Supplemental Forcepoint DLP Servers
Note
Select a user that has permission to access all folders and
Notes Storage Format (NSF) files of interest, otherwise
certain items may not be scanned.
22 Forcepoint DLP
3 Installing Forcepoint DLP
Agents
Forcepoint DLP agents enable the system to access the data necessary to analyze
specific types of traffic, or the traffic from specific servers. For example, the mobile
agent monitors email being synchronized to mobile devices.
Important
Before installing an agent, make sure that the Forcepoint
Management Infrastructure and Forcepoint DLP
management components are already installed.
Do not install any Forcepoint DLP component on a
domain controller.
Click the links below to learn more about each agent, including where to deploy it,
installation prerequisites, installation steps, special considerations, and best practices.
● The on-premises analytics engine is used to calculate the relative risk of user
activity, correlate it with similar activity, and assign it a risk score. (See Installing
the analytics engine, page 24.)
● The cloud agent included with Forcepoint DLP Cloud Applications provides
cloud activity content inspection for files uploaded into and stored within
enterprise cloud collaboration services, such as Microsoft Office 365. (See
Installing the Cloud Agent, page 61.)
● The on-premises mobile agent monitors and blocks data downloaded to mobile
devices that perform synchronization operations with the Exchange server. The
mobile agent can monitor and block data transmitted in email messages, calendar
events, and tasks. The mobile agent supports ActiveSync (wireless
communication protocol used to push resources, such as email, from applications
to mobile devices). (See Installing the mobile agent, page 26.)
● The on-premises crawler performs discovery and fingerprinting scans. The
crawler is installed automatically on the management server and other Forcepoint
DLP servers. To improve scanning performance in high transaction volume
environments, additional, standalone instances can be used. (See The crawler,
page 35.)
● Forcepoint DLP Endpoint client software resides on and monitors data activity
on endpoint machines. It also reports on data at rest. The endpoint agent can
monitor application operations such as cut, copy, paste, and print screen, and
block users from copying files, or even parts of files, to devices such as thumb
drives, CD/DVD burners, and Android phones. The endpoint agent can also
monitor or block print operations as well as outbound web posts and email
messages. (See Installing and Deploying Forcepoint DLP Endpoint Clients.)
Important
Forcepoint DLP agents and machines with a policy engine
(such as a Forcepoint DLP Server or Web Content
Gateway appliance) must have direct connection to the
management server. When deployed in a DMZ or behind a
firewall, the relevant ports must be allowed.
The analytics engine is used to calculate the risk of user activity, correlate it with other
risky activity to create a case, and assign the case a risk score. Risk scores appear in
the Forcepoint Security Manager in both the Incident Risk Ranking report and on the
dashboard.
This feature requires installing the analytics engine on a 64-bit Linux machine as
described in this section.
24 Forcepoint DLP
Installing Forcepoint DLP Agents
If the system is connected to a yum repository, use the following command to install
the packages:
yum install apr apr-util perl-Switch unixODBC freetds
The EPEL repository must be configured on the machine in order to install freetds.
The Forcepoint DLP components must already be installed and running on the
management server to install the analytics engine.
In the command above, the temporary directory (cd /tmp) and ntp server (ntpdate
time.nist.gov) can optionally be customized.
In this topic:
● Mobile agent system requirements, page 26
● Mobile agent installation steps, page 26
The mobile agent is a CentOS 7-based appliance used to secure the type of email
content that is synchronized to users’ mobile devices when they connect to the
network. This includes content in email messages, calendar events, and tasks.
Note
For best performance, make sure that the mobile agent is
located in close proximity to the back-end server.
26 Forcepoint DLP
Installing Forcepoint DLP Agents
You access the installation wizard for your mobile agent through a putty Command
Line Interface (CLI).
To install the mobile agent:
1. If the mobile agent will run on a Forcepoint DLP appliance, follow the
instructions on its quick start poster to rack, cable, and power on the appliance.
If the mobile agent will run on other hardware:
a. Use either a direct terminal or connect via serial port to access the command
line. For serial port connection, configure the terminal application as follows:
○ 19200 baud
○ 8 data bits
○ no parity
○ 1 stop bit
○ no flow control
b. The mobile agent software is provided on an ISO image. Download the
image, ProtectorMobile84x.iso, from the My Account > Downloads page at
support.forcepoint.com, and burn it to a CD or bootable USB.
c. Place the media in the machine’s CD drive or USB port and restart the
machine.
d. An installer page appears. Press Enter. The machine is automatically
restarted a second time.
2. When prompted, enter a user name and password. Enter root for user name and
admin for password.
3. To access the wizard, type wizard at the command prompt, then press Enter.
4. When prompted to install either the protector or mobile agent, enter M for mobile
agent.
5. Follow the instructions in the wizard to configure basic settings.
When the wizard requires data entry, it presents a prompt. In some cases, a default
setting is provided:
■ A capital letter indicates the default value, such as Yes/no.
■ Square brackets ([ ]) show the current value. They are usually followed by
text, such as: Press [Enter] to leave as is.
If the default setting is acceptable, press Enter to keep the default value.
Important
A valid password should be at least 7 characters in length.
It should contain at least 2 of the following classes:
● One digit
● One symbol
● One capital letter
● One lowercase letter
If you begin the password with a capital letter or end it
with a digit, these characters do not count as one of these
classes.
The Operating System (OS) prompts you to change (refresh) your password every 90
days.
Important
A valid password should be at least 7 characters in length.
It should contain at least 2 of the following classes:
● One digit
● One symbol
● One capital letter
● One lowercase letter
If you begin the password with a capital letter or end it
with a digit, these characters do not count as one of these
classes.
28 Forcepoint DLP
Installing Forcepoint DLP Agents
2. To configure a network interface, choose the NIC index number from the list of
displayed by the wizard.
c. If prompted, enter the IP address for the default gateway to be used to access
the network. This prompt appears only for the first NIC to be configured.
d. After configuring the NIC, the wizard offers the option to redefine it (change
the IP address, network prefix, or gateway) or remove it (type e, then d), if
necessary.
To return to the previous menu and define other NICs, type Enter.
4. Enter a NIC index number to configure another NIC (or reconfigure the same
NIC). Repeat as many times as needed.
After all interfaces have been configured, type Enter to finish setting up the NICs
and continue to the routing setup.
5. Select one of the following options:
■ Type Enter to accept the routing configuration.
■ Type an index number to modify or delete a routing entry index.
■ Type a to add a routing entry.
Note
If the IP address of the Forcepoint DLP server is not on the
same subnet as the one specified for the mobile
management NIC, a gateway is required to tell the mobile
agent how to communicate with the Forcepoint DLP
server.
6. After the routing configuration is complete, the wizard displays a prompt to store
the network configuration.
30 Forcepoint DLP
Installing Forcepoint DLP Agents
■ To store the network definitions, type Y. The network configuration details are
saved, and the network service is reloaded with the new parameters. The new
parameters (IP address, network prefix, and gateway) are displayed in the
wizard.
■ To start over without storing the network definitions, type n.
7. Type the index number of the management NIC, or type c to define the network
parameters.
This NIC can be used for other purposes, such as SSH connections, access points
for mobile devices, and Exchange communications.
2. Type the name to use for the default security certificate in the Subject field.
This can be used to secure the connections between mobile devices and the mobile
agent using the default certificate. The default certificate is a self-signed
certificate automatically generated by Forcepoint.
Important
Type the IP address of the DNS server if the back-end
Exchange server is identified by its hostname in the
Forcepoint Security Manager instead of by its IP address.
32 Forcepoint DLP
Installing Forcepoint DLP Agents
2. Enter the user name and password for a Forcepoint DLP administrator that has
privileges to manage system modules.
3. Type Enter to exit the wizard. A message displays stating that the configuration
was successful.
Integration agent
In this topic:
● Installing the integration agent, page 33
● Registering the integration agent, page 34
● Using the Forcepoint DLP API, page 34
The integration agent allows third-party products to send data to Forcepoint DLP for
analysis.
34 Forcepoint DLP
Installing Forcepoint DLP Agents
For documentation on the Forcepoint DLP API, consult with a Forcepoint Sales
representative.
The crawler
In this topic:
● Crawler system requirements, page 35
● Special considerations for IBM Notes and Domino, page 35
● Installing the crawler agent, page 36
The crawler is the name of the discovery and fingerprinting agent. It is selected by
default when you install the management server or supplemental Forcepoint DLP
servers.
Multiple crawlers may be deployed. During creating of a discovery or fingerprinting
task, administrators select which crawler should perform the scan. Forcepoint
recommends using the crawler that is located closest to the data you are scanning.
To view crawler status in the Security Manager, go to the Settings > Deployment >
System Modules page, select the crawler, and click Edit.
Important
The crawler used for Domino fingerprinting and discovery
must be on the same machine as Notes.
Be sure that the installation is done for “Anyone who uses this computer.”
2. Log on to Notes and supply a user.id file and password.
3. Connect to the Domino server from the Notes client with the user account that will
be used to install the crawler.
For best practice, do not run Notes on this machine again after the crawler is
installed.
Important
The full installation path must use only ASCII characters.
Do not use extended ASCII or double-byte characters.
Note
Regardless of what drive you specify, you must have a
minimum of 0.5 GB of free disk space on the C: drive.
8. On the Select Components screen, select Crawler agent and then Entire feature
will be installed on local hard drive. If this is a stand-alone installation, deselect
all other options, including Forcepoint DLP Server.
9. In the Server Access screen, select the IP address to identify this machine to other
Forcepoint components.
The following message may appear:
Forcepoint Data Discovery Agent works with a specific version of WinPcap.
The installation has detected that your WinPcap version is <version>
In order to proceed with this installation, WinPcap version 4.0.0.1040 needs
to be installed and will replace yours.
Click Yes to proceed or Click No to preserve your WinPcap version and
deselect the Discovery Agent Feature to continue with the installation.
“Discovery Agent” refers to the crawler agent. The particular version of WinPcap
mentioned in this message must be in place to install Crawler Agent. Note that
36 Forcepoint DLP
Installing Forcepoint DLP Agents
after installation of the crawler agent you can install a different version of
WinPcap. The crawler agent should continue to work properly.
10. In the Register with the Forcepoint DLP Server screen specify the path and log
on credentials for the Forcepoint DLP server to which this agent will connect.
This could be the management server or a secondary Forcepoint DLP server.
FQDN is the fully-qualified domain name of a machine.
11. In the Local Administrator screen, enter a user name and password as instructed
on-screen. The server/host name portion of the user name cannot exceed 15
characters.
12. If you installed a Lotus Notes client on this machine so you can perform
fingerprinting and discovery on a Lotus Domino server, the Lotus Domino
Connections screen appears.
If you plan to perform fingerprinting or discovery on your Domino server,
complete the information on this page.
Important
Before you complete the information on this screen, make
sure that you:
● Create at least one user account with administrator
privileges for the Domino environment. (Read
permissions are not sufficient.)
● Be sure that the Lotus Notes installation is done for
“Anyone who uses this computer.”
● Connect to the Lotus Domino server from the Lotus
Notes client.
a. On the Lotus Domino Connections page, select the check box labeled Use
this machine to scan Lotus Domino servers.
b. In the User ID file field, browse to one of the authorized administrator users,
then navigate to the user’s user.id file.
Note
Select a user that has permission to access all folders and
Notes Storage Format (NSF) files of interest, otherwise
certain items may not be scanned.
c. In the Password field, enter the password for the authorized administrator
user.
13. In the Installation Confirmation screen, if all the information entered is correct,
click the Install button to begin installation.
Installation may seem to take a long time. Unless a specific error or failure
message appears, allow the installer to proceed.
If the following message appears, click Yes to continue the installation:
In this topic:
● Initial registration fails, page 38
● Deploy settings fails, page 39
● Subscription errors, page 39
38 Forcepoint DLP
Installing Forcepoint DLP Agents
● Make sure no duplicate certificates are installed on the agents’ servers; if there are
duplications, delete all of them and re-register the agent. Also, make sure the
system date/time of the agent machine and the management server are the same.
The following certificates are expected:
Certificate > My User Account > Trusted Root Certification Authorities >
Certificates > ws-ilp-ca
Certificates > Computer > Personal Certificates ><servername> (issued by
ws-ilp-ca)
Certificates > Computer > Trusted Root Certification Asuthorities >
Certificates > ws-ilp-ca
● Make sure the FQDN value of the agent states the full server name for the agent’s
server.
■ For the protector, if a domain name is configured, the FQDN is:
protectorname.domain.name
■ For agents and Forcepoint DLP server, copy the computer name value from
“My Computer” > Properties.
Subscription errors
● Restart the “Websense Data Security Manager” service on the management server.
● Check %dss_home%/tomcat/logs/dlp/dlp-all.log.
40 Forcepoint DLP
4 Installing the Protector
Installation steps
42 Forcepoint DLP
Installing the Protector
2. Type in and confirm a new Root Password (mandatory). The root account
provides full access to the device and should be used carefully.
44 Forcepoint DLP
Installing the Protector
6. Enter the IP address of the default gateway to be used to access the network. If the
IP address of the Forcepoint DLP server is not on the same subnet as the protector,
a default gateway is required to tell the protector how to communicate with the
Forcepoint DLP server.
2. Optionally, enter the domain name of the network into which the protector was
added. The domain name set here will be used by the Forcepoint DLP server when
defining the protector’s parameters.
46 Forcepoint DLP
Installing the Protector
To begin monitoring the network for sensitive information loss, configure the
protector in the Data Security module of the Forcepoint Security Manager, on the
Settings > Deployment > System Modules page.
The basic steps are:
1. Select the protector instance.
2. Define the channels for the protector to monitor.
3. Supply additional configuration parameters needed by the Forcepoint DLP server
to define policies for unauthorized traffic.
4. Click Deploy.
After making configuration changes, make sure the protector does not have the status
Disabled or Pending. (The status is displayed on the System Modules page.)
For detailed configuration information, see Configuring the Protector in the
Forcepoint DLP Administrator Help.
48 Forcepoint DLP
5 Installing Web Content
Gateway
The Web Content Gateway is included with Forcepoint DLP Network. It provides
DLP policy enforcement for the web channel, including decryption of SSL traffic,
user authentication, and content inspection using the DLP policy engine.
This core Forcepoint DLP component permits the use of custom policies,
fingerprinting, and more. It is available as Linux software that does not require
Forcepoint Web Security.
Content Gateway is also included in Forcepoint Web Security. In this mode, Content
Gateway also offers URL categorization, content security, web policy enforcement,
and more.
This document describes how to install the core Web Content Gateway component for
Forcepoint DLP. For instructions on setting up Forcepoint Web Security, see the
Forcepoint Web Security Installation Guide.
Note that Web Content Gateway is inactive until registered with a management server.
Content Gateway supports Red Hat Linux 6 series, 64-bit, Basic Server and the
corresponding CentOS version.
Special steps must be taken to install and configure such versions to work with
Content Gateway v8.4.x.
Warning
Content Gateway is supported on Red Hat Enterprise
Linux 6, Basic Server (no GUI) and is not supported on
RHEL 6 with a GUI.
biosdevname
Red Hat Enterprise Linux 6, update 1 introduced biosdevname, which is not
supported by Content Gateway.
2. When the installer starts, press [TAB] and alter the boot line to add
biosdevname=0 as follows:
50 Forcepoint DLP
Installing Web Content Gateway
■ If only “eth#” and “lo” names are present, you are done. No other actions are
required.
■ If there are names like “emb#” or “p#p#,” continue with step 2.
2. Log in as root.
3. Navigate to the network-scripts directory:
cd /etc/sysconfig/network-scripts
4. Rename all “ifcfg-<ifname>” files except “ifcfg-lo” so that the names take the
following format:
ifcfg-eth#
a. Start by renaming “ifcfg-em1” to ifcfg-eth0, then continue with the rest of the
“ifcfg-em#” files.
b. After renaming the “ifcfg-em#” files, rename the “ifcfg-p#p#” files.
If there are multiple “ifcfg-p#p1” interfaces, rename all of them in the order of
the lowest “ifcfg-p#” first. For example, suppose the initial set of interfaces
presented by “ifconfig -a” is:
em1 em2 em3 em4 p1p1 p1p2 p2p1 p2p2
In this case, rename the interfaces as follows:
em1 -> eth0
em2 -> eth1
em3 -> eth2
em4 -> eth3
52 Forcepoint DLP
Installing Web Content Gateway
Note
This procedure is necessary only if you want to use a disk
already mounted to a file system as a cache disk for
Content Gateway. Perform this procedure before installing
Content Gateway.
Warning
Do not use an LVM (Logical Volume Manager) volume as
a cache disk.
Warning
The Content Gateway installer will irretrievably clear the
contents of cache disks.
a. Enter the following command to examine which file systems are mounted on
the disk you want to use for the proxy cache:
df -k
b. Open the file /etc/fstab and comment out or delete the file system entries for
the disk.
c. Save and close the file.
d. Enter the following command for each file system you want to unmount:
umount <file_system>
When the Content Gateway installer prompts you for a cache disk, select the
raw disk you created.
Note
It is possible to add cache disks after Content Gateway is
installed. For instructions, see the Content Gateway
Manager Help.
54 Forcepoint DLP
Installing Web Content Gateway
■ For a list of default ports, see the Web tab of the Forcepoint Ports
spreadsheet. They must be open to support the full set of Web Content
Gateway features.
Note
If you customized any ports that Forcepoint software uses
for communication, replace the default port with the
custom port you implemented.
■ If your server is running the Linux IPTables firewall, you must configure the
rules in a way that enables Content Gateway to operate effectively. See
IPTables for Content Gateway.
8. Content Gateway can be used as an explicit or transparent proxy. For setup
considerations for each option, see the Content Gateway explicit and transparent
proxy deployments.
Important
If SELinux is enabled, set it to permissive or disable it
before installing Content Gateway. Do not install or run
Content Gateway with SELinux enabled.
Note
Up to the configuration summary, it is possible to quit the
installer by pressing Ctrl-C. After that point, to abandon
the installation, first allow the installation to complete,
then uninstall Content Gateway.
The configuration summary gives the option to change the
answer to any installer prompt. It is not necessary to quit
the installer and restart to change a setting.
3. If the server does not meet the minimum hardware requirements, is missing
required operating system packages, or has conflicting processes running, error or
warning messages appear.
■ If system packages are missing, the message looks like this:
Error: Forcepoint Content Gateway v8.4.x on x86_64
requires several packages that are not present on your
system.
Please install the following packages: <list of packages>
If you are connected to a yum repository you can install
these packages with the following command:
yum install <list of packages>
Install the missing packages and restart the Content Gateway installer.
■ System resource warnings give the option to continue the installation:
Warning: Forcepoint Content Gateway requires at least 6
gigabytes of RAM.
Do you wish to continue [y/n]?
○ Enter n to end the installation and return to the system prompt.
○ Enter y to continue the installation. Performance may be affected if
Content Gateway is installed on a system with insufficient resources.
■ If the NetworkManager or avahi-daemon process is running, an error like the
following is displayed:
Error: The avahi-daemon service is enabled on this system
and must be disabled before Forcepoint Content Gateway
v8.4.x can be installed.
Please disable the avahi-daemon service with the
following commands and restart the Forcepoint Content
Gateway installation.
chkconfig --levels 2345 avahi-daemon off
service avahi-daemon stop
56 Forcepoint DLP
Installing Web Content Gateway
To continue, stop the conflicting processes, then restart the installer. For
example:
chkconfig --levels 2345 avahi-daemon off
service avahi-daemon stop
4. Read the subscription agreement. At the prompt, enter y to continue installation or
n to cancel installation.
Do you accept the above agreement [y/n]? y
Important
The password cannot contain the following characters:
■ space
■ $ (dollar symbol)
■ : (colon)
■ ‘ (backtick; typically shares a key with tilde, ~)
■ \ (backslash)
■ “ (double-quote)
Note
As you type a password, it may seem that nothing is
happening—the cursor will not move nor will masked
characters be shown—but the characters are being
accepted. After typing a password, press Enter. Then
repeat to confirm it.
2. Enter an email address where Content Gateway can send alarm messages:
Forcepoint Content Gateway requires an email address for
alarm notification.
Enter an email address using @ notation: [] >
Note
Cache disks may also be added after Content Gateway has
been installed. For instructions, see the Content Gateway
Manager Help.
58 Forcepoint DLP
Installing Web Content Gateway
a. Select available disks from the list. Selected disks become dedicated cache
disks and cannot be used for any other purpose. Cache disks must be raw.
Aggregate disk cache size should not exceed 147 GB.
Warning
Although it might be listed as available, do not use an
LVM (Logical Volume Manager) volume as a cache disk.
Important
After choosing to proceed, do not attempt to quit the
installer by pressing Ctrl-C. Allow the installation to
complete. Then uninstall it.
60 Forcepoint DLP
6 Installing the Cloud Agent
In this topic:
● Cloud agent system requirements, page 61
● Supported cloud services, page 61
● Preparing Box for use with the cloud agent, page 62
● Preparing One Drive for use with the cloud agent, page 66
● Cloud agent installation steps, page 80
Forcepoint DLP Cloud Applications includes a cloud agent that provides cloud
activity content inspection for files uploaded into and stored within cloud enterprise
services, including Microsoft OneDrive for Business and Box. By applying
established DLP policies to data stored in enterprise cloud applications, the agent is
able to audit and prevent the storage of sensitive data that could expose organizations
to data loss and compliance infringements.
The cloud agent can be installed in a private data center (on-premises) or in the
Microsoft Azure cloud with management components on-premises.
The system can support multiple cloud agents, each running on a different cloud
service.
● For operating system requirements, see System requirements for this version.
● For port requirements, see Forcepoint DLP ports (the “Cloud agent” section).
● Make sure that the Docker containerization system (instructions below) is at v1.12
or later.
The cloud agent can be deployed through the Azure cloud or installed on-premises.
Because the services it interacts with are hosted in the cloud, deploy the agent in the
cloud for best performance.
Important
Logging in with Admin credentials is required. Only the
admin account has permissions to manipulate data for the
entire enterprise.
2. On the Create A New Box App page, select Custom App, then click Next.
62 Forcepoint DLP
Installing the Cloud Agent
5. A confirmation message displays to say that the app has been created. Click View
Your App.
7. Copy the Client ID and Client Secret. They will be needed in future steps.
8. Fill in OAuth 2.0 Redirect URI with the following:
https://<manager_IP/host>:9443/dlp/pages/cloudService/
cloudServiceCompletedAuthClientWindow.jsp
Replace <manager_IP/host> with the IP address or hostname of the Forcepoint
Security Manager.
The URL is used to connect to the Forcepoint Security Manager, which must
therefore be reachable from the Internet.
Note
The on-premises cloud agent must be reachable from the
Internet on port 8080. This may require a DNS update, in
addition to a firewall rule for NAT.
64 Forcepoint DLP
Installing the Cloud Agent
9. In the API Key field, enter the app’s Client ID (saved from the procedure above).
Note
The instructions in this section show the classic Azure
portal. Administrators can use the matching configuration
options in the new Azure portal.
66 Forcepoint DLP
Installing the Cloud Agent
Note
The on-premises cloud agent must be reachable from the
Internet on port 8080. This may require a DNS update, in
addition to a firewall rule for NAT.
5. Click Configure. The properties for the new application are shown.
68 Forcepoint DLP
Installing the Cloud Agent
6. Scroll down to view the Keys section. Select a key duration (1 year or 2 years).
7. Under Permissions to other applications, click Add application.
8. One by one, add the Office 365 services for which your app requires permissions:
■ Office 365 Management APIs
■ Office 365 SharePoint Online
Windows Azure Active Directory is already chosen.
To locate a service, select All Apps under Show, and search for the first letter of
its name. Select the service name when it appears, then click the check mark.
70 Forcepoint DLP
Installing the Cloud Agent
Azure deployments
1. In the Azure Portal, click Virtual Machines in the left navigation pane, and then
click New > Compute > Virtual Machine > From Gallery.
Note that controlling the VM and doing root activities remotely require activating
a remote logon as root user. Your HelpDesk can assist with this.
4. On page 3, under Virtual machine configuration:
a. Select Create a new cloud service (recommended), or select an existing
cloud service.
b. Enter a Cloud Service DNS Name. This name will be published on the Web.
It is not part of the organization’s local DNS.
c. Select an Azure Subscription type.
d. Under Storage Account, select Use an automatically generated storage
account.
e. Under Availability Set, select None.
f. Modify the ports as shown below: SSH, TCP, 22, 22.
72 Forcepoint DLP
Installing the Cloud Agent
Note that the Region/Virtual Network and Virtual Network Subnets field show
values inherited from VPN set up. These do not need to be changed.
5. Click the check mark in the lower right corner of page 4 to build the VM.
Continue with Preparing the CentOS environment, page 73.
74 Forcepoint DLP
Installing the Cloud Agent
3. Enter a name for the virtual network you are creating, choose a location, then click
the right arrow.
Location refers to the physical location (region) where you want your resources
(VMs) to reside. Choose the location closest to you. It will be used for all the other
components such as the storage space and the VM.
4. Optionally, enter a DNS server name and IP address, then select Configure a
point-to-site VPN and click the right arrow.
If DNS will not be used, leave the DNS Servers section blank.
6. Specify the address range to use for the virtual network. The VM created in Azure
will be allocated an IP address from this VPN’s range.
Click Add Gateway Subnet to create a subnet for the gateway (required).
76 Forcepoint DLP
Installing the Cloud Agent
For best practice use a 29-bit subnet mask. This ensures that your IP address pool
has 6 addresses and helps ensure a speedy recovery in case of disconnection.
Click the check mark when done.
Note
None of the virtual IP addresses should be on same subnet
as the on-premises management server. Keeping them on
separate subnets prevents problems with the automatic
VPN connection script that will be used later in this
procedure.
7. Select the network that was just created from the list, then click Create Gateway
to create the gateway. This can take 15-30 minutes.
8. Create security certificates to authenticate VPN clients. For instructions, see this
Microsoft article. To complete the process:
a. Generate a self-signed root certificate.
b. Upload the root certificate file to the Azure Portal.
c. Generate a client certificate.
d. Export and install the client certificate on the Forcepoint management server.
9. Download the 64-bit client VPN package to the management server and install it.
78 Forcepoint DLP
Installing the Cloud Agent
10. Open the VPN client software and click Connect to connect the client to the
virtual network.
11. On the VPN client machine, open a command prompt and use the ipconfig
command to find the IP address assigned to the machine.
12. Connect the management server to the Azure VPN network as follows:
a. On the management server, download the VPN connection script,
p2s_vpn_connect.ps1, from the My Account > Downloads page at
support.forcepoint.com.
b. Open the script in a text editor.
c. Edit the following parameters with the values used in the pre-deploy.ps1
script. This is the script that was edited when building the virtual network in
Azure.
The default values are:
○ $vpnName - ForcepointVNet (virtual network name)
○ $vpnNet - 192.168.0.0 (VPN network IP, server side)
○ $vpnNetmask - 255.255.0.0 (VPN subnet mask, server side)
○ $vpnClientIP - 172.16.1.1 (VPN client’s IP address)
Make sure each entry is on a separate line, and place quotation marks around
the entries, as shown below:
<parameter> = "<value>"
For example:
#Name of virtual network
###########################################
$vpnName = "ForcepointVNet"
$vpnNetmask = "255.255.255.0"
Important
If the management server is restarted for any reason, this
script must be run again. As a best practice, add the script
to the Windows Task Scheduler so that it runs on startup.
For instructions, see this knowledge base article.
g. If the system is using a remote database, copy the script onto the database
machine and run it there as well.
Continue with Cloud agent installation steps, page 80.
80 Forcepoint DLP
Installing the Cloud Agent
82 Forcepoint DLP
7 Adding, Modifying, or
Removing Components
In this topic:
● Adding or modifying Forcepoint DLP components, page 83
● Recreating Forcepoint DLP certificates, page 83
● Repairing Forcepoint DLP components, page 84
● Changing the Forcepoint DLP service account, page 85
The Modify menu includes an option to re-certify the server. This is not recommended
except in extreme security breaches. When security certificates are recreated:
● All agents and servers must re-register (see Re-registering Forcepoint DLP
components for instructions).
● All agents and servers must repeat the Reestablish Connection process.
● All endpoint clients must be reinstalled. This requires the following steps:
1. Uninstall the existing endpoint software.
2. Create a new endpoint package (the existing package cannot be reused).
3. Use SMS or a similar mechanism to install the new package on the endpoints.
See Installing and Deploying Endpoint Clients for more information on
uninstalling endpoints.
When it first authenticates, the management server trades certificates with the other
servers and endpoints in the network.
To re-run the security communication between Forcepoint DLP components:
1. Start the Forcepoint Security Installer:
■ If extracted installation files were saved, select Forcepoint Security Setup
from the Windows Start screen or the Forcepoint folder in the Start menu.
■ If the shortcut does not exist, double-click the installer executable.
2. In Modify Installation dashboard, click the Modify link for Forcepoint DLP.
3. In the installation wizard, select Modify.
4. On the Recreate Certificate Authority screen, select Recreate Certificate
Authority.
5. Complete the installation wizard as prompted.
84 Forcepoint DLP
Adding, Modifying, or Removing Components
The Forcepoint DLP service account user name cannot be changed. Doing so can
cause the system to behave in unexpected ways. For example, services may not be
able to start and encryption keys may not work.
To change the password for the service account:
1. Modify the service account password from the domain’s Active Directory or use
Windows. From Windows:
a. Log onto the management server with the service user account.
b. Press Ctrl +Alt +Delete to access the Windows lock screen, then select
Change Password.
2. Modify the Forcepoint Management Infrastructure.
a. Log on to the management server with the service user account.
b. Run Forcepoint Security Installer (Forcepoint84Setup.exe).
c. Select Modify.
d. During Forcepoint Management Infrastructure setup, change the password on
the following screen. These are the credentials that the management server
uses when running services or logging on to other machines. The password
must:
○ Be at least 8 characters
○ Contain upper case characters
○ Contain lower case characters
○ Contain numbers
○ Contain non-alphanumeric characters
Warning
Forcepoint Email Security requires Forcepoint DLP to be
installed. If you are using Forcepoint Email Security, do
not uninstall Forcepoint DLP or Forcepoint Email Security
will quit working.
Do not uninstall the Forcepoint Management Infrastructure
before removing Forcepoint DLP.
Important
This removes all Forcepoint DLP components from this
machine.
86 Forcepoint DLP