Websense Administrationv1 0
Websense Administrationv1 0
Sudhanshu Pathak
Technical Specialist-Security Management
Agenda
Deployment Scenario
Deployment Scenario
Deployment Scenario
Websense Web Filter and Web Security may either be installed as a standalone solution, or be integrated with a thirdparty proxy, cache, or firewall product (for example, Check Point Firewall-1 NGX, Cisco ASA, or Microsoft Forefront
TMG).
In a standalone deployment, Websense Network Agent monitors Internet activity from all users and forwards both
HTTP(S) requests and requests made via other protocols to Websense Filtering Service to determine whether to
permit or block the request.
In an integrated deployment, the third-party product (integration product) forwards HTTP(S) requests, and
sometimes also FTP requests, to Websense Filtering Service to determine whether to permit or block the request.
Hardware requirement
Generate a policy backup file. From the Websense bin directory, run:
From the Websense bin directory, open the config.xml file and search for the word "token" including the quotes. You should see
something like:
NOTE: Your WebsenseAdministrator password will be used on the destination server where this token is used.
From the Websense bin directory, back up the existing policy database:
Windows: PgSetup --save 7x.backup_policy_db
Linux: ./PgSetup --save 7x.backup_policy_db
Move the policy.wsdb file (created on the source server) into the Websense bin directory on the destination server.
From the Websense bin directory, restore the policy database by running:
Windows: PgSetup --restore policy.wsdb
Linux: ./PgSetup --restore policy.wsdb
If you are migrating your policy database to a later Websense version, then from the Websense bin directory, run the following additional command:
Delete or rename the following two files from the Websense bin directory:
Config.xml.bak
journal.dat
From the Websense bin directory, open the config.xml file and search for the word "token" including the quotes.
Replace the token value (the long string of numbers) with the saved token from the source
Reporting
Today and History reports introduces the Today and History pages. The Today page presents a system health
summary along with charts of your organization's Internet activity during the previous 24 hours. The History
page gives a longer-term view, showing Internet activity over the previous 30 days.
Presentation Reports shows you how to generate predefined reports and copy those reports to apply
customized data selection filters, as well as how to set up a scheduled report job.
Investigative Reports shows you how to view log data interactively, identifying a topic of interest and drilling
down to find greater detail. You will also learn how to generate and schedule a detailed report.
Improving Websense software explains how to implement the features that enable you to help improve
filtering by allowing Websense software to submit relevant information to Websense, Inc.
Troubleshooting
TestlogServer
TestLogServer is a command-line utility that displays log traffic sent from Websense Filtering Service to Websense Log Server
The TestLogServer utility listens on port 55805, which is the same port used by Websense Log Server. If you start TestLogServer utility on the same machine with
Log Server, while Log Server service is running, then you will receive a Could not bind to port 55805
Steps :-
1.
2.
3.
Press Ctrl+C to stop TestLogServe, Review the logfile.txt in the Websense bin directory.
TestLogServer is one of several diagnostic utilities included as part of your Websense installation, and can be used to diagnose the following issues.
WebsensePing
A command-line utility called WebsensePing is included as part of your Websense software installation.
1.
Go to below path
WebsensePing
3. Determine the filtering category for a specific URL
Windows: websenseping -m 2 -url <URL>
Linux/Solaris: ./WebsenseTools -p -m 2 -url <URL>
TestlogServer
5. Display user count and time/status of last database download
Windows: websenseping -m 6 -duc
Linux/Solaris: ./WebsenseTools -p -m 6 duc
The machine on which the Websense software is installed does not have enough memory to load the Master Database.
Packet filtering is enabled and not permitting the Master Database to be downloaded.
Authentication for Websense software is not properly configured for the firewall or proxy server.
The firewall settings restrict the Internet access time or file size, preventing the download.
An appliance or application, such as a virus scanner, size-limiting application, or intrusion detection system, is not
permitting the download.
PDF Attached
Thank You
Sudhanshu Pathak
Technical Specialist-Security Management
Day-2
Deployment Scenario
With an explicit proxy deployment, client software, typically a Web browser, is configured to send a request for
Internet content directly to Content Gateway.
In a transparent proxy deployment, a client request for Web content is intercepted (usually by a router) and sent to
the proxy. The client is unaware that it is communicating with a proxy
Content Gateway can be configured for transparent user authentication -- with Integrated Windows Authentication
(IWA) or Legacy NTLM -- in which users are not prompted for credentials.
Content Gateway can be configured for prompted (or manual) authentication, in which users are required to enter a
username and password to obtain network access.
Websense Content Gateway supports the following user authentication methods:
When you use Content Gateway with HTTPS (SSL Manager) enabled, HTTPS data can be decrypted, inspected, and then
re-encrypted as it travels from the client to the origin server and back.
Enabling this feature also means that traffic from the server to the client can be inspected for Web 2.0 and
uncategorized sites
In explicit proxy deployments, a PAC file can be used to list the traffic that is allowed to bypass proxy
inspection.
In transparent proxy deployments, the proxy must be installed in a way that allows static Note HTTPS
content inspection can also affect system hardware resources like processing capacity and memory
requirements.
When you use Content Gateway with HTTPS (SSL Manager) enabled, HTTPS data can be decrypted, inspected, and then
re-encrypted as it travels from the client to the origin server and back.
Enabling this feature also means that traffic from the server to the client can be inspected for Web 2.0 and
uncategorized sites
In explicit proxy deployments, a PAC file can be used to list the traffic that is allowed to bypass proxy
inspection.
In transparent proxy deployments, the proxy must be installed in a way that allows static Note HTTPS
content inspection can also affect system hardware resources like processing capacity and memory
requirements.
If you are installing Websense Content Gateway (Content Gateway) as part of a software-based
deployment of Websense Web Security Gateway or Web Security Gateway Anywhere, you must
install the Web filtering components prior to installing Content Gateway.
On the Integration Option Screen, be sure to select Integrated with another application or device.
The IP addresses or addresses of Policy Server and Filtering Service. You will need them when
installing Content Gateway.
mkdir wcg_v77
mv <installer tar archive> wcg_v77
3. Change to the directory you created in Step 2.
cd wcg_v77
4. Unpack the tar archive:
tar -xvzf <installer tar archive>
If you are installing Websense Content Gateway (Content Gateway) as part of a software-based
deployment of Websense Web Security Gateway or Web Security Gateway Anywhere, you must
install the Web filtering components prior to installing Content Gateway.
On the Integration Option Screen, be sure to select Integrated with another application or device.
The IP addresses or addresses of Policy Server and Filtering Service. You will need them when
installing Content Gateway.
Introduction to DLP
Data Security is a comprehensive data loss prevention (DLP) system that discovers, monitors, and protects
your critical information holdings, whether that data is stored on your servers, currently in use or located in offnetwork endpoints. Data Security protects against data loss by quickly analyzing data and enforcing
customized policies automatically, whether users are on the network or offline. Administrators manage who
can send what information, where, and how. Data Security can also work as a part of Websense TRITON
Enterprise to protect the whole of your enterprise.
The basic components of Websense Data Security are:
The Data Security Management Server, which resides on the TRITON management server, is
the core of the system, providing complete data loss prevention analysis to the network. In
addition, the Data Security Management Server gathers and stores all management statistics.
The Data Security Management Server performs discovery (performed by Crawler) and
provides advanced analysis capabilities.
The protector sits in the network, intercepts and analyzes traffic, and can either monitor or
block traffic as needed. The protector supports analysis of SMTP, HTTP, FTP, Generic Text and
IM traffic (chat and file transfer).
Websense Data Security agents are also an integral part of the system. These agents are
installed on the relevant servers (the ISA agent on the Microsoft ISA server, printer agent on the
print server, etc.) to enable Data Security to access the data necessary to analyze the traffic
from these servers.
Data Endpoint, enable administrators to analyze content within a user's working environment
(PC, laptop, etc.) and block or monitor policy breaches.
The Data Security Management Server, which resides on the TRITON management server, is
the core of the system, providing complete data loss prevention analysis to the network. In
addition, the Data Security Management Server gathers and stores all management statistics.
The Data Security Management Server performs discovery (performed by Crawler) and
provides advanced analysis capabilities.
The protector sits in the network, intercepts and analyzes traffic, and can either monitor or
block traffic as needed. The protector supports analysis of SMTP, HTTP, FTP, Generic Text and
IM traffic (chat and file transfer).
Websense Data Security agents are also an integral part of the system. These agents are
installed on the relevant servers (the ISA agent on the Microsoft ISA server, printer agent on the
print server, etc.) to enable Data Security to access the data necessary to analyze the traffic
from these servers.
Data Endpoint, enable administrators to analyze content within a user's working environment
(PC, laptop, etc.) and block or monitor policy breaches.
Deployment
A basic deployment might have just one management server and one protector. The protector
includes several agents, including SMTP, HTTP, FTP, IM, and ICAP. The servers are easily
configurable to simply monitor or monitor and protect sensitive data.
Deployment
Deployment Scenarios
Deployment Scenarios
Installation
For best practice, before installing Websense Data Security, We should obtain and install Microsoft
SQL Server
Data Security installation involves 3 basic steps.
1.
Installing TRITON Unified Security Center :- This includes the TRITON infrastructure and
TRITON Console.
2.
Installing TRITON - Data Security.:- This includes the Data Security Management Servera
policy engine, crawler, fingerprint repository, and when applicable, an SMTP agent, and
endpoint server.
3.
Installing Data Security components :- If desired, you can install one or more optional
components for monitoring things like print servers, ISA/TMG servers, endpoint machines.
Websense Data Security supports installations over Virtual Machines (VM), but Microsoft SQL
Server must be present to support the incident and policy database..
Websense Data Security is an integral piece of your network architecture, and can be
combined with your existing systems to ensure seamless Web and email protection.
A policy engine
SMTP agent (Windows Server 2003 installations only)
Secondary fingerprint repository (the primary is on the management server)
Endpoint server
Optical Character Recognition (OCR) server
Crawler
Installing Data Security agents
With the exception of the protector, mobile agent, and Data Endpoint, Data Security
agents are installed using the Custom option of the standard Websense installer.
DLP Agent
DLP Agents
SMTP Agent
It receives all outbound email from the mail server and forwards it to a Websense Data Security
Policy Engine. The SMTP agent then receives the analyzed email back from the policy engine.
Depending on the analysis, SMTP agent blocks the email or forwards it to the mail gateway.
When installed on the Data Security Management server or supplemental Data Security server,
the SMTP agent uses the local policy engine of those servers to analyze email, unless load
balancing has been configured, in which case it uses the specified policy engine. The SMTP
agent supports permit, block, and encrypt actions.
SMTP Agent
To use the SMTP agent, we need to configure your corporate email server to route email to it.
When the agent is installed on a Data Security server, the SMTP traffic is analyzed by the local policy
engine. When it is installed as a stand-alone agent, email messages that are sent to the agent are
sent to a Data Security server for analysis
We can configure Websense Data Security to block or quarantine flagged messages.
If an SMTP email transaction was blocked or quarantined, the administrator responsible for handling
this incident can release this incident to those recipients
originally blocked from receiving the content.
The crawler
The crawler is the name of the discovery and fingerprinting agent. It is selected by default when we
install the Data Security Management Server or supplemental Data
Security servers.
we can deploy additional crawlers in network if we desire. When you set up a fingerprint task, we
indicate which crawler should perform the scan.
Websense recommends that to use the crawler that is located closest to the data you are scanning.
You can view the status of your crawlers in the TRITON - Data Security user interface. Go to Settings
> Deployment > System Modules, select the crawler and
click Edit
Troubleshooting
Troubleshooting
Refer page :- 391
Thank You
Sudhanshu Pathak
Technical Specialist-Security Management