Endpoint Deploy&install
Endpoint Deploy&install
v 8.4. x
©2017 Forcepoint
All rights reserved.
10900-A Stonelake Blvd, Quarry Oaks 1, Suite 350, Austin, TX 78759, USA
Published 2017
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. Raytheon is a registered trademark of Raytheon Company. All other
trademarks used in this document are the property of their respective owners.
This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or
machine-readable form without prior consent in writing from Forcepoint. Every effort has been made to ensure the accuracy of this
manual. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of
merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages
in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is
subject to change without notice.
Contents
Chapter 1 Introducing Forcepoint Endpoint Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Forcepoint Web Security Endpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
When to use Forcepoint Web Security Direct Connect Endpoint instead of
Forcepoint Web Security Proxy Connect Endpoint. . . . . . . . . . . . . . . . . . . 3
Forcepoint DLP Endpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Hardware requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Operating system requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Virtual Desktop Infrastructure (VDI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Browser support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Forcepoint Web Security Endpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Forcepoint DLP Endpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
DLP channel support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Email clients. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Printer drivers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Application controls. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Supported removable media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
LAN control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Destination channels by operating system . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Chapter 2 Obtaining or Creating the Installation Package . . . . . . . . . . . . . . . . . . . . . . . 11
Downloading installation packages from the
Forcepoint Security Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
On-premises Forcepoint Security Manager (hybrid deployments) . . . . . . . . . 12
Forcepoint Security Portal (cloud deployments). . . . . . . . . . . . . . . . . . . . . . . 12
Creating installation packages from a package builder . . . . . . . . . . . . . . . . . . . . 12
Forcepoint DLP Endpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Forcepoint Web Security Direct Connect Endpoint . . . . . . . . . . . . . . . . . 20
Forcepoint Web Security Proxy Connect Endpoint. . . . . . . . . . . . . . . . . . 21
Remote filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Global settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Chapter 3 Deploying endpoint software in your enterprise . . . . . . . . . . . . . . . . . . . . . . . 27
Before you begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Disabling automatic updates for Forcepoint Web Security Endpoint . . . . 28
Enabling automatic updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Deploying Windows endpoints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Manual deployment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Stand-alone Forcepoint DLP Endpoint packages . . . . . . . . . . . . . . . . . . . 30
Forcepoint Web Security Endpoint packages downloaded from the Force-
point Security Manager or Forcepoint Security Portal . . . . . . . . . . . . . . . 30
ii Forcepoint Endpoint
Introducing Forcepoint Endpoint
Solutions
© 2017 Forcepoint 1
Introducing Forcepoint Endpoint Solutions
Related materials
● Server installation - Forcepoint endpoint solutions rely on other Forcepoint
products for server-side functions. If you have not already done so, you must
install these products before beginning an on-premises Forcepoint Endpoint
installation.
■ Installing Forcepoint DLP (for Forcepoint DLP Endpoint)
■ Installing Forcepoint Web Security (for hybrid Forcepoint Web Security
Endpoint deployment)
○ No installation is required for cloud Forcepoint Web Security Endpoint
deployment
■ Installing Forcepoint URL Filtering (for Remote Filtering deployment)
● Endpoint configuration - Once the Forcepoint Endpoint software is deployed to
your client machines, you configure it in the Forcepoint Security Manager.
■ Forcepoint Web Security Manager Help (for hybrid Forcepoint Web Security
Endpoint deployment)
■ Forcepoint DLP Manager Help (for Forcepoint DLP Endpoint)
■ Forcepoint Security Portal Help (for cloud Forcepoint Web Security
Endpoint deployment)
● Client software usage - If the software is not installed in stealth mode, users can
interact with the user interface.
■ End User Guide for Forcepoint Endpoint Solutions
The Forcepoint Web Security Direct Connect Endpoint extends roaming user
protection to use cases where a proxy-based approach can be problematic. In general,
you should consider using Forcepoint Web Security Direct Connect Endpoint if the
following applies to your organization:
● Geo-localized content: Localized content is critical; for example, your Marketing
organization translates content into many languages.
● Unmanaged/third-party/complex networks: You have complex networks and
changing network connections; for example, you have a remote workforce
traveling and operating on client sites.
● Geographic firewalls: A geographical firewall prevents proxy use; for example,
due to a national firewall or local network security system.
● Frequently changing network conditions: Frequent switching between different
network connections; for example using a mix of mobile, wifi and on-prem
networks.
● Proxy unfriendly websites: You use a significant number of websites that do not
work well with proxy technology and would otherwise require proxy bypass.
● Proxy unfriendly applications: You have non-browser and/or custom applications
that require bypasses due to conflicts with proxy technology.
Forcepoint Web Security Direct Connect Endpoint and Forcepoint Web Security
Proxy Connect Endpoint can both be used in the same customer deployment; however,
only one type can be installed on an individual client machine.
Important
Although Forcepoint Web Security Direct Connect
Endpoint can provide improved security coverage as
outlined in the use cases above, please check that the
networking requirements and level of feature support are
acceptable in your intended deployment.
System requirements
Hardware requirements
Windows
Windows clients must meet the following minimal hardware requirements.
● Pentium 4 (1.8 GHz or above)
● At least 850 MB free hard disk space (250 MB for installation, 600 MB for
operation)
● At least 1 GB RAM on Windows Vista, Windows 7, Windows 8, Windows Server
2008, Windows Server 2012
Mac
Mac clients must meet the following minimal requirements.
● At least 1 GB RAM
● At least 500 MB free hard disk space (375 MB for installation, 125 MB for
operation)
Note
Only Forcepoint DLP Endpoint is supported in VDI
environments. Forcepoint Web Security Endpoint is not
supported in VDI environments.
Browser support
Forcepoint Web Security Endpoint
For a list of web browsers that fully support the Forcepoint Web Security Endpoint
client on both 32-bit and 64-bit operating systems, see the Forcepoint Certified
Product Matrix.
Full support means that the browser supports all installation methods, and both policy
enforcement and proxy manipulation. In addition to enforcing browser traffic,
Forcepoint Web Security Endpoint also enforces other Internet-enabled applications.
Email clients
Forcepoint DLP analyzes all email messages sent from endpoint users, even if they
send them to external Web mail services such as Yahoo.
For Windows, Forcepoint DLP can analyze endpoint email generated by Microsoft
Outlook and IBM Notes. (Note that rules are not enforced on Notes messages if Notes
is configured to send mail directly to the Internet, rather than through the Domino
server.)
The system supports the desktop version of Outlook 2010, 2013, and 2016, but not the
Windows 8 touch version. Forcepoint DLP supports IBM Notes versions 8.5.1, 8.5.2
FP4, 8.5.3, and 9.
For Mac clients, Forcepoint DLP can analyze endpoint email generated by Outlook
2011, Outlook 2016, and Apple Mail.
Forcepoint DLP can detect incidents in S/MIME encrypted messages sent from
Outlook 2013 (Windows), Outlook 2016 (Windows), and Outlook 2016 (Mac).
Printer drivers
You can monitor data being sent from an endpoint machine to a local or network
printer. Forcepoint DLP supports drivers that print to a physical device, not those that
print to file or PDF.
Application controls
You can monitor or prevent sensitive data from being copied and pasted from an
application such as Microsoft Word or a Web browser. This is desirable, because
endpoint clients are often disconnected from the corporate network and can pose a
security risk.
Forcepoint DLP can monitor copy and paste operations on most browsers, such as
Edge, Firefox, Safari, and Opera.
It can also control access to files. For example, you can monitor uploads to cloud
storage clients like DropBox and also IM / VOIP clients like GoToMeeting or Skype
for Business.
The applications that Forcepoint DLP can monitor out of the box are found in the
Technical Library article, Applications Monitored in the Endpoint Application
channel for Forcepoint DLP Endpoint. You can also add custom applications.
Important
Removable media encryption is only available on
Windows and Linux endpoint machines.
Encryption is not supported on Mac endpoint machines.
LAN control
Users commonly take their laptops home and then copy data through a LAN
connection to a network drive or share on another computer. They also commonly take
data from a shared folder (at work) to copy onto their laptop. With Forcepoint DLP
you can control LAN operations to protect your data.
Endpoint LAN control is applicable to Microsoft sharing only.
Web HTTP/HTTPS
Printing
Applications
*
Removable media
LAN
*The cut, copy, paste, file access, and download operations are not supported for
cloud apps on Windows endpoints when they are used through a Windows Store
browser.
If you are planning to deploy Forcepoint Web Security Endpoint alone, you can
download an endpoint installation package from the Forcepoint Security Portal (for
cloud deployments) or Forcepoint Security Manager (for hybrid deployments). If
needed—for example, if you do not have Internet access—you can use the Forcepoint
Endpoint Package Builder instead.
If you plan to use Forcepoint DLP Endpoint or Remote Filtering Client, you must use
the Package Builder.
● You must set an anti-tampering password to enable the package download links.
● Different endpoint packages are available for 32-bit and 64-bit clients. Select the
appropriate package (or combination of packages) from the list provided.
See the Getting Started Guide for Forcepoint Web Security with Web Cloud Module
for more information about cloud deployments of Forcepoint Web Security Endpoint.
If you are using Forcepoint DLP Endpoint (alone, or in a mixed deployment with
either Forcepoint Web Security Proxy Connect Endpoint or Forcepoint Web Security
Direct Connect Endpoint) or you are using Remote Filter, you must use the Forcepoint
Endpoint Package Builder to create a custom endpoint installation package.
12 Forcepoint Endpoint
Obtaining or Creating the Installation Package
If you are using Forcepoint Web Security Endpoint alone, you can obtain the
installation package from the Forcepoint Security Manager or Forcepoint Security
Portal, or use the Package Builder.
The installation package (a single executable file) is used to deploy the endpoint
clients to user machines.
The Forcepoint Endpoint Package Builder is a Windows utility that can be used to
create 32- and 64-bit Windows packages, Mac packages, or (DLP only) Linux
endpoint clients.
The utility can be found on any Windows server that includes Forcepoint Web
Security, Forcepoint URL Filtering, or Forcepoint DLP.
Note
The packages created by the Forcepoint Endpoint Package
Builder are backwards compatible with previous endpoint
versions.
14 Forcepoint Endpoint
Obtaining or Creating the Installation Package
3. On the Installation Platform and Security screen, select the operating system or
systems for which you want to create an installation package, create the
administrator password that will be used to uninstall or modify endpoint client
software, and enable anti-tampering. When you are finished, click Next.
■ You can create Windows (32-bit or 64-bit) or Mac installation packages for
Forcepoint Web Security Proxy Connect Endpoint deployments, or for
deployments with both Forcepoint Web Security Proxy Connect Endpoint
and Forcepoint DLP Endpoint features.
If you are creating a stand-alone Forcepoint Web Security Direct Connect
Endpoint package, you can only select Windows (32-bit or 64-bit).
If you are creating a stand-alone Forcepoint DLP Endpoint package, you can
also select Linux.
■ For security purposes, anyone who tries to modify or uninstall endpoint
software is prompted for a password.
Once the endpoint client contacts the server, this password is overwritten with
the password specified by an administrator. Set this password in one of the
following places (it is not necessary to do it in both):
○ Forcepoint DLP Endpoint: In the Data Security module of Forcepoint
Security Manager, go to Settings > General > System > Endpoint, then
on the General tab, select Enable endpoint administrator password, and
enter and confirm a password.
○ Forcepoint Web Security Endpoint (Hybrid module): In the Web Security
module of Forcepoint Security Manager, go to Settings > Hybrid
Configuration > Hybrid User Identification, then enter and confirm an
anti-tampering password.
○ Forcepoint Web Security Endpoint (Cloud module): In the Forcepoint
Security Portal, go to Web > Endpoint > Deployment Settings > Set
Anti-Tampering Password, and enter and confirm a password.
Note that password hashes are stored in an encrypted file. The system does
not store plain text passwords.
16 Forcepoint Endpoint
Obtaining or Creating the Installation Package
Note
When configuring the Endpoint Profile in the Forcepoint
Security Manager (Data > Settings > Deployment >
Endpoint Profiles), you may change the primary server
and configure additional servers for load balancing and/or
failover. See “Adding an endpoint profile, Servers tab”
for details.
d. Indicate how often you want endpoint machines to check for updates.
2. Click Next and the Client Settings screen displays:
18 Forcepoint Endpoint
Obtaining or Creating the Installation Package
Use the Local Block Pages screen to change the description and logo that
displays at the bottom of the local block pages. Local block pages are used by the
20 Forcepoint Endpoint
Obtaining or Creating the Installation Package
Specify the URL for your organization’s PAC file. Replace the default URL with
the customized URL for your deployment.
Hybrid deployments
For hybrid deployments, the URL can be found on the Settings > Hybrid
Configuration > User Access page in the Web Security module of the Forcepoint
Security Manager.
Select the URL appropriate for your environment (either port 8082 or port 80).
For example:
Default (port 8082): http://pac.hybrid-
web.global.blackspider.com:8082/proxy.pac?p=8h6hxmgf
Alternate (port 80): http://pac.hybrid-
web.global.blackspider.com/proxy.pac?p=8h6hxmgf
In this example, 8h6hxmgf is a unique identifier for an organization. Yours will
be different. Yours explicitly defines your organization.
Note the difference between the sub-domains of the default PAC file URL and the
sample customized URL. The “hybrid-web” sub-domain is used for on-premises
Forcepoint Web Security deployments that use Forcepoint Web Security
Endpoint.
Remote filter
1. Prepare Remote Filtering Server components as described here.
2. If you selected Remote Filtering Client from the Select Endpoint Components
screen, the Internal Connections screen displays.
3. On the Internal Connections screen, enter the internal IP address or hostname
and internal Port of each Remote Filtering Server to which this client will connect.
Use the > button to move the information to the selected list. When you are
finished, click Next.
Remote Filtering Client sends its heartbeat to these IP addresses and ports to
determine whether or not it is inside the network.
22 Forcepoint Endpoint
Obtaining or Creating the Installation Package
If you have multiple Remote Filtering Server instances, Remote Filtering Client
rotates through the list in order until a functioning server is located.
Remote Filtering Server has a 2-minute inactivity timeout period. If the client
connects, and then does not send an Internet request in the timeout period, the
server drops the connection. When the next request is made, Remote Filtering
Client goes through its list to connect again. This protects server performance by
reducing the number of unused connections that might otherwise accumulate.
6. Indicate whether or not to Notify users when HTTPS or FTP traffic is blocked,
then, if notification is enabled, specify how long (in seconds) the message is
displayed.
Enter and confirm the Pass phrase used for communication with Remote
Filtering Server. This must match the pass phrase created when the Remote
Filtering Server was installed.
When you are finished, click Next.
24 Forcepoint Endpoint
Obtaining or Creating the Installation Package
Global settings
1. When you are done configuring your endpoint selections, use the Save
Installation Package screen to enter a directory path to use for storing the
installation package before it is deployed to client machines.
26 Forcepoint Endpoint
Deploying endpoint software in
your enterprise
● For best practice, start by deploying and testing endpoint software to a few local
network machines, then increase to a limited number of remote machines before
deploying the software throughout your enterprise.
● Check that your endpoint machines meet the minimum system requirements. See
System requirements, page 5 for details.
● Exclude the following directories from any antivirus software that is deployed to
endpoint clients:
■ The endpoint installation folder
■ Endpoint processes:
○ wepsvc.exe
○ dserui.exe
○ ProxyUI.exe
○ RFUI.exe
■ EndpointClassifier.exe and kvoop.exe
● Ensure the endpoint installation path is not encrypted by file and folder encryption
software. All folders and files within the installation path must be left
unencrypted.
● Forcepoint Endpoint can be installed on an endpoint machine encrypted using full
disk encryption. Forcepoint Endpoint must be installed after the disk has been
encrypted.
● If you are including Forcepoint DLP Endpoint, ensure that the auto-update feature
in the Web Security module of the Forcepoint Security Manager is disabled. If you
want auto-updates, you can use the Forcepoint DLP method described below.
(Windows only)
● For hybrid web deployments, make sure that your user accounts are synchronized
with the hybrid service. To verify, log on to the Web Security module of the
Forcepoint Security Manager and select Main > Status > Hybrid Service. It is
okay if you have not yet used the hybrid service.
Note
At the completion of any endpoint update, you must restart
the endpoint for the updates to take effect.
28 Forcepoint Endpoint
Deploying endpoint software in your enterprise
You must also select Receive automatic software updates on the Forcepoint
Endpoint Package Builder “Server Connections” screen. On this same screen, specify
the URL of the server you created and indicate how often you want endpoint machines
to check for updates (every 2 hours by default).
When configured properly, your update server pushes software updates out to
endpoint machines and installs the packages in the background silently.
Note
If you want to change the components installed on a
Forcepoint Endpoint client with components of the same
version (for example, switch from a mixed deployment to
a stand-alone Forcepoint DLP Endpoint deployment), you
must use the Package Builder to generate a new package
and use one of the other deployment options to deploy it.
You cannot use the auto-update feature to update endpoints
with the same version.
Important
After deploying the installation package, you must restart
the endpoint software to complete the installation process.
There are a few ways to distribute the endpoint software on Windows clients,
including virtual desktop clients running Windows:
● Manually on each endpoint device
See Manual deployment, page 30.
● Using System Center Configuration Manager (SCCM) or Systems Management
Server (SMS)
See Creating and distributing Forcepoint endpoints using SCCM or SMS for
details.
● Using a Microsoft Group Policy Object (GPO) or other third-party deployment
tool for Windows. See Distributing the endpoint via GPO for details. To
distribute executables created with the Package Builder via GPO, contact
Forcepoint Technical Support.
Manual deployment
Stand-alone Forcepoint DLP Endpoint packages
Windows packages created with the Package Builder contain a single executable file:
TRITONAP-ENDPOINT-x32.exe or TRITONAP-ENDPOINT-x64.exe. If you are
installing only Forcepoint DLP Endpoint software:
1. Copy one of these files to the client machine.
2. Double-click the executable file and step through the installation wizard.
In virtual desktop (VDI) environments, install the endpoint software as if the client
machine were a physical machine, while taking into consideration any additional steps
required by the infrastructure for third-party installations.
where <token> is the WSCONTEXT value displayed in the GPO command string on
the Settings > Hybrid Configuration > Hybrid User Identification page in the Web
Security module of the Forcepoint Security Manager or the Web > Endpoint page in
the Forcepoint Security Portal. For example:
30 Forcepoint Endpoint
Deploying endpoint software in your enterprise
The WSCONTEXT argument used to identify your organization to the hybrid or cloud
service must be included in the command string. Each account has its own
WSCONTEXT string. Roaming and remote users use this string to connect to your
specific account.
where:
● <password> is the anti-tampering password used by the previous-version endpoint
client (if upgrading) or to be used by the new endpoint.
● <token> is the WSCONTEXT value displayed in the GPO command string on the
Settings > Hybrid Configuration > Hybrid User Identification page in the
Web Security module of the Forcepoint Security Manager or the Web > Endpoint
page in the Forcepoint Security Portal.
The WSCONTEXT argument used to identify your organization to the hybrid or
cloud service must be included in the command string. Each account has its own
WSCONTEXT string. Roaming and remote users use this string to connect to
your specific account.
All arguments passed via the /v parameter must be enclosed in straight quotes, as
shown in the example.
You must provide both the XPSWDPXY and WSCONTEXT arguments.
To perform a silent install, add the /qn parameter as follows:
TRITONAP-ENDPOINT-x64.exe /v"/qn XPSWDPXY=<password>
WSCONTEXT=<token>"
To perform a silent install that does not prompt the end user to restart the endpoint
machine, add the /norestart parameter as follows:
TRITONAP-ENDPOINT-x64.exe /v"/qn /norestart
XPSWDPXY=<password> WSCONTEXT=<token>"
Note
You must restart the endpoint machine to finish the
Forcepoint Endpoint installation. If you perform a silent
install without a restart (using the /norestart parameter),
Forcepoint Endpoint may not function as needed until after
the endpoint machine is restarted.
Function Switch
Silent install TRITONAP-ENDPOINT-x64.exe /v"/qn"
Silent install without TRITONAP-ENDPOINT-x64.exe /v"/qn /norestart"
restart
Set WSCONTEXT TRITONAP-ENDPOINT-x64.exe /v"WSCONTEXT=xxxx"
Set uninstall password TRITONAP-ENDPOINT-x64.exe /v"XPSWDPXY=xxxx"
Set WSCONTEXT and TRITONAP-ENDPOINT-x64.exe /v"/qn
silent install WSCONTEXT=xxxx"
32 Forcepoint Endpoint
Deploying endpoint software in your enterprise
Testing deployment
To confirm that the Forcepoint Endpoint software is installed and running on a
machine:
● For Forcepoint Web Security Endpoint deployments, go to Start > Control Panel
> Administrative Tools > Services. Check that Websense SaaS Service is
present in the Services list and is started. An icon ( ) also displays on the
endpoint machine’s task bar.
● When Forcepoint DLP Endpoint is installed in interactive mode, an icon ( )
displays on the endpoint machine’s task bar. Click the icon for status information.
(No icon shows in stealth mode.)
Most failed endpoint installation issues are permission related. An endpoint
installation requires local administrator rights.
There are a few ways to distribute Forcepoint DLP Endpoint or Forcepoint Web
Security Proxy Connect Endpoint on Macs:
● Manually on each endpoint device
See Manual deployment, page 34.
● Using Remote Desktop (macOS only)
See Installing Mac endpoints with Remote Desktop for details.
Forcepoint Web Security Direct Connect Endpoint is not available for Mac endpoints.
Manual deployment
1. Mac packages contain a zip file, TRITONAP-ENDPOINT_Mac.zip. Copy
TRITONAP-ENDPOINT_Mac.zip to the client machine, and double-click the
file.
2. MacOS automatically creates a directory named “EndpointInstaller,” which
contains a file called WebsenseEndpoint.pkg.
3. If you are deploying a Forcepoint Web Security Proxy Connect Endpoint package,
copy the HWSconfig.xml configuration file to the EndpointInstaller folder. This
XML file must be in the same folder as the WebsenseEndpoint.pkg file before
starting the installation. See Creating the HWSconfig.xml file, page 35 for more
information.
4. Double-click WebsenseEndpoint.pkg to start the installation process.
5. Click Continue, and agree to the license agreement.
6. Click Install.
7. Enter a user name and password for a user with administrator rights to install the
software.
You will receive a confirmation message if the endpoint was successfully
installed.
Note
If you are using the Firefox browser and the Forcepoint
Endpoint Firefox extension was not installed, perform one
of the following actions:
● Stop and start the service from the command line:
wepsvc --stop && wepsvc --start
● Restart the endpoint machine.
Relaunch Firefox. The Firefox extension is now installed
and visible in the list of extensions.
34 Forcepoint Endpoint
Deploying endpoint software in your enterprise
where:
● <token> is the WSCONTEXT value displayed in the GPO command string on the
Settings > Hybrid Configuration > Hybrid User Identification page in the
Web Security module of the Forcepoint Security Manager or the Web > Endpoint
page in the Forcepoint Security Portal.
The WSCONTEXT argument used to identify your organization to the hybrid or
cloud service must be included in the command string. Each account has its own
WSCONTEXT string. Roaming and remote users use this string to connect to
your specific account.
● <pacfile> is the URL for your PAC File. For hybrid deployments, the URL can be
found on the Settings > Hybrid Configuration > User Access page in the Web
Security module of the Forcepoint Security Manager. For full cloud deployments,
you can find policy-specific URLs for your cloud deployment on the General tab
of a policy in the Forcepoint Security Portal. If you would rather use an account-
level PAC file, navigate to the Web > General page to find the PAC file URL.
Save the HWSconfig.xml file in the same directory as the WebsenseEndpoint.pkg
installation package file.
Note
If you already have a HWSconfig.xml file, or one was
provided for you, make sure your correct XML file is in
the same directory as the WebsenseEndpoint.pkg
installation package file.
Testing deployment
To confirm that the endpoint is installed and running on a machine:
● Endpoint files are installed in the /Library/Application Support/Websense
Endpoint/ directory.
Forcepoint DLP Endpoint can be deployed on Citrix XenApp servers to provide data
loss and data theft prevention on client machines.
1. Create a Windows 64-bit endpoint package using the Package Builder utility
described in the previous chapter.
2. To deploy the endpoint software, follow the instructions in Deploying Windows
endpoints, page 29, but instead of deploying the software to each endpoint client,
deploy it to a network server.
3. To support XenApp hardware resources, configure the endpoint to support
additional threads and improve memory usage. This change needs to be made on
each XenApp server running Forcepoint DLP Endpoint.
To customize the configuration, do the following:
1. Open the file, AlternateResource.config.xml.
2. In a text editor and do the following:
a. Set <numOfThreads>, the number of threads per processor, to at least twice
the number of cores on the Terminal Services server. For example, if you have
4 cores on the Terminal Services server, set
<numOfThreads>8</numOfThreads>.
b. Change all resource IDs in the document to reflect the number of threads you
wish to use.
36 Forcepoint Endpoint
Deploying endpoint software in your enterprise
For more information, see Deploying Forcepoint DLP Endpoint on Citrix XenApp
clients.
To configure remote filtering settings, use the Settings > General > Remote Filtering
page in the Web Security module of the Forcepoint Security Manager. Refer to
Forcepoint Web Security Administrator Help for details.
38 Forcepoint Endpoint
Deploying endpoint software in your enterprise
Windows uninstallation
You can uninstall endpoint software 2 ways:
● Locally on each endpoint client
● Remotely through a deployment server or distribution system
Note
If you configured an administrative password, you must
supply it to uninstall the software.
Local uninstallation
1. Go to Start > Control Panel > Programs and Features.
2. Scroll down the list of installed programs, select Forcepoint Endpoint, and click
Uninstall.
3. Click Yes in the confirmation message asking if you are sure you want to delete
the endpoint software.
4. You may be prompted to provide an administrative password, if you defined one.
If so, enter the password in the field provided and click OK.
5. You will see a system message indicating you must restart your system. Click Yes
to restart or No to restart your system later. Once the computer has been restarted,
the configuration changes apply.
where:
■ {product_code} is a unique identifier (GUID) that can be found in the
setup.ini file of each installation package or the system registry. It is different
for each version and bit type (32-bit versus 64-bit).
■ <password> is the administrator password that you entered when creating
the installation package.
To find the setup.ini file, use a file compression tool like WinZip or 7-Zip to extract
the contents of the installation package executable.
To perform a silent uninstall that does not require a restart, add the /norestart
parameter as follows:
msiexec /x {ProductCode} /qn /XPSWDPXY=<password>
/norestart
Function Switch
Silent uninstall msiexec /x {ProductCode} /qn XPSWDPXY=xxxx
Silent uninstall without msiexec /x {ProductCode} /qn XPSWDPXY=xxxx
restart /norestart
40 Forcepoint Endpoint
Deploying endpoint software in your enterprise
Mac uninstallation
1. Go to System Preferences.
2. In the Other section, click the icon for the Forcepoint endpoint software.
3. Click Uninstall Endpoint.
4. Enter the local administrator name and password.
5. Click OK.
6. If you created an anti-tampering password to block attempts to uninstall or modify
endpoint client software, enter that password.
7. Click OK to begin uninstalling the endpoint.
8. You will receive a confirmation message if the endpoint was successfully
uninstalled.
To uninstall the Mac endpoint remotely, you can use the following command line
option with Apple Remote Desktop:
/usr/local/sbin/wepsvc --uninstall [--password pwd]
42 Forcepoint Endpoint