Do you have a question about the RiskVision and is the answer not in the manual?
Questions and answers
Summary of Contents for Triton RiskVision
Page 1
® T R I T O N R i s k V i s i o n Setup Guide ™ v 2 . 0...
Page 2
The information in this documentation is subject to change without notice. Trademarks Websense and TRITON are registered trademarks and RiskVision is a trademark of Websense, Inc., in the United States and certain international markets. Websense has numerous other unregistered trademarks in the United States and internationally. All other trademarks are the property of their respective owners.
Positioning TRITON RiskVision in the network RiskVision positioned downstream from a web proxy In most cases, it is best to position the RiskVision appliance between clients and the proxy. This ensures that RiskVision components see: Unaltered TCP traffic from clients ...
In this configuration, because outbound traffic goes through the downstream proxy before being seen by RiskVision, the source IP address of all requests is the web proxy IP address. To address this issue, configure the downstream proxy to add X-Forwarded-For to HTTP headers.
Introducing TRITON RiskVision RiskVision and SSL decryption If your network includes a product that provides SSL decryption, RiskVision can be configured to monitor and analyze the decrypted traffic. Deployment details vary based on the product providing the decryption. In general terms, however, RiskVision analyzes a read-only copy of the decrypted traffic via a monitor or SPAN port.
Introducing TRITON RiskVision How does RiskVision work? The RiskVision monitoring and analysis process works as follows: Capture monitors IP packets from a single network interface and stores them in memory. Assembler reads the pcap files provided by Capture and: Identifies HTTP and SMTP transactions ...
Setup process overview Step 1: Set up your V-Series appliance hardware, page 7 Step 2: Set up the RiskVision appliance software, page 8 Step 3: Configure the system, page 11 ...
TRITON RiskVision Setup Guide | TRITON RiskVision | v2.0 Step 1: Set up your V-Series appliance hardware The diagram below gives a simple overview of TRITON RiskVision deployment. All local RiskVision components, including management and reporting components, reside on the Websense V-Series appliance.
URLs that the C interface can access. Network interface N connects either to a port mirror on the switch or to a network tap that supports aggregation. This allows RiskVision to monitor and analyze HTTP and SMTP traffic on all ports.
Page 13
Installation Continue with the next chapter of this guide to activate, verify, and configure your RiskVision deployment. TRITON RiskVision Setup Guide ...
Initial Setup TRITON RiskVision Setup Guide | TRITON RiskVision | v2.0 Step 3: Configure the system When installation is complete, use the RiskVision Local Manager to enter your subscription key and verify the system. Verify your network interface configuration During installation, the Capture service is configured to use the C interface (eth0) for communication and the N interface (eth1) to monitor traffic.
Enable RiskVision analysis When you enter your subscription key in the Local Manager, RiskVision connects to Websense servers to validate the subscription. This is required to download analytic databases, connect to the File Sandboxing cloud service, and retrieve reporting information from Websense Security Labs.
Page 17
Initial Setup If C interface traffic from the RiskVision appliance must go through an explicit proxy to access the Internet: Select the Proxy tab. Toggle Enable proxy settings to ON Enter the connection details. Click Apply. Select the Account tab.
Check for system updates RiskVision systems use the Linux yum tool for both operating system and RiskVision software hotfixes, patches, and upgrades. The System > Updates tab in the Local Manager indicates whether updates are available, and offers a single-button mechanism for downloading and installing the updates.
When the system has restarted, log back in to the Local Manager to finish setting up the system. Configure data storage By default, RiskVision is configured to store up to 400,000 incident records and up to 2 million sessions in its database. RiskVision is also configured not to store pcap files for captured traffic.
By default, traffic capture starts immediately upon startup. If the appliance interfaces are not properly configured, however, the Capture process may stop. To make sure that traffic capture is enabled: Select the System > Analytics tab in the Local Manager. Make sure Enable traffic capture is ON. Websense TRITON RiskVision ...
Initial Setup Verify the RiskVision services You can monitor the status of the local RiskVision services on the System > Services page in the Local Manager. The Service Manager table should show a status of Running for all services. If a single service is stopped, use the icon in the Service Restart column of the ...
Initial Setup Step 4: Verify RiskVision monitoring To make sure that TRITON RiskVision is able to monitor traffic from all expected sources: In the Local Manager, click Diagnostics in the toolbar at the top of the page, then select the Sessions tab.
Initial Setup Step 5: Using TRITON RiskVision Use the Incidents page in the RiskVision Local Manager to track the results of RiskVision file analysis. Tips for using the table: Click on a column header and drag it up one row (into the space that says “Drag a ...
Page 24
Initial Setup Understanding the process of analysis: When RiskVision identifies files in HTTP or SMTP transactions, it sends them to the local, on-box analytics to determine whether the files contain suspicious or malicious content. File content is analyzed by the Data Analysis Engine to identify potentially sensitive information that is being transferred out of your network.
Page 25
Initial Setup kits and call home traffic), as well as more detailed information about potential data loss violations discovered by RiskVision. TRITON RiskVision Setup Guide ...
Need help?
Do you have a question about the RiskVision and is the answer not in the manual?
Questions and answers