Перейти к основному содержимому
  • Простое и быстрое размещение заказов
  • Просмотр заказов и отслеживание состояния доставки
  • Создание списка продуктов и доступ к нему

How to Install Dell Security Management Server

Сводка: Dell Security Management Server can be installed by following these instructions.

Данная статья применяется к Данная статья не применяется к Эта статья не привязана к какому-либо конкретному продукту. В этой статье указаны не все версии продуктов.

Симптомы

This article covers the basic installation process for Dell Security Management Server (formerly Dell Data Protection | Enterprise Edition Server).


Affected Products:

Dell Security Management Server

Affected Versions:

v9.8.0 and later


Причина

Not applicable.

Разрешение

Click the Dell Security Management Server version for appropriate installation steps. For how to install earlier versions of Dell Data Protection Enterprise Edition Server, reference How to Install Dell Data Protection Enterprise Edition Server. For versioning information, reference How to Identify the Dell Data Security / Dell Data Protection Server Version.

Warning:
  • Before installation, ensure that the environment meets Dell Security Management Server / Dell Data Protection Enterprise Edition Server System Requirements.
  • SQL databases configured to use Windows Authentication must use the same Windows account to install Dell Security Management Server.
  • Anti-virus and anti-malware should be disabled while installing or upgrading the Dell Security Management Server to avoid impacting Microsoft C++ runtime installers, Java activities (certificate creation and manipulation), and PostgreSQLmodifications. All these items are triggered by executables or scripts.
    • As a work-around, exclude:
      • [INSTALLATION PATH]:\Dell\Enterprise Edition
      • C:\Windows\Installer
      • The file path from which the installer is run.
 
Note:
  • This article only covers a new back-end deployment of Dell Security Management Server.
  • Client Services is required for more complex or custom deployments of Dell Security Management Server. Client Service engagements can be purchased through your sales representative.

To install the server:

  1. Right-click and Extract the server software.

Extracting the server software

Note: For more information about how to download the server software, reference How to Download Dell Security Management Server.
  1. From the extracted root folder, copy EnterpriseServerInstallKey.ini to C:\Windows.

EnterpriseServerInstallKey.ini

Note: Optionally, the product key may be populated manually in Step 8.
  1. Go to \x64 and then double-click setup.exe.

setup.exe

  1. Select the language and then click OK.

Selecting a language

  1. If any missing requirements are detected, click Install. Otherwise, go to Step 6.

Example missing requirements

Note: For more information about system requirements, reference Dell Security Management Server / Dell Data Protection Enterprise Edition Server System Requirements.
  1. Click Next.

Welcome to the InstallShield Wizard

  1. Review the End User License Agreement (EULA). At the end of the EULA menu, select I accept the terms in the license agreement, and then click Next.

License agreement

  1. Click Next.

Product key

Note: The product key is autopopulated (Step 2).
  1. Verify Back end Install (Full Dell Security Management Server Installation) is selected and then click Next.

Back end Install

  1. Optionally, Change the install directory and then click Next.

Destination folder

  1. If the UAC Enabled prompt appears:
    1. Click Yes to disable UAC.
    2. Reboot the server.
    3. Go to Step 3.

If the UAC Enabled prompt does not appear, go to Step 12.

UAC Enabled prompt

Note: Clicking No stops setup to allow UAC to be disabled manually in Windows.
  1. Optionally, Change the server configuration file backup location from the default and then click Next.

Backup location

  1. Select one of the following:
    1. Import an existing certificate and then go to Step 14.
    2. Create a self-signed certificate and import it to key store and then go to Step 15.

Install certificate options

Note: This certificate is used to securely communicate data from the endpoint software to the server.
  1. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 16.

Existing certificate import

Note:
  1. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 16.

Create self-signed certificate

Note: The examples that are used in the screenshot will differ in your environment.
  1. Select either:
    1. Import an existing certificate and then go to Step 17.
    2. Create a self-signed certificate and import it to key store and then go to Step 18.

Install server encryption certificate options

Note: This certificate is used for SSOS (Dell Encryption Enterprise for Server, formerly known as Dell Data Protection | Server Encryption).
  1. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 19.

Existing certificate import for a server

Note: The certificate path and name will differ in your environment.
  1. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 19.

Create self-signed certificate for a server

Note: The fields that are populated in the example above may differ in your environment.
  1. In the Back End Server Install Setup menu:
    1. Optionally, click Edit Hostnames go to Step 20.
    2. Optionally, click Edit Ports and go to Step 21.
    3. Optionally, check Works with Front End and then populate the Front End Security Server hostname and Port.
    4. Click Next and go to Step 22.

Back end server install setup

  1. If Edit Hostnames was clicked (Step 19), optionally, change hostnames and then click OK to return to Step 19.

Back end hostnames

Note:
  • The hostname that is used must match the server name that is referenced in the certificate (Step 13).
  • The hostnames in the screenshot examples will differ in your environment.
  1. If Edit Ports was clicked (Step 19), optionally, change ports, click OK, and return to Step 19.

Back end ports

Note:
  • It is highly recommended to only change ports when there is a conflict in your environment.
  • Due to the complexity of the software, ports can only be modified during the installation process.
  1. In the Database Server and Install-time Credentials menu:
    1. Populate a Database Server and, optionally, an Instance Name.
    2. Optionally, populate a Port.
    3. Select a Database catalog action.
    4. Select a SQL login action.
    5. Select either Windows authentication or SQL server authentication.
    6. If SQL server authentication was selected, populate a Login ID and Password.
    7. Click Next.

Database server and install-time credentials

Note:
  1. In the Database and Service Runtime Information menu:
    1. Populate the name of the database catalog.
    2. Select Windows authentication or SQL server authentication.
    3. Populate a user name and password.
    4. Click Next.

Database and service runtime information

Note: If the database was created before the installation of Dell Security Management Server, the credentials that are populated here require db_owner rights. For more information, reference How to Configure SQL for Dell Security Management Server / Dell Data Protection Enterprise Edition Server.
  1. Click Install.

Ready to install the program

  1. Click Finish.

InstallShield Wizard Completed

Note: Upon completion, the Administration Console must be configured. For more information, reference How to Configure the Dell Data Security / Dell Data Protection Server Administration Console.

To install the server:

  1. Right-click and Extract the server software.

Extracting the server software

Note: For more information about how to download the server software, reference How to Download Dell Security Management Server.
  1. From the extracted root folder, copy EnterpriseServerInstallKey.ini to C:\Windows.

EnterpriseServerInstallKey.ini

Note: Optionally, the product key may be populated manually in Step 8.
  1. Go to \x64 and then double-click setup.exe.

setup.exe

  1. Select the language and then click OK.

Selecting a language

  1. If any missing requirements are detected, click Install. Otherwise, go to Step 6.

Example missing requirements

Note: For more information about system requirements, reference Dell Security Management Server / Dell Data Protection Enterprise Edition Server System Requirements.
  1. Click Next.

Welcome to the InstallShield Wizard

  1. Review the End User License Agreement (EULA). At the end of the EULA menu, select I accept the terms in the license agreement, and then click Next.

License agreement

  1. Click Next.

Product key

Note: The product key is autopopulated (Step 2).
  1. Verify Back end Install (Full Dell Security Management Server Installation) is selected and then click Next.

Back end Install

  1. Optionally, Change the install directory and then click Next.

Destination folder

  1. If the UAC Enabled prompt appears:
    1. Click Yes to disable UAC.
    2. Reboot the server.
    3. Go to Step 3.

If the UAC Enabled prompt does not appear, go to Step 12.

UAC Enabled prompt

Note: Clicking No stops setup to allow UAC to be disabled manually in Windows.
  1. Optionally, Change the server configuration file backup location from the default and then click Next.

Backup location

  1. Select one of the following:
    1. Import an existing certificate and then go to Step 14.
    2. Create a self-signed certificate and import it to key store and then go to Step 15.

Install certificate options

Note: This certificate is used to securely communicate data from the endpoint software to the server.
  1. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 16.

Existing certificate import

Note:
  1. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 16.

Create self-signed certificate

Note: The examples that are used in the screenshot will differ in your environment.
  1. Select either:
    1. Import an existing certificate and then go to Step 17.
    2. Create a self-signed certificate and import it to key store and then go to Step 18.

Install server encryption certificate options

Note: This certificate is used for SSOS (Dell Encryption Enterprise for Server, formerly known as Dell Data Protection | Server Encryption).
  1. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 19.

Existing certificate import for a server

Note: The certificate path and name will differ in your environment.
  1. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 19.

Create self-signed certificate for a server

Note: The fields that are populated in the example above may differ in your environment.
  1. In the Back End Server Install Setup menu:
    1. Optionally, click Edit Hostnames go to Step 20.
    2. Optionally, click Edit Ports and go to Step 21.
    3. Optionally, check Works with Front End and then populate the Front End Security Server hostname and Port.
    4. Click Next and go to Step 22.

Back end server install setup

  1. If Edit Hostnames was clicked (Step 19), optionally, change hostnames and then click OK to return to Step 19.

Back end hostnames

Note:
  • The hostname that is used must match the server name that is referenced in the certificate (Step 13).
  • The hostnames in the screenshot examples will differ in your environment.
  1. If Edit Ports was clicked (Step 19), optionally, change ports, click OK, and return to Step 19.

Back end ports

Note:
  • It is highly recommended to only change ports when there is a conflict in your environment.
  • Due to the complexity of the software, ports can only be modified during the installation process.
  1. In the Database Server and Install-time Credentials menu:
    1. Populate a Database Server and, optionally, an Instance Name.
    2. Optionally, populate a Port.
    3. Select a Database catalog action.
    4. Select a SQL login action.
    5. Select either Windows authentication or SQL server authentication.
    6. If SQL server authentication was selected, populate a Login ID and Password.
    7. Click Next.

Database server and install-time credentials

Note:
  1. In the Database and Service Runtime Information menu:
    1. Populate the name of the database catalog.
    2. Select Windows authentication or SQL server authentication.
    3. Populate a user name and password.
    4. Click Next.

Database and service runtime information

Note: If the database was created before the installation of Dell Security Management Server, the credentials that are populated here require db_owner rights. For more information, reference How to Configure SQL for Dell Security Management Server / Dell Data Protection Enterprise Edition Server.
  1. Click Install.

Ready to install the program

  1. Click Finish.

InstallShield Wizard Completed

Note: Upon completion, the Administration Console must be configured. For more information, reference How to Configure the Dell Data Security / Dell Data Protection Server Administration Console.

To install the server:

  1. Right-click and Extract the server software.

Extracting the server software

Note: For more information about how to download the server software, reference How to Download Dell Security Management Server.
  1. From the extracted root folder, copy EnterpriseServerInstallKey.ini to C:\Windows.

EnterpriseServerInstallKey.ini

Note: Optionally, the product key may be populated manually in Step 8.
  1. Go to \x64 and then double-click setup.exe.

setup.exe

  1. Select the language and then click OK.

Selecting a language

  1. If any missing requirements are detected, click Install. Otherwise, go to Step 6.

Example missing requirements

Note: For more information about system requirements, reference Dell Security Management Server / Dell Data Protection Enterprise Edition Server System Requirements.
  1. Click Next.

Welcome to the InstallShield Wizard

  1. Review the End User License Agreement (EULA). At the end of the EULA menu, select I accept the terms in the license agreement, and then click Next.

License agreement

  1. Click Next.

Product key

Note: The product key is autopopulated (Step 2).
  1. Verify Back end Install (Full Dell Security Management Server Installation) is selected and then click Next.

Back end Install

  1. Optionally, Change the install directory and then click Next.

Destination folder

  1. If the UAC Enabled prompt appears:
    1. Click Yes to disable UAC.
    2. Reboot the server.
    3. Go to Step 3.

If the UAC Enabled prompt does not appear, go to Step 12.

UAC Enabled prompt

Note: Clicking No stops setup to allow UAC to be disabled manually in Windows.
  1. Optionally, Change the server configuration file backup location from the default and then click Next.

Backup location

  1. Select one of the following:
    1. Import an existing certificate and then go to Step 14.
    2. Create a self-signed certificate and import it to key store and then go to Step 15.

Install certificate options

Note: This certificate is used to securely communicate data from the endpoint software to the server.
  1. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 16.

Existing certificate import

Note:
  1. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 16.

Create self-signed certificate

Note: The examples that are used in the screenshot will differ in your environment.
  1. Select either:
    1. Import an existing certificate and then go to Step 17.
    2. Create a self-signed certificate and import it to key store and then go to Step 18.

Install server encryption certificate options

Note: This certificate is used for SSOS (Dell Encryption Enterprise for Server, formerly known as Dell Data Protection | Server Encryption).
  1. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 19.

Existing certificate import for a server

Note: The certificate path and name will differ in your environment.
  1. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 19.

Create self-signed certificate for a server

Note: The fields that are populated in the example above may differ in your environment.
  1. In the Back End Server Install Setup menu:
    1. Optionally, click Edit Hostnames go to Step 20.
    2. Optionally, click Edit Ports and go to Step 21.
    3. Optionally, check Works with Front End and then populate the Front End Security Server hostname and Port.
    4. Click Next and go to Step 22.

Back end server install setup

  1. If Edit Hostnames was clicked (Step 19), optionally, change hostnames and then click OK to return to Step 19.

Back end hostnames

Note:
  • The hostname that is used must match the server name that is referenced in the certificate (Step 13).
  • The hostnames in the screenshot examples will differ in your environment.
  1. If Edit Ports was clicked (Step 19), optionally, change ports, click OK, and return to Step 19.

Back end ports

Note:
  • It is highly recommended to only change ports when there is a conflict in your environment.
  • Due to the complexity of the software, ports can only be modified during the installation process.
  1. In the Database Server and Install-time Credentials menu:
    1. Populate a Database Server and, optionally, an Instance Name.
    2. Optionally, populate a Port.
    3. Select a Database catalog action.
    4. Select a SQL login action.
    5. Select either Windows authentication or SQL server authentication.
    6. If SQL server authentication was selected, populate a Login ID and Password.
    7. Click Next.

Database server and install-time credentials

Note:
  1. In the Database and Service Runtime Information menu:
    1. Populate the name of the database catalog.
    2. Select Windows authentication or SQL server authentication.
    3. Populate a user name and password.
    4. Click Next.

Database and service runtime information

Note: If the database was created before the installation of Dell Security Management Server, the credentials that are populated here require db_owner rights. For more information, reference How to Configure SQL for Dell Security Management Server / Dell Data Protection Enterprise Edition Server.
  1. Click Install.

Ready to install the program

  1. Click Finish.

InstallShield Wizard Completed

Note: Upon completion, the Administration Console must be configured. For more information, reference How to Configure the Dell Data Security / Dell Data Protection Server Administration Console.

To install the server:

  1. Right-click and Extract the server software.

Extracting the server software

Note: For more information about how to download the server software, reference How to Download Dell Security Management Server.
  1. From the extracted root folder, copy EnterpriseServerInstallKey.ini to C:\Windows.

EnterpriseServerInstallKey.ini

Note: Optionally, the product key may be populated manually in Step 8.
  1. Go to Security Management Server\x64 and then double-click setup.exe.

setup.exe

  1. Select the language and then click OK.

Selecting a language

  1. If any missing requirements are detected, click Install. Otherwise, go to Step 6.

Example missing requirements

Note: For more information about system requirements, reference Dell Security Management Server / Dell Data Protection Enterprise Edition Server System Requirements.
  1. Click Next.

Welcome to the InstallShield Wizard

  1. Review the End User License Agreement (EULA). At the end of the EULA menu, select I accept the terms in the license agreement, and then click Next.

License agreement

  1. Click Next.

Product key

Note: The product key is autopopulated (Step 2).
  1. Verify Back end Install (Full Dell Security Management Server Installation) is selected and then click Next.

Back end Install

  1. Optionally, Change the install directory and then click Next.

Destination folder

  1. If the UAC Enabled prompt appears:
    1. Click Yes to disable UAC.
    2. Reboot the server.
    3. Go to Step 3.

If the UAC Enabled prompt does not appear, go to Step 12.

UAC Enabled prompt

Note: Clicking No stops setup to allow UAC to be disabled manually in Windows.
  1. Optionally, Change the server configuration file backup location from the default and then click Next.

Backup location

  1. Select either:
    1. Import an existing certificate and then go to Step 14.
    2. Create a self-signed certificate and import it to key store and then go to Step 15.

Install certificate options

Note: This certificate is used to securely communicate data from the endpoint software to the server.
  1. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 16.

Existing certificate import

Note:
  1. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 16.

Create self-signed certificate

Note: The examples that are used in the screenshot will differ in your environment.
  1. Select either:
    1. Import an existing certificate and then go to Step 17.
    2. Create a self-signed certificate and import it to key store and then go to Step 18.

Install server encryption certificate options

Note: This certificate is used for SSOS (Dell Encryption Enterprise for Server, formerly known as Dell Data Protection | Server Encryption).
  1. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 19.

Existing certificate import for a server

Note: The certificate path and name will differ in your environment.
  1. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 19.

Create self-signed certificate for a server

Note: All fields that are populated in the example above may differ in your environment.
  1. In the Back End Server Install Setup menu:
    1. Optionally, click Edit Hostnames go to Step 20.
    2. Optionally, click Edit Ports and go to Step 21.
    3. Optionally, check Works with Front End and then populate the Front End Security Server hostname and Port.
    4. Click Next and go to Step 22.

Back end server install setup

  1. If Edit Hostnames was clicked (Step 19), optionally, change hostnames and then click OK to return to Step 19.

Back end hostnames

Note:
  • The hostname that is used must match the server name that is referenced in the certificate (Step 13).
  • The hostnames in the screenshot examples will differ in your environment.
  1. If Edit Ports was clicked (Step 19), optionally, change ports, click OK, and return to Step 19.

Back end ports

Note:
  • It is highly recommended to only change ports when there is a conflict in your environment.
  • Due to the complexity of the software, ports can only be modified during the installation process.
  1. In the Database Server and Install-time Credentials menu:
    1. Populate a Database Server and, optionally, an Instance Name.
    2. Optionally, populate a Port.
    3. Select either Windows authentication or SQL server authentication.
    4. If SQL server authentication was selected, populate a Login ID and Password.
    5. Populate the database catalog name.
    6. Click Next.

Database server and install-time credentials

Note:
  • If a port is not specified, the default SQL Server port of 1433 is used.
  • Install-time credentials require the account that is chosen to have the sysadmin role assigned in SQL Server. For more information, reference How to Configure SQL for Dell Security Management Server / Dell Data Protection Enterprise Edition Server.
  • If a database server and authentication is populated, but a database catalog name is given that does not exist, the Dell Enterprise Server installer will prompt to create that database for you. Click Yes at the prompt to create the database, or No to return to Step 22.
  • The database server and database catalog will differ in your environment.
  1. Populate a Username and Password for the service account Dell services will use to access SQL and then click Next.

Service runtime information

Note: If the database was created before the installation of Dell Security Management Server, the credentials that are populated here require db_owner rights. For more information, reference How to Configure SQL for Dell Security Management Server / Dell Data Protection Enterprise Edition Server.
  1. Click Install.

Ready to install the program

  1. Click Finish.

InstallShield Wizard Completed

Note: Upon completion, the Administration Console must be configured. For more information, reference How to Configure the Dell Data Security / Dell Data Protection Server Administration Console.

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Затронутые продукты

Dell Encryption
Свойства статьи
Номер статьи: 000124912
Тип статьи: Solution
Последнее изменение: 20 Dec 2022
Версия:  14
Получите ответы на свои вопросы от других пользователей Dell
Услуги технической поддержки
Проверьте, распространяются ли на ваше устройство услуги технической поддержки.