Gå vidare till huvudinnehållet
  • Lägg beställningar snabbt och enkelt
  • Visa beställningar och kontrollera leveransstatus
  • Skapa och kom åt en lista över dina produkter

How to Install Dell Security Management Server

Sammanfattning: Learn how to install Dell Security Management Server by following these step-by-step instructions.

Den här artikeln gäller för Den här artikeln gäller inte för Den här artikeln är inte kopplad till någon specifik produkt. Alla produktversioner identifieras inte i den här artikeln.

Instruktioner

This article covers the basic installation process for Dell Security Management Server (formerly Dell Data Protection | Enterprise Edition Server).


Affected Products:

  • Dell Security Management Server

Affected Versions:

  • v9.8.0 and later

Click the Dell Security Management Server version for appropriate installation steps. For how to install earlier versions of Dell Data Protection Enterprise Edition Server, reference How to Install Dell Data Protection Enterprise Edition Server. For versioning information, reference How to Identify the Dell Data Security Server Version.

Warning:
  • Before installation, ensure that the environment meets Dell Security Management Server System Requirements.
  • SQL databases configured to use Windows Authentication must use the same Windows account to install Dell Security Management Server.
  • Anti-virus and anti-malware should be disabled while installing or upgrading the Dell Security Management Server to avoid impacting Microsoft C++ runtime installers, Java activities (certificate creation and manipulation), and PostgreSQLmodifications. All these items are triggered by executables or scripts.
    • As a workaround, exclude:
      • [INSTALLATION PATH]:\Dell\Enterprise Edition
      • C:\Windows\Installer
      • The file path from which the installer is run.
Note:
  • This article only covers a new back-end deployment of Dell Security Management Server.
  • Client Services is required for more complex or custom deployments of Dell Security Management Server. Client Service engagements can be purchased through your sales representative.
  1. Right-click and Extract the server software.
    Extracting the server software
    Note: For more information about how to download the server software, reference How to Download Dell Security Management Server.
  2. From the extracted root folder, copy EnterpriseServerInstallKey.ini to C:\Windows.
    EnterpriseServerInstallKey.ini
    Note: Optionally, the product key may be populated manually in Step 8.
  3. Go to \x64 and then double-click setup.exe.
    setup.exe
  4. Select the language and then click OK.
    Selecting a language
  5. If any missing requirements are detected, click Install. Otherwise, go to Step 6.
    Example missing requirements
    Note: For more information about system requirements, reference Dell Security Management Server System Requirements.
  6. Click Next.
    Welcome to the InstallShield Wizard
  7. Review the End User License Agreement (EULA). At the end of the EULA menu, select I accept the terms in the license agreement, and then click Next.
    License agreement
  8. Click Next.
    Product key
    Note: The product key is autopopulated (Step 2).
  9. Verify Back end Install (Full Dell Security Management Server Installation) is selected and then click Next.
    Back end Install
  10. Optionally, Change the install directory and then click Next.
    Destination folder
  11. If the UAC Enabled prompt does not appear, go to Step 12. If the UAC Enabled prompt appears:
    1. Click Yes to disable UAC.
    2. Reboot the server.
    3. Go to Step 3.
    UAC Enabled prompt
    Note: Clicking No stops setup to allow UAC to be disabled manually in Windows.
  12. Optionally, Change the server configuration file backup location from the default and then click Next.
    Backup location
  13. Select one of the following:
    1. Import an existing certificate and then go to Step 14.
    2. Create a self-signed certificate and import it to key store and then go to Step 15.
    Install certificate options
    Note: This certificate is used to securely communicate data from the endpoint software to the server.
  14. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 16.
    Existing certificate import
    Note:
  15. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 16.
    Create self-signed certificate
    Note: The examples that are used in the screenshot will differ in your environment.
  16. Select either:
    1. Import an existing certificate and then go to Step 17.
    2. Create a self-signed certificate and import it to key store and then go to Step 18.
    Install server encryption certificate options
    Note: This certificate is used for SSOS (Dell Encryption Enterprise for Server, formerly known as Dell Data Protection | Server Encryption).
  17. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 19.
    Existing certificate import for a server
    Note: The certificate path and name will differ in your environment.
  18. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 19.
    Create self-signed certificate for a server
    Note: The fields that are populated in the example above may differ in your environment.
  19. In the Back End Server Install Setup menu:
    1. Optionally, click Edit Hostnames go to Step 20.
    2. Optionally, click Edit Ports and go to Step 21.
    3. Optionally, check Works with Front End and then populate the Front End Security Server hostname and Port.
    4. Click Next and go to Step 22.
    Back end server install setup
  20. If Edit Hostnames was clicked (Step 19), optionally, change hostnames and then click OK to return to Step 19.
    Back end hostnames
    Note:
    • The hostname that is used must match the server name that is referenced in the certificate (Step 13).
    • The hostnames in the screenshot examples will differ in your environment.
  21. If Edit Ports was clicked (Step 19), optionally, change ports, click OK, and return to Step 19.
    Back end ports
    Note:
    • It is highly recommended to only change ports when there is a conflict in your environment.
    • Due to the complexity of the software, ports can only be modified during the installation process.
  22. In the Database Server and Install-time Credentials menu:
    1. Populate a Database Server and, optionally, an Instance Name.
    2. Optionally, populate a Port.
    3. Select a Database catalog action.
    4. Select a SQL login action.
    5. Select either Windows authentication or SQL server authentication.
    6. If SQL server authentication was selected, populate a Login ID and Password.
    7. Click Next.
    Database server and install-time credentials
    Note:
  23. In the Database and Service Runtime Information menu:
    1. Populate the name of the database catalog.
    2. Select Windows authentication or SQL server authentication.
    3. Populate a user name and password.
    4. Click Next.
    Database and service runtime information
    Note: If the database was created before the installation of Dell Security Management Server, the credentials that are populated here require db_owner rights. For more information, reference How to Configure SQL for Dell Security Management Server.
  24. Click Install.
    Ready to install the program
  25. Click Finish.
    InstallShield Wizard Completed
    Note: Upon completion, the Administration Console must be configured. For more information, reference How to Configure the Dell Data Security Server Administration Console.
  1. Right-click and Extract the server software.
    Extracting the server software
    Note: For more information about how to download the server software, reference How to Download Dell Security Management Server.
  2. From the extracted root folder, copy EnterpriseServerInstallKey.ini to C:\Windows.
    EnterpriseServerInstallKey.ini
    Note: Optionally, the product key may be populated manually in Step 8.
  3. Go to \x64 and then double-click setup.exe.
    setup.exe
  4. Select the language and then click OK.
    Selecting a language
  5. If any missing requirements are detected, click Install. Otherwise, go to Step 6.
    Example missing requirements
    Note: For more information about system requirements, reference Dell Security Management Server System Requirements.
  6. Click Next.
    Welcome to the InstallShield Wizard
  7. Review the End User License Agreement (EULA). At the end of the EULA menu, select I accept the terms in the license agreement, and then click Next.
    License agreement
  8. Click Next.
    Product key
    Note: The product key is autopopulated (Step 2).
  9. Verify Back end Install (Full Dell Security Management Server Installation) is selected and then click Next.
    Back end Install
  10. Optionally, Change the install directory and then click Next.
    Destination folder
  11. If the UAC Enabled prompt does not appear, go to Step 12.If the UAC Enabled prompt appears:
    1. Click Yes to disable UAC.
    2. Reboot the server.
    3. Go to Step 3.
    UAC Enabled prompt
    Note: Clicking No stops setup to allow UAC to be disabled manually in Windows.
  12. Optionally, Change the server configuration file backup location from the default and then click Next.
    Backup location
  13. Select one of the following:
    1. Import an existing certificate and then go to Step 14.
    2. Create a self-signed certificate and import it to key store and then go to Step 15.
    Install certificate options
    Note: This certificate is used to securely communicate data from the endpoint software to the server.
  14. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 16.
    Existing certificate import
    Note:
  15. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 16.
    Create self-signed certificate
    Note: The examples that are used in the screenshot will differ in your environment.
  16. Select either:
    1. Import an existing certificate and then go to Step 17.
    2. Create a self-signed certificate and import it to key store and then go to Step 18.
    Install server encryption certificate options
    Note: This certificate is used for SSOS (Dell Encryption Enterprise for Server, formerly known as Dell Data Protection | Server Encryption).
  17. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 19.
    Existing certificate import for a server
    Note: The certificate path and name will differ in your environment.
  18. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 19.
    Create self-signed certificate for a server
    Note: The fields that are populated in the example above may differ in your environment.
  19. In the Back End Server Install Setup menu:
    1. Optionally, click Edit Hostnames go to Step 20.
    2. Optionally, click Edit Ports and go to Step 21.
    3. Optionally, check Works with Front End and then populate the Front End Security Server hostname and Port.
    4. Click Next and go to Step 22.
    Back end server install setup
  20. If Edit Hostnames was clicked (Step 19), optionally, change hostnames and then click OK to return to Step 19.
    Back end hostnames
    Note:
    • The hostname that is used must match the server name that is referenced in the certificate (Step 13).
    • The hostnames in the screenshot examples will differ in your environment.
  21. If Edit Ports was clicked (Step 19), optionally, change ports, click OK, and return to Step 19.
    Back end ports
    Note:
    • It is highly recommended to only change ports when there is a conflict in your environment.
    • Due to the complexity of the software, ports can only be modified during the installation process.
  22. In the Database Server and Install-time Credentials menu:
    1. Populate a Database Server and, optionally, an Instance Name.
    2. Optionally, populate a Port.
    3. Select a Database catalog action.
    4. Select a SQL login action.
    5. Select either Windows authentication or SQL server authentication.
    6. If SQL server authentication was selected, populate a Login ID and Password.
    7. Click Next.
    Database server and install-time credentials
    Note:
    • If a port is not specified, the default SQL Server port of 1433 is used.
    • Install-time credentials require the account that is chosen to have the sysadmin role assigned in SQL Server. For more information, reference How to Configure SQL for Dell Security Management Server.
    • The database server will differ in your environment.
  23. In the Database and Service Runtime Information menu:
    1. Populate the name of the database catalog.
    2. Select Windows authentication or SQL server authentication.
    3. Populate a user name and password.
    4. Click Next.
    Database and service runtime information
    Note: If the database was created before the installation of Dell Security Management Server, the credentials that are populated here require db_owner rights. For more information, reference How to Configure SQL for Dell Security Management Server.
  24. Click Install.
    Ready to install the program
  25. Click Finish.
    InstallShield Wizard Completed
    Note: Upon completion, the Administration Console must be configured. For more information, reference How to Configure the Dell Data Security Server Administration Console.
  1. Right-click and Extract the server software.
    Extracting the server software
    Note: For more information about how to download the server software, reference How to Download Dell Security Management Server.
  2. From the extracted root folder, copy EnterpriseServerInstallKey.ini to C:\Windows.
    EnterpriseServerInstallKey.ini
    Note: Optionally, the product key may be populated manually in Step 8.
  3. Go to \x64 and then double-click setup.exe.
    setup.exe
  4. Select the language and then click OK.
    Selecting a language
  5. If any missing requirements are detected, click Install. Otherwise, go to Step 6.
    Example missing requirements
    Note: For more information about system requirements, reference Dell Security Management Server System Requirements.
  6. Click Next.
    Welcome to the InstallShield Wizard
  7. Review the End User License Agreement (EULA). At the end of the EULA menu, select I accept the terms in the license agreement, and then click Next.
    License agreement
  8. Click Next.
    Product key
    Note: The product key is autopopulated (Step 2).
  9. Verify Back end Install (Full Dell Security Management Server Installation) is selected and then click Next.
    Back end Install
  10. Optionally, Change the install directory and then click Next.
    Destination folder
  11. If the UAC Enabled prompt does not appear, go to Step 12. If the UAC Enabled prompt appears:
    1. Click Yes to disable UAC.
    2. Reboot the server.
    3. Go to Step 3.
    UAC Enabled prompt
    Note: Clicking No stops setup to allow UAC to be disabled manually in Windows.
  12. Optionally, Change the server configuration file backup location from the default and then click Next.
    Backup location
  13. Select one of the following:
    1. Import an existing certificate and then go to Step 14.
    2. Create a self-signed certificate and import it to key store and then go to Step 15.
    Install certificate options
    Note: This certificate is used to securely communicate data from the endpoint software to the server.
  14. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 16.
    Existing certificate import
    Note:
  15. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 16.
    Create self-signed certificate
    Note: The examples that are used in the screenshot will differ in your environment.
  16. Select either:
    1. Import an existing certificate and then go to Step 17.
    2. Create a self-signed certificate and import it to key store and then go to Step 18.
    Install server encryption certificate options
    Note: This certificate is used for SSOS (Dell Encryption Enterprise for Server, formerly known as Dell Data Protection | Server Encryption).
  17. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 19.
    Existing certificate import for a server
    Note: The certificate path and name will differ in your environment.
  18. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 19.
    Create self-signed certificate for a server
    Note: The fields that are populated in the example above may differ in your environment.
  19. In the Back End Server Install Setup menu:
    1. Optionally, click Edit Hostnames go to Step 20.
    2. Optionally, click Edit Ports and go to Step 21.
    3. Optionally, check Works with Front End and then populate the Front End Security Server hostname and Port.
    4. Click Next and go to Step 22.
    Back end server install setup
  20. If Edit Hostnames was clicked (Step 19), optionally, change hostnames and then click OK to return to Step 19.
    Back end hostnames
    Note:
    • The hostname that is used must match the server name that is referenced in the certificate (Step 13).
    • The hostnames in the screenshot examples will differ in your environment.
  21. If Edit Ports was clicked (Step 19), optionally, change ports, click OK, and return to Step 19.
    Back end ports
    Note:
    • It is highly recommended to only change ports when there is a conflict in your environment.
    • Due to the complexity of the software, ports can only be modified during the installation process.
  22. In the Database Server and Install-time Credentials menu:
    1. Populate a Database Server and, optionally, an Instance Name.
    2. Optionally, populate a Port.
    3. Select a Database catalog action.
    4. Select a SQL login action.
    5. Select either Windows authentication or SQL server authentication.
    6. If SQL server authentication was selected, populate a Login ID and Password.
    7. Click Next.
    Database server and install-time credentials
    Note:
    • If a port is not specified, the default SQL Server port of 1433 is used.
    • Install-time credentials require the account that is chosen to have the sysadmin role assigned in SQL Server. For more information, reference How to Configure SQL for Dell Security Management Server.
    • The database server will differ in your environment.
  23. In the Database and Service Runtime Information menu:
    1. Populate the name of the database catalog.
    2. Select Windows authentication or SQL server authentication.
    3. Populate a user name and password.
    4. Click Next.
    Database and service runtime information
    Note: If the database was created before the installation of Dell Security Management Server, the credentials that are populated here require db_owner rights. For more information, reference How to Configure SQL for Dell Security Management Server.
  24. Click Install.
    Ready to install the program
  25. Click Finish.
    InstallShield Wizard Completed
    Note: Upon completion, the Administration Console must be configured. For more information, reference How to Configure the Dell Data Security Server Administration Console.
  1. Right-click and Extract the server software.
    Extracting the server software
    Note: For more information about how to download the server software, reference How to Download Dell Security Management Server.
  2. From the extracted root folder, copy EnterpriseServerInstallKey.ini to C:\Windows.
    EnterpriseServerInstallKey.ini
    Note: Optionally, the product key may be populated manually in Step 8.
  3. Go to Security Management Server\x64 and then double-click setup.exe.
    setup.exe
  4. Select the language and then click OK.
    Selecting a language
  5. If any missing requirements are detected, click Install. Otherwise, go to Step 6.
    Example missing requirements
    Note: For more information about system requirements, reference Dell Security Management Server System Requirements.
  6. Click Next.
    Welcome to the InstallShield Wizard
  7. Review the End User License Agreement (EULA). At the end of the EULA menu, select I accept the terms in the license agreement, and then click Next.
    License agreement
  8. Click Next.
    Product key
    Note: The product key is autopopulated (Step 2).
  9. Verify Back end Install (Full Dell Security Management Server Installation) is selected and then click Next.
    Back end Install
  10. Optionally, Change the install directory and then click Next.
    Destination folder
  11. If the UAC Enabled prompt does not appear, go to Step 12. If the UAC Enabled prompt appears:
    1. Click Yes to disable UAC.
    2. Reboot the server.
    3. Go to Step 3.
    UAC Enabled prompt
    Note: Clicking No stops setup to allow UAC to be disabled manually in Windows.
  12. Optionally, Change the server configuration file backup location from the default and then click Next.
    Backup location
  13. Select either:
    1. Import an existing certificate and then go to Step 14.
    2. Create a self-signed certificate and import it to key store and then go to Step 15.
    Install certificate options
    Note: This certificate is used to securely communicate data from the endpoint software to the server.
  14. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 16.
    Existing certificate import
    Note:
  15. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 16.
    Create self-signed certificate
    Note: The examples that are used in the screenshot will differ in your environment.
  16. Select either:
    1. Import an existing certificate and then go to Step 17.
    2. Create a self-signed certificate and import it to key store and then go to Step 18.
    Install server encryption certificate options
    Note: This certificate is used for SSOS (Dell Encryption Enterprise for Server, formerly known as Dell Data Protection | Server Encryption).
  17. Browse to the path of the certificate to import and populate the Password of the certificate. Once finished, click Next. Go to Step 19.
    Existing certificate import for a server
    Note: The certificate path and name will differ in your environment.
  18. In the Set up a Certificate Authority (CA) menu:
    1. Confirm the Fully-qualified Computer Name.
    2. Populate the Organization.
    3. Populate the Organizational Unit.
    4. Populate the City.
    5. Populate the State.
    6. Populate the Country as a two-letter abbreviation.
    7. Click Next and then go to Step 19.
    Create self-signed certificate for a server
    Note: All fields that are populated in the example above may differ in your environment.
  19. In the Back End Server Install Setup menu:
    1. Optionally, click Edit Hostnames go to Step 20.
    2. Optionally, click Edit Ports and go to Step 21.
    3. Optionally, check Works with Front End and then populate the Front End Security Server hostname and Port.
    4. Click Next and go to Step 22.
    Back end server install setup
  20. If Edit Hostnames was clicked (Step 19), optionally, change hostnames and then click OK to return to Step 19.
    Back end hostnames
    Note:
    • The hostname that is used must match the server name that is referenced in the certificate (Step 13).
    • The hostnames in the screenshot examples will differ in your environment.
  21. If Edit Ports was clicked (Step 19), optionally, change ports, click OK, and return to Step 19.
    Back end ports
    Note:
    • It is highly recommended to only change ports when there is a conflict in your environment.
    • Due to the complexity of the software, ports can only be modified during the installation process.
  22. In the Database Server and Install-time Credentials menu:
    1. Populate a Database Server and, optionally, an Instance Name.
    2. Optionally, populate a Port.
    3. Select either Windows authentication or SQL server authentication.
    4. If SQL server authentication was selected, populate a Login ID and Password.
    5. Populate the database catalog name.
    6. Click Next.
    Database server and install-time credentials
    Note:
    • If a port is not specified, the default SQL Server port of 1433 is used.
    • Install-time credentials require the account that is chosen to have the sysadmin role assigned in SQL Server. For more information, reference How to Configure SQL for Dell Security Management Server.
    • If a database server and authentication is populated, but a database catalog name is given that does not exist, the Dell Enterprise Server installer will prompt to create that database for you. Click Yes to create the database or click No to return to Step 22.
    • The database server and database catalog will differ in your environment.
  23. Populate a Username and Password for the service account Dell services will use to access SQL and then click Next.
    Service runtime information
    Note: If the database was created before the installation of Dell Security Management Server, the credentials that are populated here require db_owner rights. For more information, reference How to Configure SQL for Dell Security Management Server.
  24. Click Install.
    Ready to install the program
  25. Click Finish.
    InstallShield Wizard Completed
    Note: Upon completion, the Administration Console must be configured. For more information, reference How to Configure the Dell Data Security Server Administration Console.

Berörda produkter

Dell Encryption
Artikelegenskaper
Artikelnummer: 000124912
Artikeltyp: How To
Senast ändrad: 03 feb. 2025
Version:  15
Få svar på dina frågor från andra Dell-användare
Supporttjänster
Kontrollera om din enhet omfattas av supporttjänster.