Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell Security Management Server Installation and Migration Guide v11.9

Install Back-End Server and New Database

  1. In the Dell installation media, go to the Security Management Server directory. Extract (DO NOT copy and paste or drag and drop) Security Management Server-x64 to the root directory of the server where you are installing Security Management Server. Copying and pasting or dragging and dropping produces errors and an unsuccessful installation.
  2. Double-click setup.exe.
  3. Select the language for installation, and then click OK.
  4. If prerequisites are not already installed, a message displays to inform you of which prerequisites will be installed. Click Install.
  5. In the Welcome dialog, click Next.
  6. Read the license agreement, accept the terms, and then click Next.
  7. If you optionally copied your EnterpriseServerInstallKey.ini file to C:\Windows as explained in Pre-Installation Configuration, click Next. If not, enter the 32-character Product Key and then click Next. The Product Key is in the EnterpriseServerInstallKey.ini file.
  8. Select Back End Install and click Next.
  9. To install the Security Management Server to the default location of C:\Program Files\Dell, click Next. Otherwise, click Change to select another location, and then click Next.
  10. To select a location for backup configuration files to be stored, click Change, go to the folder, and then click Next.

    Dell Technologies recommends that you select a remote network location or external drive for backup.

    After installation, any changes to configuration files, including changes that are made with the Server Configuration Tool, must be manually backed up in these folders. Configuration files are an important part of the total information that is used to manually restore the Dell Server, if necessary.

    NOTE:The folder structure created by the installer during this installation step (example shown below) must remain unchanged.
  11. You have a choice of digital certificate types to use. It is highly recommended that you use a digital certificate from a trusted certificate authority.

    Select option "a" or "b" below:

    1. To use an existing certificate that was purchased from a CA authority, select Import an existing certificate and click Next.

      Click Browse to enter the path to the certificate.

      Enter the password associated with this certificate. The key store file must be .p12 or pfx. See Exporting a Certificate to .PFX Using the Certificate Management Console for instructions.

      Click Next.

      NOTE:

      To use this setting, confirm that the exported CA certificate being imported must have the full trust chain. If unsure, reexport the CA certificate and ensure that the following options are selected in the "Certificate Export Wizard":

      • Personal Information Exchange - PKCS#12 (.PFX)
      • Include all certificates in the certification path if possible.
      • Export all extended properties.

      OR

    2. To create a self-signed certificate, select Create a self-signed certificate and import it to key store and click Next.

      At the Create Self-Signed Certificate dialog, enter the following information:

      Fully qualified computer name (example: computername.domain.com)

      Organization

      Organizational Unit (example: Security)

      City

      State (full name)

      Country: Two-letter country or region abbreviation

      Click Next.

      NOTE:The certificate expires in 10 years, by default.
  12. For Server Encryption, you have a choice of digital certificate types to use. It is highly recommended that you use a digital certificate from a trusted certificate authority.

    Select option "a" or "b" below:

    1. To use an existing certificate that was purchased from a CA authority, select Import an existing certificate and click Next.

      Click Browse to enter the path to the certificate.

      Enter the password associated with this certificate. The key store file must be .p12 or pfx. See Exporting a Certificate to .PFX Using the Certificate Management Console for instructions.

      Click Next.

      NOTE:

      To use this setting, confirm that the exported CA certificate being imported has the full trust chain. If unsure, reexport the CA certificate and ensure that the following options are selected in the "Certificate Export Wizard":

      • Personal Information Exchange - PKCS#12 (.PFX)
      • Include all certificates in the certification path if possible.
      • Export all extended properties.

      OR

    2. To create a self-signed certificate, select Create a self-signed certificate and import it to key store and click Next.

      At the Create Self-Signed Certificate dialog, enter the following information:

      Fully qualified computer name (example: computername.domain.com)

      Organization

      Organizational Unit (example: Security)

      City

      State (full name)

      Country: Two-letter country or region abbreviation

      Click Next.

      NOTE:The certificate expires in 10 years, by default.
  13. From the Back-End Server Install Setup dialog, you can view or edit hostnames and ports.
    • To accept the default hostnames and ports, in the Back-End Server Install Setup dialog, click Next.
    • If you are using a front-end server, select Works with Front End to communicate with clients internally in your network or externally in the DMZ. Then enter the front-end Security Server hostname (for example, server.domain.com).

    • To view or edit hostnames, click Edit Hostnames. Edit hostnames only if necessary. Dell Technologies recommends using the defaults.

      NOTE:A hostname cannot contain an underscore character ("_").

      When finished, click OK.

    • To view or edit ports, click Edit Ports. Edit ports only if necessary. Dell Technologies recommends using the defaults. When finished, click OK.

  14. To create a new database, follow these steps:
    1. Click Browse to select the server on which to install the database.
    2. Select the authentication method for the installer to use to set up the Dell Server database. After installation, the installed product does not use the credentials that are specified here.
      • Windows authentication credentials of current user

        If you choose Windows Authentication, the same credentials that were used to log in to Windows are used for authentication. (User Name and Password are not editable.) Ensure that the account has system administrator rights and the ability to manage the SQL Server.

        OR

      • SQL server authentication using the credentials below

        If you use SQL authentication, the SQL account that is used must have system administrator rights on the SQL Server.

        The installer must authenticate to the SQL Server with these permissions: create database, add user, assign permissions.

    3. Identify the database catalog:

      Enter the name for a new database catalog. You are prompted in the next dialog to create the new catalog.

    4. Click Next.
    5. To confirm that you want the installer to create a database, click Yes. To return to the previous screen to make changes, click No.
  15. Select the authentication method for the product to use. This step connects an account to the product.
    • Windows authentication

      Select Windows authentication using the credentials below, enter the credentials for the product to use, and click Next.

      Ensure that the account has system administrator rights and the ability to manage the SQL Server. The user account must have the SQL Server permissions Default Schema: dbo and Database Role Membership: dbo_owner, public.

      Dell services also use these credentials as they work with the Security Management Server.

      OR

    • SQL Server authentication

      Select SQL server authentication using the credentials below, enter the SQL Server credentials for the Dell services to use as they engage with the Security Management Server, and click Next.

      The user account must have the SQL Server permissions Default Schema: dbo and Database Role Membership: dbo_owner, public.

  16. In the Ready to Install the Program dialog, click Install.

    A progress dialog displays status throughout the installation process.

  17. When the installation is completed, click Finish.

    Back-End Server installation tasks are complete.

    Dell Services are restarted at the end of installation. It is not necessary to reboot the Dell Server.


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\