Setup Guide
Contents
1 Overview......................................................................................................................... 4
Terms used in this document..............................................................................................................................................4
Prerequisites.......................................................................................................................................................................4
Management system requirements.............................................................................................................................. 4
Managed system requirements.................................................................................................................................... 4
Contents of the Management Pack................................................................................................................................... 5
2 Installing the Dell Client Management Pack.................................................................... 6
Installing Dell Client Management Pack.............................................................................................................................. 6
Importing the Dell Client Management Pack.......................................................................................................................6
Upgrading from previous Management Packs....................................................................................................................6
Upgrading from Dell Client Management Pack version 6.0...........................................................................................6
Upgrading from version 5.1 and prior versions..............................................................................................................6
Deleting the Management Packs........................................................................................................................................7
3 Security Considerations.................................................................................................. 8
3