Deployment Guide
Preparation Checklist - Initial
Implementation
Based on the Dell Server you deploy, use the appropriate checklist to ensure you have met all prerequisites before beginning to
install Dell Encryption or Endpoint Security Suite Enterprise.
● Security Management Server checklist
● Security Management Server Virtual checklist
Security Management Server Initial Implementation
Checklist
Proof of Concept environment cleanup is complete (if applicable)?
The proof of concept database and application have been backed up and uninstalled (if using the same
server) before the installation engagement with Dell. For more instruction on an uninstall, see https://
www.dell.com/support/manuals/us/en/04/dell-data-protection-encryption/enterpserverig/perform-back-
ups?guid=guid-2669f62a-2567-49ea-8e72-4ad06fb82442&lang=en-us.
Any production endpoints used during proof of concept testing have been decrypted or key bundles
downloaded. For more information on the clients you plan to deploy, see Client Documents.
NOTE:
All new implementations must begin with a new database and fresh installation of the Encryption or Endpoint Security Suite
Enterprise software. Dell Client Services will not perform a new implementation using a POC environment. Any endpoints
encrypted during a POC will need to be either decrypted or rebuilt prior to the installation engagement with Dell.
Servers meet required hardware specifications?
See Dell Security Management Server Architecture Design.
Servers meet required software specifications?
Windows Server 2012 R2 (Standard or Datacenter), 2016 (Standard or Datacenter), or Windows Server
2019 (Standard or Datacenter) is installed. These operating systems can be installed on physical or virtual
hardware.
Windows Installer 4.0 or later is installed.
.NET Framework 4.6.1 is installed.
Microsoft SQL Native Client 2012 is installed, if using SQL Server 2012 or SQL Server 2016. If available, SQL
Native Client 2014 may be used.
NOTE: SQL Express is not supported with a production deployment of Security Management Server.
Windows Firewall is disabled or configured to allow (inbound) ports 8000, 8050, 8081, 8084, 8888, 61613.
Connectivity is available between Security Management Server and Active Directory (AD) over ports 88,
135, 389, 443, 636, 3268, 3269, 49125+ (RPC) (inbound to AD).
3
Preparation Checklist - Initial Implementation 7