Deployment Guide
Manuals
Brands
Dell Manuals
Converged Infrastructure
Endpoint Security Suite Enterprise
11
12
13
14
15
16
17
18
19
20
Table Of Contents
Getting Started Dell Data Security Implementation Services
Contents
Implementation Phases
Kick-off and Requirements Review
Client Documents
Server documents
Preparation Checklist - Initial Implementation
Security Management Server Initial Implementation Checklist
Security Management Server Virtual Initial Implementation Checklist
Preparation Checklist - Upgrade/Migration
Architecture
Security Management Server Virtual Architecture Design
Ports
Security Management Server Architecture Design
Ports
SQL Server Best Practices
Example Customer Notification Email
N
O
T
E
:
I
f
t
h
e
o
r
g
a
n
i
z
a
t
i
o
n
h
a
s
m
o
r
e
t
h
a
n
2
0
,
0
0
0
e
n
d
p
o
i
n
t
s
,
p
l
e
a
s
e
c
o
n
t
a
c
t
D
e
l
l
P
r
o
S
u
p
p
o
r
t
f
o
r
a
s
s
i
s
t
a
n
c
e
.
P
o
r
t
s
T
h
e
f
o
l
l
o
w
i
n
g
t
a
b
l
e
d
e
s
c
r
i
b
e
s
e
a
c
h
c
o
m
p
o
n
e
n
t
a
n
d
i
t
s
f
u
n
c
t
i
o
n
.
2
0
A
r
c
h
i
t
e
c
t
u
r
e
1
...
...
18
19
20
21
22
...
...
25