Deployment Guide
Manuals
Brands
Dell Manuals
Converged Infrastructure
Endpoint Security Suite Pro
16
17
18
19
20
21
22
23
24
25
Table Of Contents
Getting Started Dell Data Security Implementation Services
Contents
Implementation Phases
Kick-off and Requirements Review
Client Documents
Server documents
Preparation Checklist - Initial Implementation
Security Management Server Initial Implementation Checklist
Security Management Server Virtual Initial Implementation Checklist
Preparation Checklist - Upgrade/Migration
Architecture
Security Management Server Virtual Architecture Design
Ports
Security Management Server Architecture Design
Ports
SQL Server Best Practices
Example Customer Notification Email
N
a
m
e
D
e
f
a
u
l
t
P
o
r
t
D
e
s
c
r
i
p
t
i
o
n
C
l
i
e
n
t
A
u
t
h
e
n
t
i
c
a
t
i
o
n
H
T
T
P
S
/
8
4
4
9
A
l
l
o
w
s
c
l
i
e
n
t
s
e
r
v
e
r
s
t
o
a
u
t
h
e
n
t
i
c
a
t
e
w
i
t
h
D
e
l
l
S
e
r
v
e
r
.
R
e
q
u
i
r
e
d
f
o
r
S
e
r
v
e
r
E
n
c
r
y
p
t
i
o
n
.
A
r
c
h
i
t
e
c
t
u
r
e
2
3
1
...
...
21
22
23
24
25