2.1 Implementation Checklist

This chapter provides planning information for installation only. If you are upgrading from a previous version, do not use this installation checklist. For more information about upgrading, see Section 5.3, Upgrading Secure Configuration Manager.

 

Checklist Items

  1. Review product architecture information to learn about Secure Configuration Manager components. For more information, see Section 1.2, Understanding the Secure Configuration Manager Architecture.

  1. Decide how you want to configure your component installation. For more information, see Section 2.5.1, Supported Configurations.

  1. Ensure that the computers on which you are installing Secure Configuration Manager components meet the specified requirements. For more information, see Section 2.5.3, Planning to Install Your Database, Section 2.5.4, Planning to Install Your Core Services, and Section 2.5.5, Planning to Install Secure Configuration Manager Consoles.

  1. Ensure that the system environment variables on the Secure Configuration Manager database computer support the installation process. For more information, see Database Computer Requirements.

  1. Ensure that you have SQL Server or SQL Server Express configured properly to allow Secure Configuration Manager to connect to the database. For more information, see Planning to Install Secure Configuration Manager.

    IMPORTANT:Before beginning to install Secure Configuration Manager, close all the windows that are open against Vigilent database in SQL Server Management Studio.

    NOTE:NetIQ Corporation recommends using SQL Server Express for trial environments only. To ensure best performance, do not use the Secure Configuration Manager database with SQL Server Express.

  1. (Optional) Ensure that the computers on which you are installing the Secure Configuration Manager Dashboard meet the specified requirements. For more information, see the NetIQ Secure Configuration Manager Dashboard User Guide.

  1. Install Secure Configuration Manager. For more information, see Section 3.2, Installing Secure Configuration Manager Components.

    NOTE:(Optional) You can install the Secure Configuration Manager Dashboard while installing Secure Configuration Manager.

  1. Ensure that the computers to which you are deploying agents meet the specified requirements. For more information, see Section 2.5.6, Planning to Install Agents.

  1. Install your agents. For more information, see Section 2.5.6, Planning to Install Agents.

  1. (Conditional) If Core Services is not running, start Core Services. For more information, see Section 6.2, Starting Core Services.

  1. Start the Secure Configuration Manager console. For more information, see Section 6.3, Starting the Secure Configuration Manager Console.

  1. Configure Secure Configuration Manager to work with the agents. For more information, see Section 2.5.6, Planning to Install Agents.