2.1 Implementation Checklist

This chapter provides planning information for installation only. If you are upgrading from a previous version, do not use this installation checklist. For more information about upgrading, see Upgrading Secure Configuration Manager.

Checklist Items

  1. Review product architecture information to learn about Secure Configuration Manager components.

    For more information, see Understanding the Secure Configuration Manager Architecture.

  1. Decide the deployment type, and how you want to configure your component installation.

    For more information, see Deployment Considerations and Supported Configurations.

  1. Ensure that the computers on which you are installing Secure Configuration Manager components meet the specified requirements.

    For more information, see the following sections:

  1. Ensure that the user account you use to install Secure Configuration Manager components is a member of the Administrators local group on the computer.

  1. Ensure that you have SQL Server configured properly to allow Secure Configuration Manager to connect to the database.

    For more information, see Installing and Configuring Microsoft SQL Server.

  1. Install the primary Secure Configuration Manager components.

    NOTE:You can install the Dashboard also while installing Secure Configuration Manager.

    For more information, see Installing Core Services, Database, and the Consoles.

  1. Install the Dashboard.

    For more information, see Section 7.0, Planning to Install the Dashboard.

    NOTE:You can install the Secure Configuration Manager Dashboard while installing Secure Configuration Manager.

  1. Install or deploy your agents.

    For more information, see Section 9.0, Adding or Updating Security Agents.

  1. Start the Windows console so you can add additional console users.

    For more information, see Starting the Consoles.

  1. Configure Secure Configuration Manager to work with the agents.

    For more information, see Section 9.0, Adding or Updating Security Agents.

  1. (Conditional) Deploy the standalone AutoSync client on a separate computer. By default, the AutoSync client is installed along with Secure Configuration Manager components.

    For more information about deploying the standalone AutoSync client, see Deploying the Standalone AutoSync Client.