Pre-installation checklist for Security Center - Security Center

Security Center Installation and Upgrade Guide

Security Center
Content type
Guides > Installation guides
Last updated

To make sure that your Security Center installation goes smoothly, you must perform a series of pre-configuration steps.

Do not use the image of a configured machine to install Security Center Server on similar machines. Security Center installer creates unique IDs when it runs for the first time on a machine. These IDs are stored in configuration files and the Directory database. If these IDs are duplicated, it causes conflicts with the entities in the system that share the identifiers. This might make the system unusable.
Step Task Additional information
Review your system compatibility
1 Read the release notes for any known issues, limitations, and other information about the release.
2 Review the system requirements to ensure that the minimum hardware (servers and workstations) and software requirements (Windows, web browser, and so on) are met.
3 Read the installation prerequisites for your release.

Security Center Installer automatically verifies and installs the software prerequisites on your system, but it is a good practice to know what they are beforehand.

4 Read the best practices for configuring Windows to work with Security Center. To ensure the optimal performance of your system, you must follow these recommendations after installing Security Center
Review your system components
5 Create a list of the computers that will be part of your new system, and decide what software components need to be installed on each.
IMPORTANT: Server names must be 15 characters or fewer. Security Center truncates all server names longer than 15 characters, causing errors when the system tries to access those servers.
Your system requires the following components:
  • Security Center Server (main or expansion server)
  • Security Center Client (Config Tool, Security Desk, or both)
  • SQL Server (Express, Standard, or Enterprise edition)
6 If you plan to use restricted cameras, do the following:
  1. Contact your sales representative to obtain a special connection license for your restricted camera connections.
  2. Sign the “Exclusion of Liability and Hold Harmless” waiver.
Cameras developed by some manufacturers have been restricted due to a higher cybersecurity risk profile. These cameras require a special connection license, in addition to the normal camera license.

To view a list of manufacturers that require a restricted license, use the Restricted License Type filter on the Supported Device List.

Verify your network connections
7 Verify the network connections between your servers, workstations, and units. Make sure that the ports required by Security Center are open and redirected for firewall and NAT purposes.
8 Verify the unicast and multicast network connections and settings. Security Center does not modify your network infrastructure or how it works. Multicast works with Security Center out of the box automatically, as long as the network supports the necessary load. If multicast is the only protocol configured, Security Center will not switch to a different protocol if multicast is blocked, and video will not get recorded.
Verify your user permissions
9 Make sure you have administrative privileges. If not, run the installation setup.exe as administrator. You might need to be a Microsoft Windows Domain administrator to access databases and storage on the machines. Check with your IT administrator.
10 Grant the service users all necessary SQL Server permissions.
Set up additional software as needed
11 If you are implementing role failover or VSS operation, install SQL Server yourself.
12 If you are running Windows Server 2012 or Windows Server 2016, activate the Media Foundation feature.
Prepare your installation package
13 Download the Security Center installation package.
14 Unblock any blocked files.
  • Unlocking downloaded files to avoid security warnings.
  • After downloading the Security Center installation package, compressed files might need to be unblocked before their contents are extracted.
15 Have your system ID and password in hand to activate your license on the main server. Your System ID and password are found in the Security Center License Information document. Genetec™ Inside Sales or Genetec™ Customer Service sends you this document when you purchase the product.
16 Install Security Center.