To make sure that your Security Center installation goes smoothly, you must perform a series of pre-configuration steps.
CAUTION:
Do not use the image of a configured machine
to install Security Center Server on similar
machines. Security Center installer creates
unique IDs when it runs for the first time on a machine. These IDs are stored in
configuration files and the Directory database. If these IDs are duplicated, it causes
conflicts with the entities in the system that share the identifiers. This might make
the system unusable.
Step | Task | Additional information |
---|---|---|
Review your system compatibility | ||
1 | Read the release notes for any known issues, limitations, and other information about the release. | |
2 | Review the system requirements to ensure that the minimum hardware (servers and workstations) and software requirements (Windows, web browser, and so on) are met. | |
3 | Read the installation prerequisites for your release. Security Center Installer automatically verifies and installs the software prerequisites on your system, but it is a good practice to know what they are beforehand. |
|
4 | Read the best practices for configuring Windows to work with Security Center. To ensure the optimal performance of your system, you must follow these recommendations after installing Security Center |
|
Review your system components | ||
5 | Create a list of the computers that will be part of your new system, and
decide what software components need to be installed on each. IMPORTANT: Server
names must be 15 characters or fewer. Security Center truncates all server
names longer than 15 characters, causing errors when the system tries
to access those servers.
|
Your system requires the following components:
|
6 | If you plan to use restricted cameras, do the following:
|
Cameras developed by some manufacturers have been restricted due to a
higher cybersecurity risk profile. These cameras require a special
connection license, in addition to the normal camera license. To view a list of manufacturers that require a restricted license, use the Restricted License Type filter on the Supported Device List. |
Verify your network connections | ||
7 | Verify the network connections between your servers, workstations, and units. | Make sure that the ports required by Security Center are open and redirected for firewall and NAT purposes. |
8 | Verify the unicast and multicast network connections and settings. | Security Center does not modify your network infrastructure or how it works. Multicast works with Security Center out of the box automatically, as long as the network supports the necessary load. If multicast is the only protocol configured, Security Center will not switch to a different protocol if multicast is blocked, and video will not get recorded. |
Verify your user permissions | ||
9 | Make sure you have administrative privileges. If not, run the installation setup.exe as administrator. | You might need to be a Microsoft Windows Domain administrator to access databases and storage on the machines. Check with your IT administrator. |
10 | Grant the service users all necessary SQL Server permissions. | |
Set up additional software as needed | ||
11 | If you are implementing role failover or VSS operation, install SQL Server yourself. | |
12 | If you are running Windows Server 2012 or Windows Server 2016, activate the Media Foundation feature. | |
Prepare your installation package | ||
13 | Download the Security Center installation package. |
|
14 | Unblock any blocked files. |
|
15 | Have your system ID and password in hand to activate your license on the main server. | Your System ID and password are found in the Security Center License Information document. Genetec™ Inside Sales or Genetec™ Customer Service sends you this document when you purchase the product. |
16 | Install Security Center. |