Completing the installation process - Security Center 5.8 GA

Security Center Installation and Upgrade Guide 5.8 GA

series
Security Center 5.8 GA
revised_modified
2019-09-27
category_custom
Guides
Guides > Installation guides
prodname_custom
Security Center unified platform > Security Center
vrm_version
5.8

After you install Security Center, there is a series of steps you can perform to check the status of your system.

Before you begin

Install Security Center.

Procedure

  1. Log on to Server Admin, click Overview, and check the following:
    • Directory database is connected ().
    • Directory is ready ().
    • License is valid () with all features confirmed.
    • All servers are connected ()
    • SMA number is confirmed with expiration date.
    • Genetecâ„¢ Watchdog, connection, and SMTP settings.
  2. Under Servers (), click the main server (), and check the following:
    • Automatic Directory database backup is enabled and configured.

      Check under Database properties ().

    • Data collection policy is properly configured.
    • Network interface card (NIC) is properly selected.
    • Server authentication certificate is configured.
  3. Under Servers (), click each expansion server, and check the following:
    • NIC is properly selected.
    • Server authentication certificate is configured.
  4. Log on to Config Tool, open the Network view, and check the following:
    • All servers are online with no health issues.
    • Proper network protocol is in use based on network capabilities.
    • Public addresses are configured properly where needed.
  5. Open the System task, and then click Roles.
  6. For every Security Center role, check the following:
    • Role is online with no health issues (not displayed in a yellow warning state).
    • Role database is connected.
    • Automatic backup of the role database is configured (if required).
    • Proper NIC is selected for the role, and in the case of the Media Router, for each redirector.
  7. Open the User management task, and ensure that the Admin user has a password.
  8. Check that you can log on to Security Center with Security Desk.
  9. On the server, check for the following:
    • The storage drive has sufficient free space left.
    • Windows storage indexing is disabled on all drives to be used for video archiving.
    • Order of the NICs displayed in the Adapters and Bindings settings is configured properly.
    • Unused NICs are disabled.
    • Server is not a domain controller.
    • Windows Update is not configured to automatically reboot the server after installation of updates.
    • Windows clock is synchronized to a time source.
    • No unwanted application is running.
    • No crash or restart is shown in the Windows Event Viewer.
    • System antivirus is configured properly (if required) and all exclusions are made.
  10. Follow the best practices for configuring Windows to work with Security Center.

After you finish

Depending on your deployment requirements, configure your system for:
  • Video surveillance and management
  • Access control
  • License Plate Recognition
  • User management
    • Configure user groups and partitions.

For information about how to enhance the security of your Genetecâ„¢ Security Center system, see the Security Center Hardening Guide.