After you install Security Center, there is a
series of steps you can perform to check the status of your
system.
Procedure
-
Log on to Server
Admin, click
Overview, and check the following:
- Directory database is connected (
).
- Directory is ready (
).
- License is valid (
) with all
features confirmed.
- All servers are connected (
)
- SMA number is confirmed with expiration date.
- Genetecâ„¢ Watchdog,
connection, and SMTP settings.
-
Under Servers (
), click the main server (
), and check the
following:
-
Under Servers (
), click each expansion server, and
check the following:
- NIC is properly selected.
- Server authentication certificate is configured.
-
Log on to Config
Tool, open the
Network view, and check the following:
- All servers are online with no health issues.
- Proper network protocol is in use based on network capabilities.
- Public addresses are configured properly where needed.
-
Open the System task, and then click
Roles.
-
For every Security Center role, check
the following:
- Role is online with no health issues (not displayed in a yellow warning
state).
- Role database is connected.
- Automatic backup of the role database is configured (if required).
- Proper NIC is selected for the role, and in the case of the Media
Router, for each redirector.
-
Open the User management task, and ensure that the
Admin user has a password.
-
Check that you can log on to Security Center with Security
Desk.
-
On the server, check for the following:
- The storage drive has sufficient free space left.
- Windows storage indexing is disabled on all drives to be used for video
archiving.
- Order of the NICs displayed in the Adapters and
Bindings settings is configured properly.
- Unused NICs are disabled.
- Server is not a domain controller.
- Windows Update is not configured to automatically reboot the server
after installation of updates.
- Windows clock is synchronized to a time source.
- No unwanted application is running.
- No crash or restart is shown in the Windows Event Viewer.
- System antivirus is configured properly (if required) and all exclusions
are made.
-
Follow the best practices for configuring Windows to
work with Security Center.
After you finish
Depending on your deployment requirements, configure your
system for:
- Video surveillance and management
- Access control
- License Plate Recognition
- User management
- Configure user groups and partitions.
For
information about how to enhance the security of your Genetecâ„¢
Security Center system, see the Security Center Hardening
Guide.