Completing the installation process - Security Center 5.9.1.0

Security Center Installation and Upgrade Guide 5.9.1.0

Applies to
Security Center 5.9.1.0
Last updated
2020-04-24
Content type
Guides
Guides > Installation guides
Language
English
Product
Security Center
Version
5.9

After you install Security Center, there is a series of steps you can perform to check the status of your system.

Before you begin

Install Security Center.

Procedure

  1. Log on to Server Admin, click Overview, and check the following:
    • Directory database is connected ().
    • Directory is ready ().
    • License is valid () with all features confirmed.
    • All servers are connected ()
    • SMA number is confirmed with expiration date.
    • Genetecâ„¢ Watchdog, connection, and SMTP settings.
  2. Under Servers (), click the main server (), and check the following:
    • Automatic Directory database backup is enabled and configured.

      Check under Database properties ().

    • Data collection policy is properly configured.
    • Network interface card (NIC) is properly selected.
    • Server authentication certificate is configured.
  3. Under Servers (), click each expansion server, and check the following:
    • NIC is properly selected.
    • Server authentication certificate is configured.
  4. Log on to Config Tool, open the Network view, and check the following:
    • All servers are online with no health issues.
    • Proper network protocol is in use based on network capabilities.
    • Public addresses are configured properly where needed.
  5. Open the System task, and then click Roles.
  6. For every Security Center role, check the following:
    • Role is online with no health issues (not displayed in a yellow warning state).
    • Role database is connected.
    • Automatic backup of the role database is configured (if required).
    • Proper NIC is selected for the role, and in the case of the Media Router, for each redirector.
  7. Open the User management task, and ensure that the Admin user has a password.
  8. Check that you can log on to Security Center with Security Desk.
  9. On the server, check for the following:
    • The storage drive has sufficient free space left.
    • Windows storage indexing is disabled on all drives to be used for video archiving.
    • Order of the NICs displayed in the Adapters and Bindings settings is configured properly.
    • Unused NICs are disabled.
    • Server is not a domain controller.
    • Windows Update is not configured to automatically reboot the server after installation of updates.
    • Windows clock is synchronized to a time source.
    • No unwanted application is running.
    • No crash or restart is shown in the Windows Event Viewer.
    • System antivirus is configured properly (if required) and all exclusions are made.
  10. Follow the best practices for configuring Windows to work with Security Center.

After you finish

Depending on your deployment requirements, configure your system for:
  • Video surveillance and management
  • Access control
  • License Plate Recognition
  • User management
    • Configure user groups and partitions.

For information about how to enhance the security of your Genetecâ„¢ Security Center system, see the Security Center Hardening Guide.