Installing Security Center - Security Center 5.7 SR1

Security Center Installation and Upgrade Guide 5.7 SR1

Security Center 5.7 SR1

When you are ready to install Security Center, you must perform the following steps.

Before you begin

Go through the pre-installation checklist.

What you should know

  • If you need to install the Security Center Server on a computer after you have installed Security Center Client, always use the downloaded Security Center package. Using the Change option from Programs and Features will not install the SQL Express component you need.
  • The Security Center Installer does not support the use of mapped drives in your path specifications.
  • During the Security Center installation, you are given the option of allowing Security Center to create firewall rules for its applications. If you select this option, all Security Center applications are added as exceptions to the internal Windows firewall. However, you still must make sure that all the ports used by Security Center are open.

    You can configure different port numbers than the ones that are used by default.


  1. (Optional) Install SQL Server on a separate drive from the OS drive.
    SQL Server is typically installed automatically with Security Center. Installing SQL Server separately depends on your deployment requirements.
  2. Install Security Center components on the main server that will host the Directory role.
  3. Activate your product license on the main server.
  4. Make sure that all ports used by Security Center are open and redirected for firewall and network address translation purposes.
    For a list of default ports used by Security Center, see Which ports are used in Security Center 5.0 and later?.
  5. (Optional) Install Security Center components on any expansion servers that will connect to the main server to add processing power to your Security Center system.
  6. Install Security Center Client (Config Tool, Security Desk, or both).
  7. Unblock any blocked files.

After you finish

Go through the post-installation checklist.