Configure the MS-SQL Server Database
The Endpoint Security Manager requires a database that is managed over the SQL Server platform (for supported SQL Server versions, see Database Software Requirements). The Endpoint Security Manager uses the database to store administrative information, security policy rules, information about security events, and other information.
Before installing the Endpoint Security Manager, configure the SQL database with the required permissions. When using Windows Authentication as the user authentication method, the owner must have rights to Log on as a service and be a local administrator on the ESM Server.
The following procedure is recommended as a best practice for creating and configuring the MS-SQL Server database.
- Create a new database.
- Select SQL Server Management Studio from the Start menu.
- Click Connect to open Microsoft SQL Server Management Studio.
- Right-click Databases and then select New Database.
- Configure the database settings.The database owner that you specify must already exist as a local or domain administrator.
- Enter the Database name.
- Select the database Owner:
- Click the ellipsis ( ) button.
- Enter the object name in the format [domain\user] or Browse to an object name.
- Select Check Names to validate the database owner.
- Click OK and then click OK again.
- Verify the database owner privileges.
- Expand the database you created and then select SecurityUsers.
- Double-click dbo.
- Select the Owned Schemas page and then select db_owner.
- Select the Membership page and then select db_owner.
- Click OK.
Install the Endpoint Security Manager Server Software
Install the Endpoint Security Manager Server Software To install the Endpoint Security Manager (ESM) Server software: Before you begin: Verify that the server meets the ...
Install the Endpoint Security Manager Console Software
Install the Endpoint Security Manager Console Software You can install the ESM Console software on a dedicated server or on the same server as the ...
Database The database stores administrative information, security policy rules, endpoint history, and other information about security events. The database is managed over the MS-SQL platform. ...
Database Software Requirements
Database Software Requirements The server-side applications require an SQL database that can be either a local database installed on the same server as the ESM ...
Why can’t I log in to the ESM Console?
Why can’t I log in to the ESM Console? Symptom The Endpoint Security Manager (ESM) Console displays an error message that the username or password ...
Upgrade to Traps 4.1
Upgrade to Traps 4.1 The Traps™ 4.1 release comprises the Endpoint Security Manager (ESM) Server, the ESM Console, and the Traps agent. Use the following ...
Set Up the Endpoint Security Manager
Set Up the Endpoint Security Manager Endpoint Infrastructure Installation Considerations TLS/SSL Encryption for Traps Components Configure the MS-SQL Server Database Install the Endpoint Security Manager ...
Set Up Traps in a VDI Environment Overview
Set Up Traps in a VDI Environment Overview Use the following workflow to set up Traps in a VDI environment. Review the installation considerations and ...
Set Up the Endpoint Infrastructure
Set Up the Endpoint Infrastructure Use the following workflow to set up the Endpoint infrastructure or, to upgrade your existing Endpoint infrastructure, use the workflow ...