The Endpoint Security Manager requires a database
that is managed over the SQL Server platform (for supported SQL
Server versions, see Database
Software Requirements). The Endpoint Security Manager uses
the database to store administrative information, security policy
rules, information about security events, and other information.
installing the Endpoint Security Manager, configure the SQL database
with the required permissions. When using Windows Authentication
as the user authentication method, the owner must have rights to
on as a service
and be a local administrator on the ESM Server.
following procedure is recommended as a best practice for creating
and configuring the MS-SQL Server database.
Create a new database.
SQL Server Management
to open Microsoft
SQL Server Management Studio.
Configure the database settings.
The database owner that you specify must already exist
as a local or domain administrator.