Deployment Guide

Table Of Contents
Hardware must conform to minimum Hyper-V requirements
4 GB minimum RAM for dedicated image resource
Must be run as a Generation 1 Virtual Machine
See https://technet.microsoft.com/en-us/library/hh923062.aspx for more information
Security Management Server v10.2.11 has been validated with VMware ESXi 6.0, VMware ESXi 6.5, and VMware ESXi 6.5.
NOTE: When running VMware ESXi and Windows Server 2012 R2, Windows Server 2016, or Windows Server
2019, VMXNET3 Ethernet Adapters are recommended.
VMware ESXi 6.0
64-bit x86 CPU required
Host computer with at least two cores
8 GB RAM minimum recommended
See http://www.vmware.com/resources/compatibility/search.php for a complete list of supported Host Operating
Systems
Hardware must conform to minimum VMware requirements
4 GB minimum RAM for dedicated image resource
See http://pubs.vmware.com/vsphere-60/index.jsp for more information
VMware ESXi 6.5
64-bit x86 CPU required
Host computer with at least two cores
8 GB RAM minimum recommended
See http://www.vmware.com/resources/compatibility/search.php for a complete list of supported Host Operating
Systems
Hardware must conform to minimum VMware requirements
4 GB minimum RAM for dedicated image resource
See http://pubs.vmware.com/vsphere-65/index.jsp for more information
VMware ESXi 6.7
64-bit x86 CPU required
Host computer with at least two cores
8 GB RAM minimum recommended
See http://www.vmware.com/resources/compatibility/search.php for a complete list of supported Host Operating
Systems
Hardware must conform to minimum VMware requirements
4 GB minimum RAM for dedicated image resource
See http://pubs.vmware.com/vsphere-65/index.jsp for more information
NOTE:
The SQL Server database hosting the Security Management Server must be run on a separate computer for
performance reasons.
SQL Server
In larger environments, it is highly recommended that the SQL Database server run on a redundant system, such as a SQL
Cluster, to ensure availability and data continuity. It is also recommended to perform daily full backups with transactional logging
enabled to ensure that any newly generated keys through user/device activation are recoverable.
Database maintenance tasks should include rebuilding database indexes and collecting statistics.
Software
The following table details the software requirements for the Security Management Server and proxy server.
NOTE:
Due to the sensitive nature of the data that the Security Management Server holds, and to align with the rule of
least privilege, it is recommended that you install the Security Management Server on its own dedicated operating system
or to be a part of an application server that has limited roles and rights that are enabled to help ensure a secure
environment. This recommendation includes not installing the Security Management Server on privileged infrastructure
Requirements and Architecture 9