Deployment Guide

Table Of Contents
Requirements and Architecture
This section details hardware and software requirements and architecture design recommendations for Dell Security
Management Server implementation.
Security Management Server Architecture Design
Encryption Enterprise and Endpoint Security Suite Enterprise solutions are highly scalable products, based on the number of
endpoints targeted for encryption in your organization.
Architecture Components
Below are suggested hardware configurations that suit most environments.
Security Management Server
Operating System: Windows Server 2012 R2 (Standard, Datacenter 64-bit), Windows Server 2016 (Standard, Datacenter
64-bit), Windows Server 2019 (Standard, Datacenter)
Virtual/Physical Machine
CPU: 4 Core(s)
RAM: 16.00 GB
Drive C: 30 GB available disk space for logs and application databases
NOTE: Up to 10GB may be consumed for a local event database stored within PostgreSQL.
Proxy Server
Operating System: Windows Server 2012 R2 (Standard, Datacenter 64-bit), Windows Server 2016 (Standard, Datacenter
64-bit), Windows Server 2019 (Standard, Datacenter)
Virtual/Physical Machine
CPU: 2 Core(s)
RAM: 8.00 GB
Drive C: 20 GB available disk space for logs
SQL Server Hardware Specs
CPU: 4 Core(s)
RAM: 24.00 GB
Data Drive: 100 -150 GB of available disk space (this may vary based on environment)
Log Drive: 50 GB of available disk space (this may vary based on environment)
NOTE:
Dell recommends to follow SQL Server Best Practices, though the above information should cover the majority
of environments.
Below is a basic deployment for the Dell Security Management Server.
2
6 Requirements and Architecture