How to: Install Symantec Endpoint Encryption 11

book

Article ID: 178336

calendar_today

Updated On:

Products

Endpoint Encryption

Issue/Introduction

 

Resolution

The installation of Symantec Endpoint Encryption 11 includes installing the software, connecting and configuring the software with the database, installing the Management Console, and then adding snap-ins for the desired clients. Prior to installing the software, make sure your computer meets the prerequisites in the following section.

Completing the installation of the Symantec Endpoint Encryption consists of the following steps:

  1. Verifying the server prerequisites
     
  2. Installing the server software
     
  3. Connecting the server to the database
     
  4. Configure the database
     

Prerequisites

Before you install Symantec Endpoint Encryption

Complete the following tasks before you attempt to install Symantec Endpoint Encryption:

  • Verify that your computers meet the system requirements. See article TECH224478 for the system requirements.
     
  • Symantec Endpoint Encryption .NET requirements - See article TECH225652 for more information.
     
  • Verify that the Symantec Endpoint Encryption Management Server is a member of an Active Directory domain.
     
  • Add required user and system accounts, see article TECH225278 for more information.
     
  • Add prerequisites to the server including Internet Information Services (IIS), the .NET framework, and other tools.
    See article HOWTO101921 for enabling the prerequisite server roles and features.
     
  • Configure your TLS/SSL communications (if applicable). See article TECH225339.
     
  • Set up database access account rights, see article HOWTO101951.
     
  • Symantec Endpoint Encryption Protocols and Ports, see article TECH225115.
     

Installation

Running the installation MSI

The installer can be started by running the SEE Management Server.msi file on your Symantec Endpoint Encryption Management Server or by using the command line to start the installer.

Note: Symantec recommends installing via the command line which allows you to specify an output log file that you can use to troubleshoot any installation problems.

To run the installer:

  1. To log on to the server, do one of the following:

    • If your database creation account is a Microsoft Windows account, log on to the server using the account that you used to create the database.
       
    • If your database creation account is a Microsoft SQL account, log on to the server using a Microsoft Windows domain account. The account must have local administrator rights.
       
  2. Copy the installation .MSI file to the local hard disk of the Symantec Endpoint Encryption Management Server. This file is SEE Management Server.msi.
     
  3. Click Start > All Programs > Accessories. Right-click Command prompt and click Run as administrator. If you are prompted, enter the credentials of a domain administrator account.
     
  4. In the command prompt window, enter the following command:

    MSIEXEC /I "[path]\SEE Management Server.msi" /lvx "[logpath]\logfile"

    Where [logpath]\logfile represents the path and name of the output log file.
     

^Jump to Top


Connecting the server to the database

It is recommended to use a dedicated database server. However, you can also install the Symantec Endpoint Encryption database locally on the Symantec Endpoint Encryption Management Server if you install a supported version of Microsoft SQL Server.

To connect to the database:

  1. On the Welcome page of the installation wizard, click Next.
     
  2. In the License agreement page, click I accept the terms in the license agreement and click Next.
     
  3. On the Database Location and Credentials page, in the Database Instance field, specify the location of the Microsoft SQL Server that hosts the Symantec Endpoint Encryption database. Use one of the following methods:

    • To open the list and select an instance that is local to your current computer, click the arrow.
    • To select from a list of instances on the network, click Browse.
    • Enter the NetBIOS name of the instance. For example, SEEDB-01. If it is a named instance, you must also include the name of the instance. For example, SEEDB-01\NAMEDINSTANCE.
       
  4. (Optional) Click Enable TLS/SSL to encrypt all communications between the Symantec Endpoint Encryption Management Server and the Symantec Endpoint Encryption database.

    See About configuring TLS/SSL communications for Symantec Endpoint Encryption
     
  5. If your database server is configured to use a custom port, select Customport number, then enter the custom port number.
     
  6. To specify your database creation account do one of the following:

    • To use the Microsoft Windows account that you are currently logged on with, click Windows authentication.
    • To enter the credentials of a Microsoft SQL Server account, click SQL authentication.
       
  7. Click Next.
     
  8. On the Database Access page, do one of the following:

    • When installing the Symantec Endpoint Encryption Management Server for the first time, click Create a new database. You can accept the default database name of SEEMSDb. You can also enter a unique custom name.
       
    • When reinstalling the Symantec Endpoint Encryption Management Server and you want to use an existing Symantec Endpoint Encryption database, click Use existing database.
       
  9. Click Next.
     
  10. Choose the authentication method (SQL authentication or Microsoft Windows authentication) and enter the account login credentials.
     
  11. Click Next.
     

^Jump to Top


Configuring the database

Even though the Database Configuration page lets you specify custom configuration settings, it is recommended to accept the default configuration settings. If needed, you can change the database configuration settings later using the Microsoft SQL Server tool of your choice.

Warning: Do not use the Symantec Endpoint Encryption Configuration Manager to change configuration settings. The size settings can only be increased and not decreased. In addition, changing the paths requires you to detach and reattach the Symantec Endpoint Encryption database.

Configure the database

  1. In the Database Configuration page, do one of the following:

    • (Recommended) To accept the default database configuration, leave the Customize my database configurations check box deselected.
    • To specify your configuration settings as follows, click Customize my database configurations:
    • Enter the paths to the data file and the log file. The directories in this path must already exist on the server hosting the Symantec Endpoint Encryption database. The installer does not create the directories.
    • Type file size values in megabytes for the data and log files (autogrowth size, initial size, and maximum size). Make sure that the server hosting the Symantec Endpoint Encryption database has sufficient space for the data and log files.
       
  2. Click Next.
     
  3. In the SEE Management Password dialog box, set the Symantec Endpoint Encryption Management Password. See the following article for important information on the Management Password.

    Warning: Do not lose your Management Password as Symantec cannot recover this password if you lose it. If you lose your Management Password you must reinstall the Management Server.

    Symantec recommends that you protect and store your Management Password in a safe location.
     
  4. In the destination folder page, you can change the destination of where the wizard installs the Symantec Endpoint Encryption Management Server files.

    Note: To choose a different location to install the Symantec Endpoint Encryption Management Server files, click Change, or click Next to accept the default installation location.
     
  5. In the Ready to Install the Program page, click Install.
     
  6. Click Finish.

    The Symantec Endpoint Encryption Management Server Configuration Wizard launches.
     

Note: After the initial installation is complete, see article HOWTO101973 Configuring the Symantec Endpoint Encryption Management Server.

^Jump to Top