Installation Guide SCM
Installation Guide SCM
For information about NetIQ trademarks, see http://www.netiq.com/company/legal/. All third-party trademarks are the property
of their respective owners.
About This Book
The Installation Guide provides instructions for upgrading and installing Secure Configuration
Manager. This book also includes guidance for initial configuration to get you started.
Intended Audience
This book provides information for individuals responsible for installing, configuring, and upgrading
Secure Configuration Manager.
Additional Documentation
The Secure Configuration Manager documentation library includes the following resources:
For the most recent version of this guide and other Secure Configuration Manager documentation
resources, visit the Secure Configuration Manager website.
Contact Information
We want to hear your comments and suggestions about this book and the other documentation
included with this product. You can use the comment on this topic link at the bottom of each page of
the online documentation, or send an email to [email protected].
For specific product issues, contact Micro Focus Customer Care at https://www.microfocus.com/
support-and-services/.
1 Introduction 9
Understanding the Secure Configuration Manager Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Understanding the Secure Configuration Manager Architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2 Planning Overview 15
Implementation Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Understanding Licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Planning to Install a Trial Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Deployment Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
All-in-One Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Distributed Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Multiple Core Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Recommended Server Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Supported Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Support for Non-English Language Operating System and Database Versions . . . . . . . . . . . . . . . . 20
FIPS Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Default Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Contents 5
Agent Computer Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
6 Contents
Configuring the Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Configuring the Dashboard for a Distributed Environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Customizing the Dashboard Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Contents 7
8
1 Introduction
1
NetIQ Secure Configuration Manager helps IT security professionals automate compliance with
regulations and internal security policies, and meet the demands of auditors. It allows you to
proactively identify and prioritize the remediation of misconfigurations that could lead to security
breaches, failed audits, or costly server downtime.
Secure Configuration Manager deploys agents to collect information, stores information in a central
database, and displays reports in the Secure Configuration Manager consoles. Secure
Configuration Manager Core Services manages communication among the components.
Secure Configuration Manager includes the components listed in the following table.
Component Description
Agents Receive requests from Core Services and run commands or respond by
returning data, status, or results. Agents run platform-specific software locally on
assets throughout your enterprise.
Core Services Communicates between agents, the database, and consoles to perform the
following functions:
Database Stores product configuration data and results from security checkup reports in
Microsoft SQL Server format.
Introduction 9
Component Description
Web console Serves as a browser-based interface for Secure Configuration Manager so you
can perform the following functions:
Get a high-level view of your IT assets, including the status of their health,
compliance, and risk to your enterprise security
Create dynamic reports that combine the results of multiple policy
templates and endpoints
View and manage endpoints and groups
Execute security checks and run policy templates so you can perform a
granular assessment of specific groups and endpoints
Create and apply saved lists for security check parameters
Create and apply exceptions to assessment results
Create and apply tags to endpoints and policy templates
View the status of jobs
Launch the Dashboard without having to log in again
NOTE: With the introduction of Secure Configuration Manager 7.0, this console
replaces some functionality provided by the Windows console.
Windows console Serves as the original interface for Secure Configuration Manager so you can
perform the following functions:
10 Introduction
Understanding the Secure Configuration Manager
Architecture
You can install the Secure Configuration Manager components on separate servers. When planning
where to install the components, refer to the following architecture diagram.
The UNIX and Windows security agents have individual installation programs. However, when you
install Secure Configuration Manager, the setup program automatically installs a Windows agent on
the Core Services computer. You can install the Secure Configuration Manager Dashboard either
along with Secure Configuration Manager, or separately. For more information about the security
agents and the Secure Configuration Manager, see the respective documentation in the NetIQ
Secure Configuration Manager documentation page.
Introduction 11
12 Introduction
I Planning to Install Secure
I
Configuration Manager
This section provides useful information for planning your Secure Configuration Manager
environment. To review the prerequisites and system requirements for the computers where you want
to install each component, see the installation sections for those components.
This section helps you plan the installation process for Secure Configuration Manager. Some
components must be installed in a specific order because the installation process requires access to
previously installed components. For example, you should install the Secure Configuration Manager
database before installing Core Services.
For the most recent specifications, see the Secure Configuration Manager Technical Information web
page.
Implementation Checklist
This chapter provides planning information for installation only. If you are upgrading from a previous
version, do not use this installation checklist. For more information about upgrading, see “Upgrading
Secure Configuration Manager” on page 51.
Checklist Items
For more information, see “Understanding the Secure Configuration Manager Architecture” on
page 11.
2. Decide the deployment type, and how you want to configure your component installation.
3. Ensure that the computers on which you are installing Secure Configuration Manager
components meet the specified requirements.
4. Ensure that the user account you use to install Secure Configuration Manager components is
a member of the Administrators local group on the computer.
Planning Overview 15
Checklist Items
5. Ensure that you have SQL Server configured properly to allow Secure Configuration Manager
to connect to the database.
For more information, see “Installing and Configuring Microsoft SQL Server” on page 24.
NOTE: You can install the Dashboard also while installing Secure Configuration Manager.
For more information, see “Installing Core Services, Database, and the Consoles” on
page 39.
For more information, see Chapter 7, “Planning to Install the Dashboard,” on page 35.
NOTE: You can install the Secure Configuration Manager Dashboard while installing Secure
Configuration Manager.
For more information, see Chapter 9, “Adding or Updating Security Agents,” on page 43.
9. Start the Windows console so you can add additional console users.
For more information, see Chapter 9, “Adding or Updating Security Agents,” on page 43.
11. (Conditional) Deploy the standalone AutoSync client on a separate computer. By default, the
AutoSync client is installed along with Secure Configuration Manager components.
For more information about deploying the standalone AutoSync client, see “Deploying the
Standalone AutoSync Client” on page 41.
Understanding Licensing
Secure Configuration Manager includes a license key that defines the number of servers,
workstations, and network devices that you can manage with this product. You can install the license
key during installation of the product or you can add the license key later using the Core Services
Configuration Utility. For more information, see the Help for the Core Services Configuration Utility.
NOTE: If you do not enter a valid license key, the installation program automatically applies a 30-day
trial license.
The license key defines an expiration date and the number of computers and network devices that
you can manage with Secure Configuration Manager. You can use the Tools menu in the Windows
console to check the license status of Secure Configuration Manager and the agents. The License
Status window shows information such as the number of available licenses, the number of licenses
used by registered servers, and the expiration date for the licenses.
Secure Configuration Manager requires a license for each of the following managed assets:
Network devices
You must manage these devices with a Windows security agent.
16 Planning Overview
Servers
Multi-user servers, such as a database server, might have both an operating system endpoint
and the database endpoint. This includes servers that host SCAP modules or endpoints.
Regardless of the number of endpoints, you need a single license for the server.
Workstations
Single-user workstations might have an operating system endpoint and application or database
endpoints. This includes workstations that host SCAP modules or endpoints. Regardless of the
number of endpoints, you need a single license for the workstation.
While Secure Configuration Manager does not prevent you from exceeding the number of allotted
licenses, you should request an updated license key. For more information about obtaining license
keys, see your NetIQ Corporation sales representative.
As a best practice, NetIQ recommends creating a trial environment similar to your intended
production environment. For example, install the database on a separate computer from the Core
Services and Windows console computers. However, you can install all components on one computer
to run the trial. For more information about selecting the appropriate deployment type, see
“Deployment Considerations” on page 17 and “Supported Configurations” on page 20.
Deployment Considerations
You can choose one of the following deployment types based on the size of your IT environment.
All-in-One Deployment
For small enterprises of 50 computers or fewer, you can install all Secure Configuration Manager
components on one computer. You can then install additional Windows consoles on other computers
as needed. For most console users, you do not need to install the Windows console. Rather, give
them the URL to access the Web console from a supported browser.
Distributed Deployment
For larger enterprises, install Core Services, the Dashboard, and the databases on separate
computers. The infrastructure for the Web console is installed with Core Services, so most console
users simply need the URL to access the Web console from a supported browser. However, you
Planning Overview 17
might want to install the Windows console on additional computers for those console users who need
to manage agents and other Secure Configuration Manager components. For more information, see
“Recommended Server Setup” on page 18.
NetIQ does not recommend or support installing Secure Configuration Manager components on
domain controllers for the following reasons:
When you create a local group on a domain controller, the end result is a domain group. The
local group needed to handle authentication is not created.
This configuration can also cause performance issues because the domain controller is very
busy even if you do not install Secure Configuration Manager components on that computer.
Having multiple Core Services allows you to divide managed resources, or endpoints, into managed
groups based on business units or other organizational needs. Resources managed by one Core
Services computer are completely separate from resources managed by a different Core Services.
This configuration might be appropriate if your organization needs to maintain a high level of internal
security. For more information, see “Multiple Core Services Requirements” on page 28.
Depending on the agents you are deploying, you might be able to share registered agents between
Core Services. For more information, see “Working with Multiple Core Services” on page 41
To install Secure Configuration Manager in the multiple Core Services setup, contact Technical
Support.
18 Planning Overview
Computer setup Component setup
Windows console
Windows agent
Server 2 Databases
Other servers in your environment Security Agents (UNIX or Windows) and AutoSync
Client
Windows console
Windows agent
Windows agent
Other servers in your environment Security Agents (UNIX or Windows) and AutoSync
Client
Windows console
Windows agent
Planning Overview 19
Computer setup Component setup
Windows agent
Windows agent
Windows agent
Other servers in your environment Security Agents (UNIX or Windows) and AutoSync
Client
Supported Configurations
“Support for Non-English Language Operating System and Database Versions” on page 20
“FIPS Communication” on page 20
FIPS Communication
Secure Configuration Manager supports Federal Information Processing Standard (FIPS 140-2)
communication among the product components. FIPS 140-2 standards regulate the implementation
and communication of cryptographic software. Users working under FIPS guidelines must have
Secure Configuration Manager function within a secure FIPS-enabled environment. For more
information about configuring components for FIPS communication, see the User's Guide for Secure
Configuration Manager and the security agent guides.
Default Ports
Open the ports listed in the following table on the firewall for proper communication between Secure
Configuration Manager components.
700 Security Agent for Used by the Deployment Agent and remote computer during
Windows deployment.
(Deployment
Agent)
20 Planning Overview
Port Component Port Use
Number Computer
1433 Database Used by Microsoft SQL Server if you are using a default instance of SQL
Server. This port is also used by the Windows console to listen for
communication from the database. When used by Core Services, the
port uses bi-directional communications to communicate with the
Windows console and the database.
1621 Core Services Used by Core Services to listen for communication from the Windows
agent or standalone AutoSync server when both the agent or
standalone AutoSync server and the Core Services computer are in
FIPS mode.
1622 Security Agent for Used by the Windows agent to listen for communications from Core
Windows Services. This port uses bi-directional communications.
1622 UNIX Agent Used by the UNIX agent to listen for communication from Core Services.
Core Services uses this port to run reports and actions. This port uses
bi-directional communications.
1626 Core Services Used by Core Services to communicate with Agents using SSL (Secure
Sockets Layer) protocol. Agents include Windows and UNIX agents.
SSL is a protocol developed by Netscape for ensuring security and
privacy in Internet communications. SSL uses a private key to encrypt
data that is transferred over the SSL connection.
1627 Core Services Used by Core Services to listen for communication from the Security
Agent for Windows or UNIX.
8044 Core Services Used by Core Services to communicate with the Windows console
computer. This port uses bi-directional communications.
8044 Web Server Used by the Web server that is embedded in Core Services, which
supports the Web console. The Web server uses port 8044 by default,
but this port is configurable.
2005 Security Agent for Used by the Windows agent to interact with the utility tools in Secure
Windows Configuration Manager. Ensure that this port is reserved for Secure
Configuration Manager.
NOTE: If this port is already reserved and not available for Secure
Configuration Manager, you can use any other free port, but ensure that
you change the port number in the
HKEY_LOCAL_MACHINE\SOFTWARE\NetIQ\VigilEnt registry
accordingly.
TCP 8045 Dashboard Used by the Dashboard infrastructure for communication with the
Dashboard Website.
TCP 8044 Core Services Used by the Dashboard for communication with the Secure
computer Configuration Manager Core Services computer.
TCP 9200 Analytics Used by the Dashboard for communication with Dashboard Database
Database using its REST services.
TCP 9300 Analytics Used by the Dashboard for communication with Dashboard Database
Database using its native protocol.
NOTE: If you have used non-default ports for the Analytics Database, Dashboard, and Core Services
computers, ensure that those ports are open.
Planning Overview 21
22 Planning Overview
3 Planning to Install the Databases
3
This section provides requirements, recommendations, and configuration information for the Secure
Configuration Manager database and the Analytics Databse computers. The Dashboard and the Web
console use the Analytics Database to display assessment results.
NOTE: The size of your Secure Configuration Manager database and the number of concurrent
connections can affect performance of the consoles.
For the most recent recommendations, see the NetIQ Secure Configuration Manager Technical
Information web page.
where
Security checks
Represents the total number of security checks in the policy templates scheduled to run in the
timeframe
Endpoints
Represents the number endpoints that will be assessed in the timeframe
Policy templates
Represents the number of jobs with policy templates scheduled to run in the timeframe
Timeframe
Represents the total number of minutes during which you will run the assessments
2016
2014
2012 SP2
2008 R2
Ports See the ports information in “Default Ports” on page 20.
If you are installing the Secure Configuration Manager in a distributed environment or in a cluster
environment, ensure the following:
You have write permissions to the data and log file locations of the SQL Server data directory.
A DNS Resolve method is present that queries a DNS server for the IP address associated with
a host name or vice-versa.
Follow the instructions provided in the Microsoft SQL Server documentation to install the database
software.
To verify the SQL Server or SQL Server Express Browser Service is running:
This section provides hardware, software, and permissions requirements for Core Services
computers.
The installation process for Core Services includes the infrastructure for the Web console.
The installation program automatically installs and registers a Windows agent on the Core
Services computer. You must specify a run-as account for the Windows agent service. The
account requires specific permissions, such as the ability to deploy agents to remote computers.
For more information about the Windows agent service and permissions, see the NetIQ Secure
Configuration Manager Windows Agent Installation and Configuration Guide.
Secure Configuration Manager supports IPv4 and IPv6 addresses, but uses IPv4 addresses for
communication among the console, Core Services, and the Secure Configuration Manager
database. The Core Services computer must be configured for IPv4 addresses at a minimum.
Alternatively, you can set up the Core Services computer as a dual-stack host to support both
IPv4 and IPv6 addresses.
In addition to the files installed in the Program Files folder, the installation program installs a
scmnss folder in the root directory on the Core Services computer. Do not remove the scmnss
folder or the files within the folder. Secure Configuration Manager requires these files for FIPS
communication.
If you do not enter a valid license key, the installation program automatically applies a 30-day
trial license. You can change the license key any time after installing Secure Configuration
Manager. For more information about license keys, see the Help for the Core Services
Configuration Utility.
For more information about your server setup, see “Deployment Considerations” on page 17.
Memory 6 GB
2016
2013
2010
Ports See the ports information in “Default Ports” on page 20.
Windows and UNIX agents support shared secret authentication. Therefore, you must export the
domain keys from your first Core Services, and the other Core Services must import those keys to
communicate with that agent. For more information, see “Working with Multiple Core Services” on
page 41.
Consoles
This section provides the software and permissions requirements for the computer supporting the
Web and Windows Secure Configuration Manager consoles.
Running more than 10 active consoles concurrently can reduce product performance.
The size of your Secure Configuration Manager database and the number of concurrent
connections can affect console performance. You can adjust the refresh period to improve
performance. For more information, see the User's Guide for Secure Configuration Manager.
When you install Core Services, the installation process includes the infrastructure for the Web
console. You do not need to perform a separate installation.
You must install a Windows console on the Core Services computer.
Secure Configuration Manager supports IPv4 and IPv6 addresses, but uses IPv4 addresses for
communication among the consoles, Core Services, and the Secure Configuration Manager
database. The Windows console computer must be configured for IPv4 addresses at a
minimum. Alternatively, you can set up the Windows console computer as a dual-stack host to
support both IPv4 and IPv6 addresses.
You can allow Web console users to launch the Dashboard without re-entering their credentials.
For more information, see “Enabling the Web Console to Launch the Dashboard” on page 46.
For more information about your server setup, see “Deployment Considerations” on page 17.
Google Chrome
Microsoft Edge
Microsoft Internet Explorer
Mozilla Firefox
To ensure that the Web console functions appropriately, install the Dashboard in
your environment and connect it to Core Services.
Memory 6 GB
Microsoft Excel To distribute reports in .xls format, Microsoft Excel must be installed on the Core
Services and Windows console computers.
2016
2013
2010
Microsoft XML Parser 3.2
Usage permissions The Windows user account you use to run the Windows console must be one of
the following:
If you are running the Windows console on the database computer, your account
must have write permissions to the NetIQ\Secure Configuration Manager
folder and its subfolders and must be a member of the VigilEnt_Users group.
The following table lists the agent platforms that Secure Configuration Manager supports and where
you can find the requirements for those platforms.
UNIX and Linux Installation and Configuration Guide for NetIQ Security Agent for UNIX
This section provides requirements, details of supported configurations, and other information
necessary for planning installation of the Secure Configuration Manager Dashboard.
For the most recent recommendations, see the NetIQ Secure Configuration Manager Technical
Information web page.
Memory 8 GB
Google Chrome
Microsoft Edge
Microsoft Internet Explorer
Mozilla Firefox
Ports See the ports information in “Default Ports” on page 20.
Analytics Database For more information, see “Database Computers Requirements” on page 23
When you install the Dashboard, you must install the following components:
Dashboard infrastructure, which enables display in a Web browser
Analytics Database, which communicates with Core Services and the Secure Configuration
Manager database to compile the results of assessments displayed in the Web console and
Dashboard
The user account you use to install the Dashboard must be a member of the Administrators local
group on the computer.
Web console users can launch the Dashboard without having to re-enter their credentials. To
support a single sign-on process, provide one of the following scenarios in your environment:
Install the Dashboard on the Core Services computer. The Analytics Database component
can be on a separate server. This scenario negates the need for specifying the Dashboard
settings in the Web console.
In the Web console, specify the Port and the IP address or name of the Dashboard’s Host
server. This assumes that the Dashboard is installed in the same domain as Core Services.
To support single sign-on between the Web console and the Dashboard, both URLs must use
either an IP address or a host name. That is, if you specify a host name for the Dashboard’s Host
server, then you must also use a host name in the URL for the Web console. For example,
https://testing.company.com:8044/scm and https://testing.company.com:8045/
dashboard.
If you install the Dashboard in a separate domain from Core Services, this single sign-on feature
cannot function.
For more information about your server setup, see “Deployment Considerations” on page 17.
Configuration Manager
This section provides instructions for installing or upgrading Secure Configuration Manager. For more
information about a specific release, see the Release Notes.
This chapter provides guidance for determining the appropriate installation type and outlines the
installation steps.
Installation Checklist
Install Secure Configuration Manager in a production environment by completing the following
checklist.
Checklist Items
1. Ensure that you have the appropriate licenses for the components you plan to install.
2. Locate the installation kit for Secure Configuration Manager and any agents that you plan to
install.
3. Ensure that you have the appropriate permissions for the computers on which you will be
installing components.
For more information, see “Installing Core Services, Database, and the Consoles” on
page 39.
For more information, see Chapter 9, “Adding or Updating Security Agents,” on page 43.
6. Run the AutoSync update service to download the latest security checks and policy
templates.
1 Log in as an administrator to the computer where you want to install the Secure Configuration
Manager components. Ensure that the account you are using has write permissions to the
installation directory.
2 Exit all programs on the computer.
3 Run the setup program, Setup.exe, from the root folder of the Secure Configuration Manager
installation kit.
4 Click Start Installation to start the installation.
Follow the instructions in the wizard to proceed with the installation.
5 (Optional) By default, the Core Services service runs using the local system account. If you want
to specify a different service account, complete the following steps:
5a In the Service Account field, type the user name of the account you want to assign to the
Core Services service.
5b In the Password field, type the password for the specified service account.
5c If you want to use a non-default port for Core Services, deselect the Use Default Port
option, and specify the port in the Core Port field.
5d Click Next.
The setup wizard validates the specified service account.
6 (Optional) To specify the SQL server connection, complete the following steps:
6a Specify the server name.
6b Specify the port number in the Database Port field if you want to use a non-default port.
6c Select the type of authentication you want use to connect to the SQL Server database.
Provide user name and password if you select SQL authentication.
6d Click Next.
The setup wizard validates the specified SQL server connection.
7 (Optional) By default, the Windows agent service runs using the local system account. If you
want to specify a different service account, complete the following steps:
7a In the Service Account field, type the user name of the account you want to assign to the
agent service.
NOTE: The Windows agent service running on the Core Services computer requires an
account with enough permissions to modify remote computers. For example, specify a
domain administrator account. This Windows agent becomes the default Deployment Agent
for the domain.
7b In the Password field, type the password for the specified service account.
7c Click Next.
The setup wizard validates the specified service account.
8 Review the installation summary, and click Install.
The silent installation process begins for Core Services, the database, and the Web console, and
then automatically continues with installing the Windows agent followed by the Dashboard.
9 (Optional) Install the Dashboard.
If you do not want to install the Dashboard on the current server, click Cancel when prompted.
For more information about the Dashboard installation, see Chapter 10, “Installing the
Dashboard,” on page 45.
1 On the Core Services computer that registered the agents, open the ExportDomainKeys.bat
file. By default, this file is located in the following folders:
32-bit systems: C:\Program Files\NetIQ\Secure Configuration Manager\Core
Services\bin
64-bit systems: c:\Program Files (x86)\NetIQ\Secure Configuration
Manager\Core Services\bin
2 At the Filename prompt, type the name of the file to store the domain keys and press Enter. You
can enter just the file name, which will be saved in the same folder, or you can enter a full path
and file name.
3 At the Password prompt, type a password that the other Core Services must use to access the
domain keys for importing, and press Enter.
4 For each Core Services computer that needs to access the agents registered on the first Core
Services, complete the following steps:
4a Open the ImportDomainKeys.bat file.
4b At the Filename prompt, type the name of the file where the domain keys are stored and
press Enter.
4c At the Password prompt, type the password to access the domain keys and press Enter.
4d Restart Core Services.
5 Open the Windows console to see the registered agents.
You can install the AutoSync client on the same computer as Core Services, or you can install the
Standalone AutoSync client on a different computer so that it runs separately from Core Services.
Install a Standalone AutoSync client when your Core Services computer is not directly connected to
the Internet, or if you do not want the Core Services computer to download from the Internet. Ensure
that the Standalone AutoSync client computer has connectivity to the Internet and to Core Services.
1 Log on with an Administrator account to the computer where you want to install the standalone
AutoSync client.
2 Run the setup program from the root folder of the Secure Configuration Manager installation kit.
3 On the Component Selection window, select only the Standalone AutoSync Client component.
4 Follow the instructions in the wizard until you finish installing the standalone AutoSync client.
When you install or upgrade to a new version of Secure Configuration Manager, the installation
program automatically installs a Windows security agent on the Core Services computer. You can add
or update other security agents after completing the installation process.
For more information about deploying Windows agents, see the NetIQ Secure Configuration Manager
Windows Agent Installation and Configuration Guide.
You can install the Dashboard in one of the following two ways:
As part of the overall Secure Configuration Manager installation or upgrade. For more
information, see “Installing Core Services, Database, and the Consoles” on page 39.
As a standalone installation with a Dashboard-only .msi file. This process requires an existing
installation of Secure Configuration Manager.
1 Copy the Dashboard installer, NetIQDashboard.msi, from the Secure Configuration Manager
installation kit to the computer where you want to install the Dashboard
NOTE: If you have the Secure Configuration Manager installation setup in the computer where
you want to install the Dashboard, you can also click Install Dashboard after you run the Secure
Configuration Manager Setup.exe.
7 (Optional) Click Test Connection to test the connection with the specified Secure Configuration
Manager Core computer IP address/name.
When you click Next, the program verifies connection with the specified Secure Configuration
Manager Core computer. Installation proceeds only if the connection is established.
8 Click Next.
9 Review the installation summary, and click Install to start the installation.
1 Go to the directory where you have installed the Dashboard. By default, the Dashboard is
installed in the C:\Program Files (x86)\NetIQ\Secure Configuration
Manager\Dashboard directory.
2 (Conditional) To customize the Analytics Database, go to the Database\config directory and
open the db.properties file. You can change the protocol, Database port, and the Core
computer name in this file.
Save the file.
3 (Conditional) To customize the Dashboard Website, go to the Website directory and open the
website.properties file. You can change the Website protocol, Website port, Database
protocol, and the Database port in this file.
Save the file.
4 Restart the Elasticsearch 2.0.0 (NetIQDatabaseService) and the NetIQ Dashboard Website
Service, in that order.
If the Dashboard resides on a separate computer from Core Services, update the Dashboard settings
in the Web console to support single sign-on: Go to Your_ID > Settings > Dashboard.
For more information, see “Considerations for Installing the Dashboard” on page 36 and “Enabling
Users to Launch the Dashboard” in the Help for the Web console.
Manager
This chapter addresses planning considerations for upgrading Secure Configuration Manager and
provides a checklist to help you.
Checklist Items
4. Close all Secure Configuration Manager consoles and shut down Core Services.
5. (Conditional) If you are upgrading the Dashboard, ensure that all user sessions are closed.
6. Using Microsoft SQL Server Enterprise Manager, ensure that no users are connected to the
Secure Configuration Manager database.
IMPORTANT: Before beginning to upgrade Secure Configuration Manager, close all the
windows that are open against Vigilent database in SQL Server Management Studio.
8. Ensure that the computers on which you want to upgrade Secure Configuration Manager
components meet the specified requirements.
For more information, see Part I, “Planning to Install Secure Configuration Manager,” on
page 13.
For more information, see “Stopping Scheduled Jobs Before Upgrade” on page 51.
10. Upgrade Core Services and the Secure Configuration Manager database. After the upgrade
dialog box closes, Secure Configuration Manager continues to run the upgrade process. Do
not stop Core Services until the upgrade fully completes.
For more information, see “Upgrading Secure Configuration Manager” on page 51.
11. Upgrade each Windows console computer. Secure Configuration Manager displays a
message if you attempt to log in to the Web or Windows console before the database upgrade
process completes.
For more information, see “Upgrading Secure Configuration Manager” on page 51 and the
Release Notes.
13. Run the AutoSync update service to download the latest security checks and policy
templates.
14. Check the Micro Focus web site to ensure that you have the latest version for your currently
installed agents.
For more information, see the Secure Configuration Manager Technical Information web
page.
15. (Conditional) If you do not have the latest version of an agent, download the appropriate
software update from the web site and use the instructions provided in the installation kit to
upgrade the agent or see “Updating Agent Content” in the User's Guide for Secure
Configuration Manager.
16. (Conditional) Upgrade the Dashboard, if it is on a separate server than the Core Services
computer.
The upgrade process does not support upgrades from previous trial installations.
When you upgrade Core Services, the process also upgrades the Web console and Secure
Configuration Manager database as needed.
Preparing to Upgrade
Before upgrading, you might want to back up the configuration settings for Secure Configuration
Manager. You can also shut down running processes and ensure that users are not logged into the
consoles or Dashboard.
1 Back up the SCM installation directory. Generally, the installation directory is C:\Program
Files\NetIQ\Secure Configuration Manager.
2 Back up the SCMNSS directory. Generally, the SCMNSS directory is C:\scmnss.
3 Back up registry keys by exporting the following registry keys. To export the registry keys, open
the command prompt and type regedit.exe, and then go to File > Export. Save the registry
key file in .reg format.
HKEY_CURRENT_USER\Software\PENTASAFE
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\PSService
(Conditional) For 32-bit computers:
HKEY_LOCAL_MACHINE\SOFTWARE\PENTASAFE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\NetIQ
Core Services
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\NetIQ
Secure Configuration Manager
(Conditional) For 64-bit computers:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\PENTASAFE
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Unin
stall\NetIQ Core Services
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Unin
stall\NetIQ Secure Configuration Manager
4 Back up the SCM shortcuts by backing up the C:\ProgramData\Microsoft\Windows\Start
Menu\Programs\NetIQ Secure Configuration Manager directory.
NOTE: If you are using a 64-bit computer, the default installation directory for SCM is C:\Program
Files (x86)\NetIQ\Secure Configuration Manager.
1 Verify that the version of Secure Configuration Manager currently running in your environment is
supported by the upgrade process. For more information, see “Secure Configuration Manager
Upgrade Checklist” on page 47.
2 To ensure a clean snapshot of your Secure Configuration Manager database, close all consoles
and shut down Core Services. Follow these steps to shut down Core Services:
2a Log on to the Core Services computer.
2b Click Services in the Administrative Tools program folder, and then click NetIQ Core
Services.
2c On the Action menu, click Stop.
3 Using Microsoft SQL Server Enterprise Manager, ensure no users are connected to the Secure
Configuration Manager database.
4 To ensure that your session is not timed out during the upgrade, modify time-out settings, by
using the following steps:
4a Log in to the Microsoft SQL Server Enterprise Manager.
4b Select your SQL server by right-clicking the name of the server, and then go to Properties >
Connections.
4c Set the value of the Remote Query Timeout property to 0.
5 Back up your Secure Configuration Manager database. For more information, see the Microsoft
SQL Server documentation.
6 Ensure the free disk space allocated for the database upgrade is at least four times the size of
the current VigilEnt.mdf file. By default, you can find the VigilEnt.mdf file at C:\Program
Files\Microsoft SQL Server\MSSQL.1\MSSQL\Data.
7 To ensure that the Browser Service is running in SQL Server, complete the following steps:
7a Open SQL Server Configuration Manager.
7b In the left pane, select the SQL Server services.
7c In the right pane, ensure SQL Server Browser is set to Running.
7d (Conditional) If the SQL Server Browser is stopped, select SQL Server Browser, and on the
Action menu, click Start.
1 Ensure that you have prepared your environment for upgrade. For more information, see
“Preparing Your Environment for Upgrade” on page 50.
2 Ensure that the computers on which you want to upgrade Secure Configuration Manager
components meet the specified requirements. For more information, see Chapter 2, “Planning
Overview,” on page 15 and Step 6 on page 50 of “Preparing Your Environment for Upgrade” on
page 50.
NOTE: If Core Services and the Secure Configuration Manager database are installed
on different computers, the Secure Configuration Manager installation kit detects the
database location and upgrades it along with Core Services.
NOTE: You must wait until the database upgrade completes before you can log in to a
Secure Configuration Manager console.
You can upgrade the Dashboard while upgrading the Secure Configuration Manager version.
Standalone upgrade of the Dashboard
1 Log out of all the Dashboard user sessions, and close the browser windows.
2 Copy the Dashboard installer, CDImage\Intel\Deployment\Dashboard\NetIQDashboard.msi,
to the computer where you want to upgrade the Dashboard.
3 Double-click NetIQDashboard.msi to run the upgrade wizard.
4 Click Next.
5 Click Upgrade in the Installation Summary dialog box to start the upgrade.
6 Click Finish.
NOTE: Secure Configuration Manager downloads, but does not update, patch level database files
during this process. For more information, see “Agent Considerations” on page 54 and the User's
Guide for Secure Configuration Manager.
Agent Considerations
When you upgrade Secure Configuration Manager, the endpoint and agent information persists from
the previous version so you can continue running reports on existing endpoints. However, in some
cases, you must delete old agents and add them as new endpoints. For more information about
supported agent versions, see the Secure Configuration Manager Technical Information web page.
Windows Agent
When you install the Windows agent, Secure Configuration Manager also includes support for Active
Directory, Microsoft IIS, Microsoft SQL Server, NAS, Oracle, and Network Device endpoints. To
manage Active Directory, Microsoft IIS, SQL Server, NAS, Oracle, or Network Device endpoints with
the Windows agent, you must add the endpoints in Secure Configuration Manager after you install the
Windows agent.
If you previously managed Microsoft IIS endpoints using the VigilEnt Security Agent for Web Servers
(VSA for Web Servers), and want to continue managing those endpoints, delete the old agents and
add them as new endpoints of the Windows agent.
No upgrade path is available from the legacy Oracle agent to the new endpoint type. If you are
currently managing Oracle databases with the legacy Oracle agent and want to continue managing
those databases using the Windows agent, delete your old agents and add them as new endpoints of
the Windows agent.
To take advantage of new features in Secure Configuration Manager, you must upgrade each agent
to the latest agent versions. For more information about upgrading Windows agents, see the User's
Guide for Secure Configuration Manager and the Secure Configuration Manager Windows Agent
Installation and Configuration Guide.
No upgrade path is available from the legacy Oracle agent to the new endpoint type supported by the
UNIX agent. If you are currently managing Oracle databases with the legacy Oracle agent and want
to continue managing those databases using the UNIX agent, delete your old agents and add them
as new endpoints of the UNIX agent.
To take advantage of new features in Secure Configuration Manager, you must upgrade each agent
to the latest agent versions. For more information, see “Deploying UNIX Agents” on page 43, and the
Installation and Configuration Guide for NetIQ Security Agent for UNIX.
1 Stop the Netiq Security Agent for Windows service in Control Panel > Administrative Tools >
Services.
2 Rename or copy the backed up installation folder to C:\Program Files\NetIQ\Secure
Configuration Manager.
3 Rename or copy the backed up SCMNSS folder to C:\scmnss.
4 Import the backed up registry keys. To import the registry, open the command prompt and enter
regedit.exe and then go to File > Import.
Browse to the backed up .reg file:
HKEY_CURRENT_USER\Software\PENTASAFE
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\PSService
(Conditional) For 32-bit computers:
HKEY_LOCAL_MACHINE\SOFTWARE\PENTASAFE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\NetIQ
Core Services
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\NetIQ
Secure Configuration Manager
(Conditional) For 64-bit computers:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\PENTASAFE
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Unin
stall\NetIQ Core Services
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Unin
stall\NetIQ Secure Configuration Manager
5 Rename or copy the backed up shortcuts folder to
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\NetIQ Secure
Configuration Manager.
6 Restore the backed up Vigilent database.
NOTE: If you are using a 64-bit computer, the default installation directory for SCM is C:\Program
Files (x86)\NetIQ\Secure Configuration Manager.
Configuration Manager
This chapter provides information about Windows and SQL authentication, and helps you get started
with the Secure Configuration Manager consoles and Core Services.
Checklist Items
1. (Optional) Configure Windows authentication for communication between Core Services and
the database.
For more information, see “Configuring Windows Authentication between Core Services and
the Database” on page 58.
3. Start the Windows console to connect to Core Services and set up additional users.
For more information, see “Starting the Windows Console” on page 59.
4. Start the Web console to connect to Core Services and the Dashboard.
For more information, see “Starting the Web Console” on page 59.
5. (Optional) Configure SQL authentication between the consoles and the database.
For more information, see “Configuring SQL Authentication between the Database and the
Consoles” on page 60.
When using Windows authentication, the database checks with the Windows domain controller to see
if the user ID and password you used to log on to the computer are allowed to use the database.
1 (Conditional) If the database is on the same computer as Core Services, complete the following
steps on this computer:
1a Start the Core Services Configuration Utility in the NetIQ Secure Configuration Manager
program folder.
1b On the Database tab, set the Use Windows Authentication field to True.
1c Click OK to save the changes and close the Configuration Utility.
1d Restart Core Services.
2 (Conditional) If the database is on a different computer from Core Services, complete the
following steps on the Core Services computer:
2a Start the Core Services Configuration Utility in the NetIQ Secure Configuration Manager
program folder.
2b On the Database tab, set the Use Windows Authentication field to True.
2c Click OK to save the changes and close the Configuration Utility.
2d Browse to the Services list in Control Panel.
2e Select NetIQ Core Services from the Services list.
2f Change the service properties to log on with the account you specify to connect to the
database.
2g Click OK.
2h Click Start Service.
3 Close the Services and Administrative Tools windows.
The Secure Configuration Manager setup program automatically starts Core Services for you.
However, you can also manually start Core Services. To manually start the Core Services service,
use the Services utility in the Windows Control Panel.
When you run Core Services for the first time, it generates a set of authentication keys called domain
keys. If you are using a single Core Services, back up the domain keys for your Core Services to a
disk or to another computer in case you need to re-install Core Services at any point. Otherwise,
when you install a new Core Services, new keys are created and you cannot access the agents you
registered with the set of domain keys generated by the initial Core Services installation.
By default, Secure Configuration Manager uses Windows authentication for communication between
the consoles and the database. When using Windows authentication, the database checks with the
Windows domain controller to see if the user ID and password you used to log in to the console
computer are allowed to use the database through Core Services.
You can also use SQL authentication. For more information, see “Configuring SQL Authentication
between the Database and the Consoles” on page 60.
For more information about supported browsers, see “Web Console Requirements” on page 29.
1 Set up the database in mixed-mode security in SQL Server Enterprise Manager. For more
information, see the Microsoft SQL Server documentation.
2 On the Core Services computer, complete the following steps:
2a Start the Core Services Configuration Utility in the NetIQ Secure Configuration Manager
program folder.
2b On the Database tab, set the Allow SQL Authentication field to True.
2c Click OK to save the changes and close the Configuration Utility.
2d Restart Core Services using the Windows Services utility. You can access the Windows
Services utility through Control Panel.
3 Enable SQL authentication in Secure Configuration Manager by completing the following steps:
3a Start Secure Configuration Manager in the NetIQ Secure Configuration Manager program
folder.
3b On the Windows console login window, click Configure.
3c Select the Enable SQL Authentication check box.
3d Click OK.
4 Specify your user name and password and click OK.
In most environments, you can launch the Dashboard from the Web console. For more information,
see “Launching the Dashboard from the Web Console” in the User's Guide for Secure Configuration
Manager.
1 Go to the directory where you have installed the Dashboard, by default in the C:\Program
Files(x86)\NetIQ\Secure Configuration Manager\Dashboard directory.
2 (Conditional) To change the properties for the Dashboard, complete the following steps:
2a Open the db.properties file, by default in the Database\config directory.
2b Change the protocol, Database port, and the Core computer name in this file.
2c Save the file.
3 (Conditional) To customize the Dashboard Website, complete the following steps:
3a Open the website.properties file, by default in the Website directory.
3b Change the Website protocol, Website port, Database protocol, and the Database port in
this file.
3c Save the file.
4 Restart Elasticsearch 2.0.0 (NetIQDatabaseService).
5 Restart NetIQ Dashboard Website Service.