Installing Ivanti Endpoint Security (Separate Ivanti Endpoint Security and SQL Server Admins)

When installing Ivanti Endpoint Security using a remote SQL Server instance in a large network environment, a special installation procedure that splits install duties between the Ivanti Endpoint Security and the SQL Server administrator may be necessary.

When installing Ivanti Endpoint Security (Ivanti Endpoint Security) using a remote SQL Server instance, the user account you use to access the SQL server instance must be assigned the sysadmin role within Microsoft SQL Server Management Studio. However, Ivanti recognizes that in larger network environments, the administrator installing Ivanti Endpoint Security may not be able to obtain this role due to IT policies and procedures; only the SQL Server administrator can access the applicable SQL instance.

Therefore, under these circumstances, the network administrator and SQL Server administrator must cooperate to complete Ivanti Endpoint Security installation. To install Ivanti Endpoint Security in this type of environment, the installation is broken in to three separate procedures.

Procedure Portion

Description

Beginning Installation (Part I)

Performed by the Ivanti Endpoint Security administrator on the target Ivanti Endpoint Security server, this procedure begins the product installation. During this procedure, the Ivanti Endpoint Security administrator reviews a licence agreement, defines registration information, defines the remote SQL Server location, and creates a script to modify the SQL Server instance.

Creating Components on SQL Server (Part II)

Performed by the SQL Server administrator on the server hosting the applicable SQL instance, this procedure creates the user accounts necessary to operate Ivanti Endpoint Security and then runs the script created in part I. This script modifies the SQL Server instance to accommodate Ivanti Endpoint Security installation for an administrator without sysadmin rights within Microsoft SQL Server.

Completing Installation (Part III)

Performed by the Ivanti Endpoint Security administrator on the target Ivanti Endpoint Security server, this procedure completes Ivanti Endpoint Security installation. This procedure defines where the Ivanti Endpoint Security server and its content will be stored, whether the server will use a proxy server, and whether the server will use SSL.