Client Security Best Practices Analyzer tool: Topology check

Applies To: Forefront Client Security

Client Security supports deployment in six topologies. These topologies vary in the number of computers needed to deploy, the location of the Client Security databases, and the number of managed computers supported. For a detailed list of which topologies are supported, see Choosing your topology (https://go.microsoft.com/fwlink/?LinkID=91871).

To determine if a server is part of a supported topology, the Microsoft Forefront Client Security Best Practices Analyzer tool retrieves the following registry value:

HKLM\Software\Microsoft\Microsoft Forefront\Client Security\1.0\Config\InstalledRoles

If the registry value indicates that the components on the server are part of a supported topology, then the check passes. If the registry value is not allowed, then the check fails. If the check fails, you should verify that you have the correct components on your server and make sure to run the Client Security Best Practices Analyzer tool on the other servers in your topology.

The following table lists the registry values and the acceptable component combinations:

Registry value Server components Supported topology

0x1

Management component

Four-, five-, and six-server

0x2

Collection component

Four-, five-, and six-server

0x3

Management and collection components

Three-server

0x4

Distribution component

Two-, three-, four-, five-, and six-server

0x8

Reporting database

Three-, five-, and six-server

0xB

Management and collection components and reporting database

Two-server

0xF

All components

Single-server

Note

In some cases, the Client Security Best Practices Analyzer tool will indicate that a server is likely part of a supported topology, despite the fact that the topology itself is not supported. This can happen when each server in a topology includes supported components but the servers together are missing or duplicating components.