Setup Wizard: Component Installation page

Applies To: Forefront Client Security

Use this wizard page to select the Client Security server components that you want to install on this computer.

Important

It is highly recommended that you read the Client Security Deployment Guide. The Deployment Guide covers the system requirements, prerequisite software, and the order of installation, all of which are critical for successfully installing Client Security.

Control Description

Management server

Installs the components for the management server on this computer. These components include the Client Security console, the management service, and the Client Security agent.

Collection server

Installs the components for the collection server on this computer. In the standard topologies, the collection server and collection database are installed on the same computer.

Collection database

Installs the collection database on this computer. In the standard topologies, the collection server and collection database are installed on the same computer.

Reporting server and reporting database

Installs the reporting database on this computer and configures the reporting server. If you are installing the reporting database on one computer and configuring the reporting server on a different computer, do the following:

  • When installing Client Security on the computer that includes the reporting server, do not select this check box.

  • When installing Client Security on the computer with the reporting database, select this check box. The wizard will install the reporting database on that computer and remotely configure the reporting server on the other computer.

Distribution server

Installs the components for the distribution server on this computer. These components include the Client Security Update Assistant.

Client Security uses Microsoft Operations Manager (MOM) 2005 to collect and report about malware and vulnerabilities on the client computers. To learn about the MOM components in Client Security, see "Client Security and Microsoft Operations Manager" in the Client Security Planning and Architecture Guide.

For information about choosing a topology, see the Client Security Planning and Architecture Guide.