1.2 System Requirements

Server System Requirements

Client System Requirements

Operating Systems:

  • Microsoft* Windows* 2003 Server

Processor:

  • 3.0 GHz Pentium* 4 HT (or greater)
  • 756 MB RAM minimum (1 GB+ Recommended)

Disk Space:

  • 500 MB - Without local Microsoft SQL database
  • 5 GB - With local MS SQL database (SCSI recommended)

Required Software:

  • Supported RDBMS (SQL Server Standard, SQL Server Enterprise, Microsoft SQL Server 2000 SP4, or SQL 2005)
  • Microsoft Internet Information Services (configured for SSL)
  • Supported Directory Services (eDirectory, Active Directory, or NT Domains*)
  • .NET framework 3.5 (servers and Management Control only)

Standalone Management Control:

  • Supported RDBMS (SQL Server Standard, SQL Server Enterprise, Microsoft SQL Server 2000 SP4, SQL 2005, SQL Express)

Operating Systems for Endpoint Security Client 3.5:

  • Windows XP SP1
  • Windows XP SP2
  • Windows 2000 SP4

Operating Systems for Endpoint Security Client 4.0:

  • Windows Vista SP1 (32-bit)

Processor:

  • 600MHz Pentium 3 (or greater)
  • Minimum 128 MB RAM (256 MB or greater recommended

Disk Space:

  • 5 MB required, 5 additional MB recommended for reporting data

Required Software:

  • Windows 3.1 Installer
  • All Windows updates should be current

1.2.1 ASP.NET

The Policy Distribution and Management services require a LOCAL account of ASP.NET to be enabled. If this is disabled, the services will not work correctly.

1.2.2 Reliable Time Stamp

The Novell ZENworks Endpoint Security Management solution gathers data from multiple sources and collates this data to create a wide variety of security and audit reports. The utility and probative value of these reports is greatly diminished if disparate sources disagree as to times, and so it is strongly recommended that anyone installing ZENworks Endpoint Security Management provide for enterprise-wide time synchronization (such as that provided by Active Directory* or through the use of Network Time Protocol).

ZENworks Endpoint Security Management Administrators should follow all installation, operation, and maintenance recommendations provided in this document and the ZENworks Endpoint Security Management Installation Guide in order to ensure a strong security environment.