7.1 Using the Installation Program (SETUP.EXE)

  1. (Recommended) Do the following to the target machine:

    • Update all Microsoft security patches and antivirus/spyware software patches.

    • Shut down any antivirus/spyware software that might interact with valid registry functions.

  2. Copy the installation program, SSL certificate, and product license file to the target machine:

    1. Copy one of the following directories from the installation media to the target machine:

      • Windows 2000/XP Security Client: \Installs\CL

      • Windows Vista/7 Security Client: \Installs\CL_VISTA

    2. Copy the Management Service SSL certificate (ESM-MS.cer or the enterprise certificate) to the CL or CL_VISTA directory.

      If you are not using the Management Service (a non-directory service configuration), you can skip this step. In a non-directory service configuration, there is no Management Service for the Security Client to connect to and therefore no certificate.

    3. Copy the Novell® license file (license.dat) to the CL or CL_VISTA directory.

      Without the license file, the Security Client is installed in 60-day evaluation mode. If the Security Client connects to a Management Service, you do not need to include the file; when it connects, it receives the license information from the Management Service. If you are not using the Management Service (a non-directory service configuration) or the Security Client does not connect to the Management Service within 60 days of installation, you need to include the license file with the installation program.

  3. Launch the installation program (setup.exe).

  4. Select the language for the installation program, then click OK.

  5. On the Welcome screen, click Next.

  6. Accept the License Agreement, then click Next.

  7. (Conditional) If the computer does not have Microsoft Web Services Enhancements (WSE) 2.0 with Service Pack 3 and Microsoft Visual C++ 2008 installed, you are prompted to install them. Click Install.

  8. Complete the installation, using information from the following table. Each row of the table corresponds to one of the installation program screens that requires input.

    Installation Prompt

    Explanation

    Uninstall Password

    If you want to require an uninstall password, select Require an uninstall password and then enter the password. Otherwise, select Do not require an uninstall password.

    We recommend that you require an uninstall password and only distribute the password if necessary. This ensures that the machine’s user does not uninstall the Security Client to bypass security enforcement.

    Centrally Managed or Unmanaged

    A centrally managed Security Client is one that connects to the Management Service and Policy Distribution Service to receive its security policies. If this Security Client installation is centrally managed, select Managed through ESM servers.

    An unmanaged Security Client is one that receives its policies as export files from the standalone Management Console (no Management Service and Policy Distribution Service). If this Security Client installation is unmanaged, select Not connected to ESM servers (policies received as files).

    ESM Management Server

    This page is displayed only if the Security Client is centrally managed.

    Specify the Management Service server name as defined in the SSL certificate. This might be the server’s fully qualified domain name (FQDN) or the server’s local name.

    Directory Service Configuration

    This page is displayed only if the Security Client is centrally managed and you are installing on Windows 2000 or Windows XP.

    Select the directory service (Microsoft Active Directory or Novell eDirectory) in which your user or computer account resides. This directory service will be used to assign security policies to you through the user or computer account.

    Policy Type (User or Computer/Workstation)

    This page is displayed only if the Security Client is centrally managed.

    Security policies can be published to users or computers. The Security Client needs to know which method you are using. Select the appropriate option (User Based Policy or Computer/Workstation Based Policy).

    If you selected Novell eDirectory as your directory service, you should only use Computer/Workstation based policies if the following conditions exist:

    • Your organization has Novell ZENworks 7 Desktop Management installed so that the eDirectory schema is extended to support Workstation objects.

    • Your computer has the ZENworks 7 Desktop Management Agent installed and is registered as a workstation in Novell eDirectory.

  9. Restart the machine when prompted.