You can easily and quickly install IDERA SQL Secure on any computer that meets or exceeds the following hardware, software, and permission requirements. Before installing SQL Secure, also review the product components and architecture as well as how the product works.
Typical requirements
A typical install sets up all SQL Secure components on the same computer. The following table lists the requirements for a typical installation.
Hardware/software | Requirement |
---|---|
CPU | 2.0 GHz or higher |
Memory | 2 GB |
32-bit or 64-bit Operating System |
Plus:
|
Microsoft SQL Server for Repository |
|
Microsoft SQL Server for audited instances |
|
Browser for online Help | Internet Explorer 9.0 or later |
Console requirements
A console-only installation installs the SQL Secure Console. The console-only installation assumes that a full installation has already been completed on another machine. The following table lists all the requirements for a console-only installation.
Hardware/software | Requirement |
---|---|
CPU | 2.0 GHz or higher |
Memory | 2 GB |
32-bit or 64-bit Operating System |
Plus:
|
Browser for online Help | Internet Explorer 9.0 or later |
Collector permission requirements
The following requirements are necessary for the SQL Secure Collector to access the SQL Server instances you want to audit. During install, you can input credentials for a Windows user account or SQL Server login.
Type | Requirement |
---|---|
Windows permissions | A Windows user account that has local administrator permissions. |
SQL Server privileges | A Windows user account that is a member of the sysadmin fixed server role on the SQL Server instance. |
Port requirements
SQL Secure uses the default ports opened by the Windows operating system for local and remote communications. To learn about Windows port assignments, see Article 832017 on the Microsoft Support site. To better understand how port assignments work when Windows Firewall has been configured, see "Connecting through Windows Firewall" on the MSDN site.