IBM Endpoint Manager, Version 9.0

Installing on Windows systems

Now that you understand the terms and the administrative roles, you are ready to get authorized and install the programs.

Because IBM Endpoint Manager is powerful, you might want to limit access to trusted, authorized personnel only. The product depends on a central repository of Fixlet actions called the Action site, which uses public/private key encryption to protect against spoofing and other unauthorized usage. To get started, you need authorization from IBM by getting a License Authorization file, which will have a name like CompanyName.BESLicenseAuthorization.

The Installer program collect further information about your deployment and then creates a file called the action site masthead. This file establishes a chain of authority from the IBM Endpoint Manager root all the way down to the Console operators in your organization. The masthead combines configuration information (IP addresses, ports, and so on) and license information (how many Clients are authorized and for how long) together with a public key that is used to verify the digital signatures. To create and maintain the digital signature keys and masthead, you use the IBM Endpoint Manager Installer, which you can download from IBM.



Feedback