1. Begin the Deep Security Manager installation
Choose your installation language, continue through the wizard and accept the terms of use. You'll be asked to choose the destination directory for your installation before selecting your database type.
2. Setup your database preferences
Select your database type (SQL and Oracle will work for Production databases) and define your hostname, database name, transfer type and database credentials in the configuration parameters.
For this tutorial, we will use the Embedded database which is for trials and demonstrations only. Embedded databases are NOT supported in Production environments.
3. Enter your license information
4. Confirm your address and port settings
Verify that the address is the fully qualified domain name of the virtual machine we are on, and accept the default for the manager port and the heartbeat port.
5. Setup your login credentials
By default the administrative name is "MasterAdmin" but this should be changed (this is a trend recommended best practice). This will be the default application administrator username.
Choose a password and select the "Enforce strong password" option.
6. Enable automatic updates
This is always a good idea with any anti-malware software.
7. Setup your relay server
Relay servers are used to download security updates from Trend Micro. For this reason, Trend requires at least one deep security relay.
We will say "Yes" to installing the relay on the same computer, but if you'd like to install on a separate server, you may select "No".
8. Choose whether you would like to participate in the Smart Protection Network
This service provides feedback to Trend about what sort of activity is happening on your environment.
9. Confirm your settings
Once you've reviewed the settings, select "Finish" to install.
10. Launch the Deep Security Manager
You can do this by selecting the checkbox after the install has completed, before closing the installation wizard, by selecting "Finish".
11. Login to Trend Deep Security Manager
Use the credentials we defined during installation to login. At this point we can confirm the Deep Security Manager has successfully installed.