During the first phase of the deployment, you collect and analyze details about your organization’s requirements and goals. You can then also make preliminary decisions about sizing, network communication, and where to install components.

Here are the key steps involved:

  • Identify the goals of the deployment.
    • Is auditing important for specific computers?

    • Is auditing important for computers used to perform administrative tasks?

    • Is auditing important for computers that host specific applications or sensitive information?

    • Should auditing be required for users in specific groups or with specific roles?

  • Assemble a deployment team with Active Directory, UNIX, and other expertise, including at least one Microsoft SQL Server database administrator.

  • Provide basic training on Centrify architecture, concepts, and terminology.

  • Analyze the existing environment to identify target computers where you plan to install Centrify auditing infrastructure components.

    • Plan for permissions and the appropriate separation of duties for your organization.

    • Review network connections, port requirements, firewall configuration.

    • Identify computers for Audit Manager and Audit Analyzer consoles.

    • Identify computers to be used as collectors, audit stores, and the management Database.

    • Verify that you have reliable, high-speed network connections between components that collect and transfer audit data and sufficient disk storage for the first audit store database.

    • Identify the initial target group of computers to be audited.

  • Define and document your data archiving and data retention policies.