Views:

This questionnaire assists IT administrators in defining the project team, documenting the operating environment, assessing architecture requirements, facilitating review of desktop hardware and software profiles, and defining security concerns or support processes.

Category

Questions

End users

  1. What is the total number of users to be deployed?

  2. Of that number, how many are:

    • Administrators (for either the Enterprise or Group)

    • Authenticator (Help Desk Personnel)

    • End users

Endpoints

  1. Is there a standard number of partitions on hardware?

  2. Do devices have multiple physical hard drives?

  3. Do these devices have SED drives attached?

  4. Do any devices have dual boot managers?

  5. What standard software is installed? Check the following:

    • Antivirus

    • Security applications that block software installation

    • Previous encryption products

  6. Do the endpoints use BIOS or UEFI?

Enterprise networks and databases

  • How many PolicyServer instances are required to support the user base?

    • Estimate the maximum number of users in the future. For example, think about the company's potential growth within three years.

    • If domain authentication is used, one PolicyServer is required for each Active Directory domain.

  • Is load balancing on the servers required?

    • Load-balancing is recommended for installations that require redundancy and high-availability for PolicyServers.

    • Clustering can be used to provide redundancy and high-availability for the database servers.

  • What are the database size estimates?

    • Estimate the maximum number of users in the future. For example, think about the company's potential growth within three years.

    • Approximate space required is 1 GB per year for every 1,000 end users.

Internet connectivity
  1. Will agents be required to communicate with PolicyServer over the Internet?

    • Check with internal network/security team to understand requirements to make a web server available on the Internet.

  2. If agents are required to communicate over the Internet, which of the following functions do you need to set up:

    • Domain authentication/single sign-on can be used over the Internet

    • Policy updates via the Internet

    • Device auditing via the Internet

    • Online password resets