Installation
14
Building Technologies
048_DMS_MK8000_ICC_MP4.30_A6V10062407_a_en
Fire Safety & Security Products
06.2010
virtualization works similarly and applies to registry keys under the
HKEY_LOCAL_MACHINE\SOFTWARE
subtree. This feature causes no problem to
MM8000 operations as long as you do not use system folders, such as
“C:\Windows” or “C:\Program Files” to store any project information.
3) Windows Vista does not officially support
MSDE 2000
. Therefore, Microsoft
SQL Express 2005 must be used (see pag.11).
4) Users with administration privileges in Windows Vista do not have administra-
tion privileges on SQL Server 2005 by default. To add them to the list of adminis-
trator, use the SQL tools (Surface Area Configuration).
5) When any additional software installed with MM8000 under Windows Vista,
carefully
check compatibility with both MM8000 and Windows Vista
.
6) On all PCs equipped with Windows Vista, we recommend to always keep a
free disk space of at least 15 GB
.
3.1.3
Secure operation requirements
The security of MK8000 systems requires appropriate planning and proper organ-
izational procedures. Please review the following basic checklist of the issues to
consider:
Physical Security
Access to the room and/or areas where the MK8000 OPC server is installed
should be reserved to authorized personnel, and/or adequate protection should
be put in place on the computers to prevent potential attacks or sabotage.
Particular attention should be given to the license key installed on the USB port.
Power supply should include UPS to guarantee stable power. Cabinets with
sensitive information (e.g. documents, passwords, backup tapes, and memory
support) should be properly protected and possibly locked.
Security on the IP Network communication should be evaluated and appropriate
protections implemented with the possible application of DMS8000 encrypted
communication protocols (see Configuration Guide for Network, Fire and Intru-
sion – A6V10062425).
System configuration
Depending on the IT security strategy, adequate firewall as well as virus, spy-
ware, and malware protection should be installed on the MK8000 computers.
Critical Operating System updates should also be installed whenever they are
available and required for security and/or system stability (refer to Microsoft
Windows Updates web services).
MK8000 has shown good compatibility with most popular antivirus and
security suite applications
.
Configuration backups
MK8000 configuration backups should be performed after every project modifi-
cation, and the related media stored in a safe place and possibly offsite. The
backup list includes:
Composer Backup (see the Composer Technical Manual – A6V10062401).
Any special customisations defined using utilities, engineering tools, batch
commands, and registry scripts.