Accounts needed to install NightWatchman Management Center on a single-server

To install NightWatchman Management Center on a single-server, you need:

  1. Installer account:
    • it is set as the primary NightWatchman Console administrator
  2. Service account:
    • must be a domain account with local admin rights (granted Log on as service privileges on the local machine for the installation) and configured where the password does not expire and the user can never change the password
    • must have sysadmin on the target database server unless the database and SQL Server agent jobs are created by a DBA. These permissions can be temporary

If you intend to use the automatic power consumption catalog update feature through ActiveEfficiency integration you must have:

  1. ActiveEfficiency server 1.8 or later installed and available on the network.
  2. Microsoft Message Queuing (MSMQ) enabled on the server where the NightWatchman Management Center is installed as well as on the ActiveEfficiency server.
  3. enable ports on the server OS.

If you are using the import Wizard to populate hierarchies, you:

  • are typically the person who installed the NightWatchman Management Centre components
  • be a database administrator or have been added to the Import Wizard database role on the Agility Framework database server.
  • have db owner rights on the NightWatchman Management Center database
  • if a user or group needs to use the import tool, they must be a member of the db_NWMConsoleImportWizard database role that is created when the Import Wizard is installed
  • the user or group must have a login on SQL and must be added to the Users of the NightWatchman Management Center database. Additionally, they must have permissions to modify the Import Wizard log file directory.

On this page:

Accounts needed to install NightWatchman Management Center on a distributed environment

If you are installing NightWatchman Management Center across multiple servers, install the database first – it can be done remotely from a server where one or more of the other components are installed.

For a distributed installation, you will need the following:

  1. Installer account:
    • must be domain user account with local admin rights with sysadmin rights on the server where the database is installed unless it is created by a DBA
  2. Console service account:
    • must be a domain account

    If you are performing a clean NightWatchman Management Center installation or are upgrading NightWatchman Management Center and all the WakeUp Server components, permissions for the Console service account is set automatically as part of the installation process. The NightWatchman Console administrator account (used to define primary NightWatchman Console administrators) can be a domain user or group account.

    If you are upgrading NightWatchman Management Center, have legacy WakeUp servers or intend to use the NightWatchman console to implement remote wake-ups (which is done after installing the WakeUp server):
    • add the Console service account to the N1E/WakeUp namespace and grant the following permissions:
      • Execute Methods
      • Full Write
      • Enable Account
      • Remote Enable

    To set permissions:

    1. Run the WMI MMC (wmimgmt.msc) plug-in on the WakeUp server.
    2. Right-click the root node and select Properties.
    3. In the WMI Control (Local) Properties dialog, select the Security tab.
    4. Navigate to the N1E/WakeUp node and click the Security button. 
    5. In the Security for ROOT\N1E\WakeUp dialog, add the console service account and check the permissions listed above.

If you are using the import Wizard to populate hierarchies, you:

  • are typically the person who installed the NightWatchman Management Centre components
  • be a database administrator or have been added to the Import Wizard database role on the Agility Framework database server.
  • have db owner rights on the NightWatchman Management Center database
  • if a user or group needs to use the import tool, they must be a member of the db_NWMConsoleImportWizard database role that is created when the Import Wizard is installed
    member of the db_NWMConsoleImportWizard database role 
  • the user or group must have a login on SQL and must be added to the Users of the NightWatchman Management Center database. Additionally, they must have permissions to modify the Import Wizard log file directory.

Accounts needed to install the WakeUp server

To install the WakeUp server, you will need:

  1. Installation account:
    • must be a domain user account with local admin rights
  2. Service account:
    • must be a domain user account to validate the WakeUp server in the NightWatchman Management console and to edit the priority of the WakeUp servers and their subnets or IP ranges. 
    • must have a security role in the NightWatchman console that includes a minimum of View and Edit rights for WakeUp servers.
    The service account for the NightWatchman Management Center Console Service connects to the WMI namespace on the WakeUp server when requesting wake-ups (alarm clocks, maintenance windows and on demand wake-ups from the NightWatchman Management Center Console including Web WakeUp if installed). Therefore, the service account requires one or more of the following:
    • Membership of the Administrators local group
    • WMIACCOUNT is specified as the service account
    • WMIACCOUNT is specified as an AD group containing the service account

    Administrators using remote WakeUp server Admin Consoles require remote access rights to the WMI namespace and DCOM Security. Therefore, administrators require one or more of the following:
    • Membership of the Administrators local group
    • WMIACCOUNT is specified as an AD group containing the administrator accounts or groups

If you are installing the WakeUp server on a distributed Configuration manager environment, the account must have:

  • Full admin rights in the Configuration Manager Administrators Console
  • Full admin rights to the Configuration Manager SQL database

The WakeUp server must be installed on the Configuration Manager site server. If the SMS Provider role is remote to the site server, or there are multiple SMS Provider servers, the WakeUp Server service must use a domain account or Network Service account instead of the default Local System account. It must:

  • have Log on as service rights on the Configuration Manager site server.
  • be a member of the local administrators group on the Configuration Manager site server or at least have full read and write access to the 1E registry key.
    • 32-bit platforms: HKEY_LOCAL_MACHINE\SOFTWARE\1E
    • 64-bit platforms: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\1E
  • have the following NTFS permissions:
    • Minimum Read and Execute rights on the INSTALLDIR folder
    • Minimum Full rights on the LOGPATH and the following folders if located anywhere other than LOGPATH (DATAFILESDIRSPOOLDIRWUSPOOLDIRHEALTHSTATUSDIR)
  • have full WMI permissions for the following WMI namespaces. Some of these are set already for the Network Service account and SMS Admins group. These permissions are set manually in Computer Management/Services and Applications/WMI Control/Security,or can be set using our free WmiConfigPerms utility.
    • root\ccm
    • root\cimv2
    • root\sms
    • root\sms\site_<SiteCode>
  • In the Configuration Manager Console, grant the account specific Configuration Manager class security rights as described below for the relevant version of Configuration Manager.

The service account must have certain permissions to Configuration Manager 2012 classes before installing the WakeUp server. We recommend creating a new security role and adding the permissions. Doing this causes the specified account/group to be added to the Configuration Manager Admins local group on the provider server.

The service account permissions required when using Configuration Manager 2012:

  • Collection class – Read, Read resource
  • Configuration policy class – Read
  • Query class – Read
  • Site class – Read
Accounts needed to install Web WakeUp

To install Web WakeUp, you will need:

  1. Installation account:
    • must be a domain user account with local admin rights
  2. Application pool:
    • if the Web WakeUp site is running on a different computer to the NightWatchman Management Console service, configure the Web WakeUp Application Pool to have network access
  3. 1E Agent 7.0 or later (including the WakeUp component):
    • must be installed on target computers if you want to wake them with Web WakeUp
Accounts needed to install the 1E agents

To install the 1E agents, you will need:

  1. Installation account:
    • must be a domain user account with local admin rights on the server where the WakeUp server is installed and read-rights to the site object in Configuration Manager. It is used to install, configure and integrate WakeUp server with Configuration Manager.
  2. The Hardware Inventory client agent must be enabled.
  3. The Advertised Program client must be enabled.
  4. Machine must be a Configuration Manager client.
  5. NightWatchman Management Center 7.1 or later installed if you are using Web WakeUp or integrating with NightWatchman Management Center.
The 1E Agent must not be installed on the WakeUp servers. If it is, only the administration console option is available when the installer is run.
Accounts needed to install Enterprise View

To install Enterprise View, you will need:

  1. Installation account:
    • must be a domain user account with local admin rights and sysadmin rights for the database

Accounts needed to install Intel® Active Management Technology (AMT) 

The latest Intel ME Interface (HECI) driver and the Local Manageability service must be installed on the Intel® AMT machines. You can only have one instance of Inte®l AMT per WakeUp server installation.

To install Intel® AMT, you will need:

  1. Installation account:
    • must be a domain user account with local admin rights
  2. If Kerberos authentication is used, the WakeUp Intel® AMT module must be installed with a domain account that has been added to an Active Directory group that has access to the Intel® AMT Power Control Realm on the devices. If preconfigured, this group is called Intel® AMT Collections Managers.
  3. In Enterprise Mode you will need the name of the TLS certificate template used for secure communications with the Intel® AMT device.
  4. In Small Business Mode, the username and password for an account that has access to the Intel® AMT Power Control Realm on the devices.

    In Small Business Mode, the installer cannot verify that the user credentials supplied have the appropriate permissions. If you encounter issues with this after installation, check the WakeUp Intel® AMT log file. If you see Connection Failed errors, the likely cause is insufficient permissions on the account.

Minimum Privileges to Install and Use NightWatchman

Installing and using NightWatchman with minimum privileges, as with any system, is advised to maximize your overall security. To install or use NightWatchman with minimal privileges, configure the NightWatchman accounts with only the following privileges.

NightWatchman Management Center

Installation account:

  • Must be a domain user account with local admin rights
  • Must have sysadmin on the target database server

Service account (if different from installation account):

  • A domain user account with granted 'log on as service' privilege on the server or a local admin account (which the NightWatchman Management Center installer will automatically grant the 'log on as a service' privilege)
  • Must have execution permission for stored procedures on the AgilityFrameworkReporting database
  • Note: during installation the service account will also get added to the database with the SQL Server public role

WakeUp server

Installation account:

  • Must be a domain user account with local admin rights
  • Must have these permissions to Configuration Manager classes before installing the WakeUp server:
    • Application – Read
    • Boundaries – Read
    • Boundary Group – Read
    • Collection – Read, Read resource
    • Configuration policy – Read
    • Package – Read
    • Query – Read
    • Site – Read
    • Software Updates – Read

The service account for the NWM Console service connects to the WMI namespace on the WakeUp server when requesting wake-ups. Therefore, the service account requires one or more of the following: 

    • Membership in the Administrators local group
    • Is the same as the WMI account
    • Is a member of a group that is specified as the WMI account

NWM Console service account will be added by the NightWatchman Management Center Installer to the N1E and WakeUp namespaces with the following permissions:

    • Execute Methods
    • Full Write
    • Enable Account
    • Remote Enable

Networking

1E Agent

PortTrafficNotesConfigurable
UDP 1776InboundCommunication with 1E Agent and magic packets. 
TCP 80 (HTTP)OutboundCommunication with the Web service. 
TCP 80 (HTTP)OutboundCommunication with the Management Center. 
UDP 1776OutboundCommunication with 1E Agent and magic packets. 
  • RPC/WMI is between 1E Agent (NWM) when using remote NightWatchman agent command-line
  • Incoming Internet Control Message protocol (ICMP) must be whitelisted on routers. It is used by the WakeUp server to discover 1E Agents (WakeUp).

The 1E Agent can use both HTTP and HTTPS protocols. Using the 1E Agent installer command-line, you can set the values for the REPORTINGSERVERSECUREREPORTINGSERVERCERTISSUER and CERTSUBJECT installer properties so that the 1E Agent communicates with the NightWatchman Management Center Web Service using these protocols and security levels in the following order:

  1. HTTP.
  2. HTTPS without certificate.
  3. HTTPS using certificate subject match.
  4. HTTPS using certificate issuer match.

Catalog updates

PortTrafficNotesConfigurable
TCP 135 (RPC) Communication with the queue managers. A dynamic port typically assigned by remote procedure calls (RPC) for handshaking with an independent client or with an RPC server for the message queuing server to determine the fixed ports. 
TCP 1801 (MSMQ) Communication with the queue managers. 

NightWatchman admin console

PortTrafficNotesConfigurable
TCP 8732 (SMB)OutboundCommunication with the console service. 

NightWatchman console service

PortTrafficNotesConfigurable
TCP 1443 (ADO .NET)OutboundCommunication with the database. 
TCP 135 (RPC) Communication with the ActiveEfficiency server. 

Import wizard

PortTrafficNotesConfigurable
TCP 1443 (ADO .NET)OutboundCommunication with the database. 

Reporting console

PortTrafficNotesConfigurable
TCP 80 (HTTP) Communication with the Reporting Website. 
TCP 1443 (ADO .NET)OutboundCommunication with the database. 

NightWatchman AFWebService website

PortTrafficNotesConfigurable
TCP 80 (HTTP)InboundCommunication with the NightWatchman and WakeUp 1E Agent and from WakeUp Server for registration, boundary maintenance and statistics reportingCommunication with the database. 
TCP 8732InboundCommunication wth the Import wizard and NightWatchman Admin console. 
TCP 8750InboundCommunication with Web WakeUp. 
TCP 1443 (ADO .NET)OutboundCommunication with the database. 

Web Wakeup

PortTrafficNotesConfigurable
TCP 8750OutboundCommunication with the Web service. 

WakeUp server service

PortTrafficNotesConfigurable
TCP 443 (HTTPS) Communication with the Web service. 
TCP 1777InboundCommunication with 1E Agent and magic packets. 
TCP 1776OutboundCommunication with 1E Agent and magic packets. 
  • IPv4 network is necessary
  • RPC/WMI incoming from the NightWatchman Management Center Console service, any remote WakeUp Server consoles, any SCCM Console WakeUp extensions. Potentially used by custom WakeUp applications, however Web WakeUp is recommended instead for custom wakeup applications)
  • Internet Control Message protocol (ICMP) must be whitelisted on routers. It is used by the WakeUp server to discover 1E Agents (WakeUp).

Things to bear in mind:

  • RPC/WMI incoming from the NightWatchman Management Center server and any remote consoles.
  • Incoming Internet Control Message protocol (ICMP) must be whitelisted on routers. It is used by the WakeUp server to discover agents. 
  • Port 135 is a dynamic port typically assigned by remote procedure calls (RPC) for handshaking with an independent client or with an RPC server for the message queuing server to determine the fixed ports.
  • IPv4 network is necessary

Preparing a server for web applications

NightWatchman Management Center deploys Web applications which are built on .NET (Report console and Web service). We recommend preparing the Web server by installing the runtime libraries for these applications as follows:

  1. Web server (IIS) role with default role services (which should include Windows authentication and ASP.NET role services).
  2. Application server role with .NET 4.5 and HTTP Activation role services.
  3. .NET 4.5 or later, ensuring that the OS specific ASP.NET is installed and enabled.

If these runtime libraries are installed in a different order, or other applications hosted on the same Web server have modified the default IIS ASP.NET settings, it may be necessary to re-register the ASP.NET 4.5 runtime with IIS prior to running the NightWatchman Management Center installer. You can do this with (we assume you are using the default paths):

  • On 32-bit systems: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe -iru
  • On 64-bit systems: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe -iru
It is important to specify the -iru switch to avoid causing problems with other web applications which are running under .NET 2.0.

General security measures

To comply with security certification criteria, we recommend the following measures for our products on your production environment:

  1. Folders and user data – restrict the \Program Files\1E folder to administrators to prevent unauthorised modification to configuration files
  2. Secure 1E product communications – when using products that make use of a centralized web component, restrict access to the configuration files and XML transforms as well as any spooler directories running on the clients. Additionally, use HTTPS communications between the centralized web component and its local agents. The NightWatchman Management Center and associated components can be configured for FIPS compliance.

    This property must be the same value for the NightWatchman Management Center, WakeUp server and the 1E Agents.
  3. Secure operational environments  – secure networks running our products by preventing magic packets from outside the enterprise network boundary from being routed to machines inside the network by configuring network routers/firewalls boundary devices to prevent magic packets routing.
  4. Restrict physical access to servers – restrict access to these devices to authorised administrators only.
  5. Secure 1E administration consoles – install 1E administration consoles on a secure environment and follow best practices such as changing administrative passwords on a regular basis.

Guidelines for large environments

NightWatchman deployments range from 500 to 300,000 seats and are supported by a single management service and is highly scalable. For customers at the upper end of this range (100,000+), these guidelines ensure optimal performance.

Performance is difficult to predict and is affected by many factors such as server hardware, disk configuration, network bandwidth, etc. Customers with similar numbers of clients can experience different performance. Our scalability testing is run against simulated activity from 300,000 computers over two years and is executed on mid-range enterprise hardware. 1

If you have particular requirements or concerns about your deployment, contact 1E for further information and assistance. When you install NightWatchman Management Center, you will be asked approximate size of your environment (number of clients). This figure is used to configure how often agents report power data and request policies as well as the frequency and workload size of the batch jobs. Make sure you select the most appropriate option for your environment.


Data retention

As a general guideline, assuming all features are being used with their default configuration, the database storage required after a year is approximately 1MB per client. For each machine being managed, NightWatchman stores detailed power consumption data, as well as aggregated data (for reporting purposes). Data is aggregated by day, month and year. To help keep the database size down, each of these data stores is periodically trimmed. For large (100,000+ seats) deployments, we recommend changing the default retention values to:

Table and Configuration Setting (in tbNWM_Settings)Setting nameDefaultSuggested
Detailed consumption (tbNWM_Report_Consumption)ReportConsumption_KeepDays9015
Aggregated daily (tbNWM_Report_Consumption_Daily)DailySummary_KeepDays9030
Aggregated monthly (tbNWM_Report_Consumption_Monthly)MonthlySummary_KeepDays731366 (1 year)
Aggregated yearly (tbNWM_Report_Consumption_Yearly)YearlySummary_KeepDays36531826 (5 years)

Increase ReportConsumption_KeepDays if you are not yet certain how you wish to compare ongoing energy, cost and emission savings with previous periods in different parts of the organisation. The raw consumption table (tbNWM_Report_Consumption) is used when creating power behaviours and by the NightWatchman analysis reports wizard.

A power behavior is a snapshot of how a specific group of machines behaved over a specific period of time. Typically, you create a power behaviour to act as a baseline in order to calculate ongoing savings for that group of machines. Increasing the number of days kept allows you to delay the choice of which groups to analyse. However, it is good practice to decide early on how many days are kept and use this as a deadline for the baseline of your power savings project. For more information about power savings projects, see Using a NightWatchman baseline to identify power savings.

Tariffs and hardware power consumption values do not affect power behaviors but do affect energy, cost and emission reports, and aspects of the reports produced by the NightWatchman analysis reports wizard. It can take time for these variables to be finalized, at which point reports can be produced for different periods and compared.

Reporting

Almost all NightWatchman Management Center reports (particularly those related to energy, cost and emissions) are run against aggregated data tables (see data retention). Where possible, we recommend running reports which use monthly/yearly data (rather than daily data) – this will not provide as much detail in the report itself, but will give better performance and should be sufficient for most data analysis.

Batch jobs

Be aware that system performance is impacted while the batch jobs are running, so allow for this. Batch jobs can be monitored using Operations reports from NightWatchman Report Console. If they are significantly impairing performance, they can be reconfigured to run less frequently and at more convenient times.

SQL Server

SQL Server offers enormous scope for configuration. We pre-configure our database based on the type of environment you select during installation; other configuration options are better suited to per-installation tuning. Specifically, you may wish to monitor database growth rates and adjust them accordingly. There is also potential to use file groups to improve performance. 

Hardware configuration

ComponentNotes
ProcessorNightWatchman server-based components have greater I/O than CPU needs; that is to say that a server's disks are more likely to become a performance-limiting factor than its processors. Configuration options such as HTTPS and SQL Server processor affinity can affect this, so for large-scale deployments, we recommend a quad-core server. However, an eight core server is preferable.
DisksDisks are a very important consideration in achieving consistently high system performance. Where possible, we recommend the use of enterprise-class disks (SAS, 10-15k RPM) supported by a hardware RAID controller. To make best use of disk resources, it is common to place SQL Server data, log and temporary files on different disks to maximize throughput. Contact 1E for more information. It is also worth mentioning that disk space can be consumed very quickly in a large deployment. A database supporting 100,000 clients will grow to several hundreds of gigabytes of disk space, therefore proactive monitoring and adjustments to data retention settings is advised.
RAMFor large-scale deployments, we strongly recommend use of 64-bit operating and SQL Server systems, preferably using the most recent Microsoft OS and SQL versions. 32-bit architectures have inherent memory limitations and later Microsoft platform versions continue to be optimized for performance. We recommend a minimum of 16GB of RAM for hosting SQL Server in a large NightWatchman deployment – typically most of this memory will be required for the SQL Server caching subsystems.
NetworkEven with hundreds of thousands of computers reporting, a NightWatchman deployment typically uses very little network bandwidth. During intensive scalability testing, we see send/receive peaks of no more than 2-3 megabytes per second (20mbps). This kind of throughput can be handled comfortably by gigabit-enabled networking hardware.
Virtualized HardwareFor large-scale deployments, we recommend physical, rather than virtualized hardware where possible, especially for the database server. If you have a specific requirement to support a large-scale virtualized deployment we would recommend use of a bare-metal or native type hypervisor.

Scaling-up versus scaling-out

NightWatchman Management Center Web and database components can be deployed across multiple servers to help distribute workload. Although this can increase administrative complexity, using separate database and web-servers (scaling-out) can dramatically improve performance.

However, consider this option only if you are unable to achieve acceptable performance with a single server. Additional hardware, especially disk resources, can help improve the performance of a single server (scaling-up).

Client hardware requirements

To utilize Wake-On-LAN technology you need all of the following hardware configurations:

  • Network card – a network card which can support Wake-On-LAN. Your network card vendor can tell you if your network adapter supports Wake-On-LAN. If it does, it must be configured to enable remote wake up. Some adapter drivers are disabled by default within the operating system.
  • System BIOS – Wake-On-LAN must be enabled in the system BIOS. This option can usually be found in the Boot menu of the BIOS configuration program.  Some BIOS have a 'Maximum Power Savings' or 'Low Power S5' option, which should be disabled in order to allow some power to the network card.
  • Power management – APM or ACPI should be enabled, otherwise the user of the machine should ensure that it is powered off by hitting the off button after shutdown.

A quick way to tell if a system is Wake-On-LAN ready is to power down the system then look at the network adapter display LED's. If the lights are still on, then chances are that the system is OK.  Windows must have been powered down gracefully in order for it to prepare the network card.

1E also provides a diagnostic tool called Magic Test that determines if a machine can react to a magic packet wake up.

 

Sizing and deployment considerations

For a single-server NightWatchman deployment:

Number of machines5,00025,00050,000100,000
Benchmark configuration
Number of clients polling and posting messages per hour5,00012,50025,00050,000
Messages per batch/client12151518
Number clients to be deployed concurrently2,5002,5005,0005,000
NightWatchman server
CPU cores1123
RAM6 GB6 GB8 GB8 GB
SQL Server instance max memory2 GB2 GB4 GB4 GB
Database connection max pool size10151520
Total disk space required for databases6.5 GB30 GB55.5 GB111 GB
SQL Server HDD requirements
NightWatchman database MDF5 GB24 GB45 GB90 GB
NightWatchman database LDF1 GB5 GB9 GB18 GB
TempDB MDF100 MB500 MB1 GB2 GB
TempDB LDF40 MB200 MB400 MB800 MB
For a distributed Nightwatchman deployment:

Number of machines50,000200,000500,000
Benchmark configuration
Number of clients polling and posting messages per hour25,000100,000250,000
Messages per batch/client151818
Number clients to be deployed concurrently5,0005,0005,000
NightWatchman server
CPU cores124
RAM4 GB4 GB4 GB
Database server
CPU cores124
RAM810 GB12 GB
SQL Server instance max memory4 GB6 GB8 GB
Database connection max pool size154070
Total disk space required for databases55.5 GB222 GB554 GB
SQL Server HDD requirements
NightWatchman database MDF45 GB180 GB450 GB
NightWatchman database LDF9 GB36 GB90 GB
TempDB MDF1 GB4 GB10 GB
TempDB LDF400 MB2 GB4 GB
For the WakeUp servers:

Number of machines5,00025,00050,000100,000200,000500,000
Number of WakeUp servers1112410
Wakeup server
CPU cores222222
RAM2 GB2 GB2 GB2 GB2 GB2 GB
Time to wake-up (approximate)5 mins10 mins15 mins15 mins15 mins15 mins

Benchmarking criteria

  • Benchmarked against Windows Server 2012 R2 Hyper-V infrastructure, with database and application server components setup on separate VMs
  • CPU (NWM Server) - Hyper-V host CPU configuration - 2x Intel Xeon CPU E5-2407 v2 @ 2.40GHz, 10M Cache, 4C, Max Mem 1333MHz
  • CPU (WakeUp Server)  - Hyper-V host CPU configuration - Intel Xeon Processor E5-2620 v3 @ 2.40GHz, 15M Cache, 6C/12T, Max Mem 1833MHz
  • All VMs connected over a 1Gbps link through a 1Gbps physical switch
  • Database storage – Samsung 850 EVO solid state drives attached locally to the Hyper-V host, with up to 98k/90k IOPS (4K random read/write QD32), and MDF, LDF and TempDB on separate SSDs.

Recommendations

  • Servers can be deployed either on physical or virtual machines. For deployment on a virtual machine, assign the CPU cores at 100% virtual machine reserve
  • NightWatchman server:
    • based on the numbers of clients machine, tune the Max Pool Size database connection parameter in C:\Program Files (x86)\1E\NightWatchman Management Center\WebService\Web.config
    • install no more that 2,500 new clients concurrently in environments up to 25,000 machines
    • install no more that 5,000 new clients concurrently in environments with 50,000 machines or more
  • NightWatchman database server:
    • deploy data, logs and TempDB on separate physical disks
    • configure SQL Server with maximum server memory limit and not at the defaults to consume unlimited memory
    • for sizing the Database server in the recommendations above, up to 4GB RAM has been added for the operating system on top of SQL Server instance RAM requirements
  • WakeUp Server
    • have separate Wakeup servers for every 50,000 clients.

  1. Server specifications are typically: 8 core machine, 12-16 GB RAM, 5-6 SAS disks in 2-3 sets of RAID 0, gigabit Ethernet