Install Instructions

Reading Time: 4 minutes

In this article, we will explain the install instructions required to successfully run UpSearch’s exclusive Microsoft SQL Server inventory tool (‘Tool’ or ‘Application). The Tool is essential for UpSearch’s Data Estate Assessment for SQL Server. The agentless desktop Application has a small installation footprint and comprehensively scans to gather enterprise-wide details about each Microsoft SQL Server instance and the underlying Windows Operating System.

Step 1: Download & Install

Your order confirmation will include download instructions.

For optimal results, use a Domain Administrator account to minimize the number of entered credentials. Make sure the credentials you use have local Administrator rights on the machines being scanned. Run the application outside of scheduled maintenance windows.

Follow the instructions to download the installation setup wizard. Execute the installation wizard on the machine you will use to perform the scan.

 

After you launch the Tool, it will prompt you to specify an installation folder.

Select Disk Cost to learn about your unique location options, along with each drive’s available and required disk space.

Once finished, click Next to initiate the installation.

Once the installation finishes, you will receive an Install Confirmation message that confirms the successful installation of the Tool.

Part of the installation process includes placing an application icon on your desktop.

Step 2: Run the Application

After you click on the application icon placed on your desktop, this splash screen will appear to confirm the launch of the application.

 

Assessment Scope Tab
Select SQL Server Discovery Method

The Tool offers multiple SQL Server Discovery Methods for Domain Administrators to locate SQL Server instances within a network. It scans and collects enterprise-wide information about each Microsoft SQL Server instance and the underlying Windows Operating System using various criteria such as Active Directory DNS queries (server or domain), subnet scans, and computer names.

Click here to learn more about SQL Server Discovery Methods.

SQL Authorization Tab

Please enter your account credentials for SQL instances configured to use SQL authentication.

Additional Options Tab

The following options are available to help you effectively customize the discovery process to meet your unique needs.

  • Database Object Information: The choice is yours when it comes to including database object information in the inventory. Importantly, it’s worth noting that system objects are exclusively included when you opt for ‘Include system objects.’ This level of customization ensures you have full control over your inventory, resulting in a tailored and effective assessment.
  • Database Object Permissions: Select whether to include database object-level permissions in the inventory. You will include system object permissions by selecting ‘Include system objects’.
  • System Objects: In this regard, you can choose whether to include system objects when retrieving database object information and permissions.
  • Output Directory: Specify the literal path to the directory where the output files will be written. If not provided, the “My Documents” folder will be used.
  • Logging Level: Select the logging verbosity for entries in the log file. Valid values are “None,” “Standard,” and “Verbose.” The default value is “None.”
  • Encrypt Log File: You can choose to encrypt the log file using SHA-256 encryption to protect sensitive data estate information.
  • Max Concurrency: Specify a number between 1-100 to indicate how many instances to collect information from concurrently. If not provided, the number of logical CPUs present to your session will be used.
  • Add All Output to Zip File: Select this option to combine the inventory and log files into a single compressed ZIP file.

When you’re ready, click “Start Assessment,” and the scan will commence immediately. The scan operates very lightly and doesn’t require scheduling outside of business hours.

Collection Results

The application saves the collection results to ‘.gz’ files, employing gzip compression, and ‘.gz.encrypted’ files. Furthermore, it is important to note that UpSearch retains exclusive control over the SHA-256 encryption key for the encrypted file. This stringent security measure ensures the safe and confidential transfer of your results, facilitating seamless processing and comprehensive analysis. And in the unlikely event that you encounter any issues during your application run, please don’t hesitate to send us the log file for meticulous analysis and swift resolution.

Step 3: Upload Results

You must manually upload the encrypted files to Upload Data Estate Assessment ℠ Results.

Once we receive the results from you, we will give priority to processing the report.

If you have any questions about these Install Instructions, You can contact us by visiting this page on our website: https://upsearch.com/contact-us/.

Was this article helpful?

Related Articles