1.7 Summarize application installation and configuration concepts. Flashcards
• System requirements
System requirements This refers to the PC specification that is required to run the application. Refers to issues like RAM, Drive Space, speakers, or others.
System requirements
- Drive space
Drive Space Some applications require high disk space requirements. Like the installation of Microsoft Office (3GB), it is important to understand these limitations for the purposes of a thick client but also for VMs and other real-world applications.
System requirements
- RAM
RAM Random access memory is a pretty heavy requirement for OS configuration. Most applications require at least 2 GB of system memory.
• OS requirements - Compatibility
OS requirements Compatibility Operating systems need to run on minimum required systems configurations.
A windows OS runs on whatever hardware it takes to run it and the same applies to Apple.
Mac OS can only be run on Apple’s proprietary hardware.
• Methods of installation and deployment
- Local (CD/USB)
Methods of installation and deployment Local (CD/USB) When performing installations, the main ways to go about doing this are via CD or USB.
Preferably a USB will be the most applicable way of performing a local install. This may also require adjusting BIOS configurations for boot method.
• Methods of installation and deployment
- Network-based
Network Based When performing a Network Based install/deployment, using a network-based installer, a setup file is copied to a shared folder on the network and client computers run the setup file from this folder. In Windows, we can use Group Policy Objects (GPO) to set a computer to remotely install an application from a network folder without any manual intervention.
• Local user permissions
Local user permissions Folder/file access for installation With group policy, it’s very simple to monitor and push installations.
With local user permissions, the user is required to make or change permissions settings.
- Folder/file access for installation
Local user permissions Folder/file access for installation With group policy, it’s very simple to monitor and push installations.
With local user permissions, the user is required to make or change permissions settings.
• Security considerations
Security considerations Messer states that the reasons we give security considerations is because applications have the same rights and permissions as users.
Therefore, installing an unknown application can cause major issues and possible damage.
• Security considerations -
Impact to device
Impact to device Due to an upgrade, applications may stop working or become degraded on the device. There may be slowdowns and deleted files.
Opportunities for threats can become more likely when the target is softer and more well-known.
• Security considerations -
Impact to network
Impact to network The impact to the network may be that access to internal services may be compromised or degraded. Also, rights and permissions may be altered or reconfigured in a way not designed for the best outcome or optimization. It’s imperative to maintain security protocols.