Setup Wizard: Reporting Server page

Applies To: Forefront Client Security

Use this wizard page to specify details about the reporting server. This page appears when you install the reporting database. As part of installing the reporting database, you configure the reporting server, either on the same computer as the reporting database or on a different computer.


It is highly recommended that you read the Client Security Deployment Guide. The Deployment Guide covers the system requirements, prerequisite software, and the order of installation, all of which are critical for successfully installing Client Security.

Control Description

Reporting server

Specifies the computer name of the reporting server. If you are configuring the current server to be the reporting server, the default value should be correct.


You can also configure a different computer to be the reporting server. If you are doing this, then the default value will be incorrect. Make sure to update this value before continuing.

In most of the standard topologies, the reporting server and database are installed on the same computer. In the three-server topology, however, the reporting server and database are installed on different computers.

For more information about the reporting server, see "Server components" in the Client Security Planning and Architecture Guide.

URLs for reports

Specifies the custom URLs, if any, used for reports. The default values for the URLs match the default values SQL Server uses when installing Reporting Services:

  • URL for Report Server: http://computer name/ReportServer

  • URL for Report Manager: http://computer name/Reports

If you used the default values when installing SQL Server Reporting Services, make sure to use the default values here. If you customized the URLs, enter the custom values.

For more information about configuring the SQL Reporting Services Report Server and Report Manager URLs, see Configuring Report Server Virtual Directories (

Client Security uses Microsoft Operations Manager (MOM) 2005 to collect and report about malware and vulnerabilities on the client computers. To learn about the MOM components in Client Security, see "Client Security and Microsoft Operations Manager" in the Client Security Planning and Architecture Guide.