Install your system - Single computer option

The Single computer option installs all server and client components on the current computer.

Milestone recommends that you read the following section carefully before you install: Before you start installation.

For FIPS installations, you cannot upgrade XProtect VMS when FIPS is enabled on the Windows operating system. Before you install, disable the Windows FIPS security policy on all of the computers that are part of the VMS, including the computer that hosts SQL Server. But, if you are upgrading from XProtect VMS version 2020 R3 and after, you do not need to disable FIPS. For detailed information on how to configure your XProtect VMS to run in FIPS 140-2 compliant mode, see the FIPS 140-2 compliance section in the hardening guide.

After initial installation, you can continue with the configuration wizard. Depending on your hardware and configuration, the recording server scans your network for hardware. You can then select which hardware devices to add to your system. Cameras are preconfigured in views, and you have the option to enable other devices such as microphones and speakers. You also have the option of adding users to the system with either an operator role or an administrator role. After installation, XProtect Smart Client opens, and you are ready to use the system.

Otherwise, if you close the installation wizard, XProtect Management Client opens, where you can make manual configurations such as add hardware devices and users to the system.

If you upgrade from a previous version of the product, the system does not scan for hardware or create new views and user profiles.

  1. 從網際網路下載軟體的 .iso 檔 (https://www.milestonesys.com/download/)。將 .iso 檔下載完畢後,會以 DVD 磁碟的格式載入電腦,也就是所謂的 XProtect 視訊管理軟體安裝程式。
  2. 執行 Milestone XProtect VMS Products 2025 R2 System Installer.exe 檔。
  3. 安裝檔案隨即解壓縮。根据安全设置,将显示一个或多个 Windows® 安全警告。接受這些,解壓縮隨即繼續進行。
  4. 完成後,將顯示 Milestone XProtect  視訊管理軟體安裝精靈。
    1. 選取安裝時使用的語言 (這不是系統安裝後使用的語言,稍後才會進行此選擇)。按一下繼續
    2. 閱讀 Milestone 使用者授權合約。選取我接受授權合約條款核取方塊,然後按一下繼續
    3. 隱私權設定窗格中,選擇是否要共用使用資料,並按一下繼續
    4. 如果您想使系統包含符合 EU GDPR 的安裝,則不得啟用資料保護。 如需更多有關資料保護和使用狀況資料收集的資訊,請參閱GDPR 隱私權指南

      您可以稍後隨時變更隱私權設定。 另請參閱系統設定(選項對話方塊)

  5. Select Single computer.

    A list of components to install appears (you cannot edit this list). Click Continue.

  6. On the Assign a system configuration password page, enter a password that protects your system configuration. You will need this password in case of system recovery or when expanding your system, for example when adding clusters.

    It is important that you save this password and keep it safe. If you lose this password, you may compromise your ability to recover your system configuration.

    If you do not want your system configuration to be password protected, select I choose not to use a system configuration password and understand that the system configuration will not be encrypted.

    Click Continue.

  7. On the Assign a mobile server data protection password page, enter a password to encrypt your investigations. As a system administrator, you will need to enter this password to access the mobile server data in case of system recovery or when expanding your system with additional mobile servers.

    You must save this password and keep it safe. Failure to do so may compromise your ability to recover mobile server data.

    If you do not want your investigations to be password-protected, select I choose not to use a mobile server data protection password, and I understand that investigations will not be encrypted.

    Click Continue.

  8. On the Specify recording server settings page, specify the different recording server settings:
    1. In the Recording server name field, enter the name of the recording server. The default is the name of the computer.
    2. The Management server address field shows the address and port number of the management server: localhost:80.
    3. In the Select your media database location field, select the location where you want to save your video recording. Milestone recommends that you save your video recordings in a separate location from where you install the software and not on the system drive. The default location is the drive with the most space available.
    4. In Retention time for video recordings field, define for how long you want to save the recordings. You can enter from between 1 and 365,000 days, where 7 days is the default retention time.
    5. Click Continue.
  9. On the Select encryption page, you can secure the communication flows:

    • Between the recording servers, data collectors, and the management server

      To enable encryption for internal communication flows, in the Server certificate section, select a certificate.

      If you encrypt the connection from the recording server to the management server, the system requires that you also encrypt the connection from the management server to the recording server.

    • Between the recording servers and clients

      To enable encryption between recording servers and client components that retrieve data streams from the recording server, in the Streaming media certificate section, select a certificate.

    • Between the mobile server and clients

      To enable encryption between client components that retrieve data streams from the mobile server, in the Mobile streaming media certificate section, select a certificate.

    • Between the event server and components that communicate with the event server

      To enable encryption between the event server and components that communicate with the event server, including the LPR Server, in the Event server and extensions section, select a certificate.

    You can use the same certificate file for all system components or use different certificate files depending on the system components.

    For more information about preparing your system for secure communication, see:

    You can also enable encryption after installation from the Server Configurator in the Management Server Manager tray icon in the notification area.

  10. On the Select file location and product language page, do the following:

    1. In the File location field, select the location where you want to install the software.

      If any Milestone XProtect VMS product is already installed on the computer, this field is disabled. The field displays the location where the component will be installed.

    2. In Product language, select the language in which to install your XProtect product.
    3. Click Install.

    The software now installs. If not already installed on the computer, Microsoft® SQL Server® Express and Microsoft IIS are automatically installed during the installation.

  11. 系統可能會提示您需重新啟動電腦。重新啟動電腦後,根據安全性設定的不同,可能出現一個或多個 Windows 安全性警告。接受這些,安裝隨即完成。

  12. When the installation completes, a list shows the components that are installed on the computer.

    Click Continue to add hardware and users to the system.

    If you click Close now, you bypass the configuration wizard and XProtect Management Client opens. You can configure the system, for example add hardware and users to the system, in Management Client.

  13. On the Enter user names and passwords for hardware page, enter the user names and passwords for hardware that you have changed from the manufacturer defaults.

    The installer scans the network for this hardware as well as hardware with manufacturer default credentials.

    Click Continue and wait while the system scans for hardware.

  14. On the Select the hardware to add to the system page, select the hardware that you want to add to the system. Click Continue and wait while the system adds the hardware.
  15. On the Configure the devices page, you can give the hardware descriptive names by clicking the edit icon next to the hardware name. This name is then prefixed to the hardware devices.

    Expand the hardware node to enable or disable the hardware devices, such as cameras, speakers, and microphones.

    Cameras are enabled by default, and speakers and microphones are disabled by default.

    Click Continue and wait while the system configures the hardware.

  16. On the Add users page, you can add users to the system as Windows users or basic users. The users can have either the Administrators role or the Operators role.

    Define the user and click Add.

    When you are done adding users, click Continue.

  17. When the installation and initial configuration are done, the Configuration is complete page appears, where you see:
    • A list of hardware devices that are added to the system
    • A list of users who are added to the system
    • Addresses to the XProtect Web Client and XProtect Mobile client, which you can share with your users
  18. When you click Close, XProtect Smart Client opens and is ready to use.