The following sections describe the various configurations you can use to deploy the ZENworks® Endpoint Security Management components and list the hardware and software requirements for the configurations:
Section 2.1, Deployment Scenarios
Section 2.2, System Requirements