Agent Install Guide. Lumension Endpoint Management and Security Suite 7.0 SP1
|
|
|
- Samson Potter
- 10 years ago
- Views:
Transcription
1 Agent Install Guide Lumension Endpoint Management and Security Suite 7.0 SP1
2 Lumension Endpoint Management and Security Suite 7.0 SP1-2-
3 Notices Version Information Lumension Endpoint Management and Security Suite Patch Agent Install Guide - Lumension Endpoint Management and Security Suite Version Beta - Released: April 2010 Document Number: 02_017_Beta_ Copyright Information Lumension 8660 East Hartford Drive, Suite 300 Scottsdale, AZ Phone: Fax: [email protected] Copyright Lumension Security, Inc.: ALL RIGHTS RESERVED. Protected by U.S. Patent nos. 7,278,158, 6,990,660, and 7,487,495 and European Patent nos. EP and EP ; other patents pending. This manual, as well as the software described in it, is furnished under license. No part of this manual may be reproduced, stored in a retrieval system, or transmitted in any form - electronic, mechanical, recording, or otherwise - except as permitted by such license. LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: LUMENSION SECURITY, INC. (LUMENSION) MAKES NO REPRESENTATIONS OR WARRANTIES IN REGARDS TO THE ACCURACY OR COMPLETENESS OF THE INFORMATION PROVIDED IN THIS MANUAL. LUMENSION RESERVES THE RIGHT TO MAKE CHANGES TO THE INFORMATION DESCRIBED IN THIS MANUAL AT ANY TIME WITHOUT NOTICE AND WITHOUT OBLIGATION TO NOTIFY ANY PERSON OF SUCH CHANGES. THE INFORMATION PROVIDED IN THE MANUAL IS NOT GUARANTEED OR WARRANTED TO PRODUCE ANY PARTICULAR RESULT, AND THE ADVICE AND STRATEGIES CONTAINED MAY NOT BE SUITABLE FOR EVERY ORGANIZATION. NO WARRANTY MAY BE CREATED OR EXTENDED WITH RESPECT TO THIS MANUAL BY SALES REPRESENTATIVES OR WRITTEN SALES MATERIALS. LUMENSION SHALL NOT BE LIABLE FOR ANY LOSS OF PROFIT OR ANY OTHER DAMAGES ARISING FROM THE USE OF THIS MANUAL, INCLUDING BUT NOT LIMITED TO SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR OTHER DAMAGES. Trademark Information Lumension Security, Lumension, Lumension Patch and Remediation, Lumension Enterprise Reporting, Lumension Security Management Console, Lumension Content Wizard, Lumension Scan, Lumension NAC Integrator, Lumension Security Configuration Management, Lumension Application Control, Lumension Device Control, Lumension Endpoint Security, Lumension Endpoint Management and Security Suite, PatchLink, PatchLink Update, Sanctuary, SecureWave, their associated logos, and all other trademarks and trade names used here are the property of Lumension Security, Inc. RSA Secured is a registered trademark of RSA Security Inc. Apache is a trademark of the Apache Software Foundation. In addition, any other companies' names and products mentioned in this document may be either registered trademarks or trademarks of their respective owners. -3-
4 Lumension Endpoint Management and Security Suite 7.0 SP1 Feedback Your feedback lets us know if we are meeting your documentation needs. the Lumension Technical Publications department at to tell us what you like best, what you like least, and to report any inaccuracies. -4-
5 Table of Contents Table of Contents Preface: About This Document... 7 Typographical Conventions...7 Contacting Lumension...7 Chapter 1: Preparing for Agent Installation...11 Installation Methods Supported Agent Operating Systems...12 Supported Languages Requirements Agent for Windows...15 Agent for Linux, UNIX, and Mac Chapter 2: Installing Agents Installing Agents on Endpoints...19 Downloading the Installer...19 Installing the Single Agent for Windows Installing the Single Agent for Windows XP and Later...27 Installing the Single Agent for Mac...32 Installing the Command Line Agent for Linux, UNIX, and Mac Installing Agents by Agent Management Job Upgrading Agents...51 Upgrading Agents Locally...52 Uninstalling Agents Uninstalling Agents by Agent Management Job Uninstalling the Agent for Windows 2000 Locally...65 Uninstalling the Agent for XP or Later Locally...65 Uninstalling the Agent for Linux Locally...66 Uninstalling the Agent for Solaris Locally Uninstalling the Agent for AIX Locally Uninstalling the Agent for HP-UX Locally Uninstalling the Command Line Agent for Mac Locally Chapter 3: Automating the Agent Installation...69 Automating the Windows MSI Installer
6 Lumension Endpoint Management and Security Suite 7.0 SP1 Creating a Network Share Modifying the PatchAgent.msi File Modifying the LMAgent.msi Installer...77 Creating an Organizational Unit...82 Performing a Silent Install on Windows Command Line Descriptions for Windows Command Line Descriptions for Windows XP or Later Performing a Silent Install on Linux/UNIX/Mac...88 Command Line Descriptions Configuring the Server and Endpoints for Agent Management Jobs...91 Configuring the Scanning System Configuring Pre-Windows Vista Endpoint for Discovery Configuring Endpoints for Agent Management Jobs (Pre-Windows Vista)...94 Configuring Post-Windows Vista Endpoints for Discovery Configuring Endpoints for Agent Management Jobs (Post-Windows Vista) Resolving Endpoint UAC Issues Troubleshooting Agent Management Jobs Disabling Password Changes
7 Preface About This Document This Agent Install Guide is a resource written for all users of Lumension Endpoint Management and Security Suite 7.0 SP1. This document defines the concepts and procedures for installing, configuring, implementing, and using Lumension Endpoint Management and Security Suite 7.0 SP1. Tip: Lumension documentation is updated on a regular basis. To acquire the latest version of this or any other published document, please refer to the Lumension Customer Portal ( Typographical Conventions The following conventions are used throughout this documentation to help you identify various information types. Convention Usage bold Buttons, menu items, window and screen objects. bold italics Wizard names, window names, and page names. italics New terms, options, and variables. UPPERCASE SQL Commands and keyboard keys. monospace File names, path names, programs, executables, command syntax, and property names. Contacting Lumension Global Headquarters European Headquarters 8660 East Hartford Drive Suite 300 Scottsdale, AZ United States of America Phone: Fax: Atrium Business Park Z.A. Bourmicht 23, rue du Puits Romain L-8070 Bertrange, Luxembourg Phone: Fax:
8 Lumension Endpoint Management and Security Suite 7.0 SP1 United Kingdom Office Lumension Security Ireland Limited Unit C1 Windsor Place Faraday Road, Crawley West Sussex, RH10 9TF United Kingdom Phone: +44 (0) Fax: +44 (0) Galway Technology Centre Unit Number 20 Mervue Industrial Estate County of Galway Ireland Phone: Germany Office Spain Office Wazmannstrasse Olching (Munich) Germany Phone: +49 (0) Fax: +49 (0) Paseo de la Castellana, 141 pt.20 ed. Cuzco IV Madrid Spain Phone: Fax: US Federal Solutions Group France Office Virginia Office - Federal Solutions Group Sunrise Valley Drive, Suite 203 Herndon, VA United States of America Phone: (option 1) Fax: [email protected] Phone: Singapore Office Australia Office 9 Raffles Place Level 58, Republic Plaza Singapore Phone: Fax: [email protected] Level 20, Tower II, Darling Park 201 Sussex Street Sydney, NSW Australia 2000 Phone: Fax: [email protected] -8-
9 Preface North America Sales International Sales Phone: (option 1) US Phone: (option 1) UK Phone: + 44 (0) Luxembourg Phone: Singapore Phone: [email protected] or [email protected] (APAC) or [email protected] (EMEA) Lumension Vulnerability Management Technical Support Lumension Endpoint Security Technical Support Phone: (Opt 2) (US Toll Free) (UK Toll Free) (EMEA) +61 (02) (Australia) (Hong Kong) (Singapore) [email protected] (US) [email protected] (APAC) [email protected] (EMEA) Phone: (US Toll Free) (UK Toll Free) (EMEA) [email protected] Note: For additional contact information, please visit the Contact Lumension page at
10 Lumension Endpoint Management and Security Suite 7.0 SP1-10 -
11 Chapter 1 Preparing for Agent Installation In this chapter: Installation Methods Supported Agent Operating Systems Supported Languages Having successfully installed your Lumension Endpoint Management and Security Suite server, you can now proceed to the installation of your agents. Following installation the agent is monitored and maintained by the Lumension Endpoint Management and Security Suite server requiring no additional maintenance. Requirements Installation Methods Agents can be deployed using any one (or combination) of the following methods: Table 1: Installation Options Installation Type Agent Type Descriptions Single agent installer for Windows 2000 Patch 6.4 Agent Allows you to run the installer, entering the information as prompted. You can also modify the Microsoft Software Installer (MSI) file, using an MSI editor, to include your organization s configuration. The.msi file can be delivered by using a login script, Active Directory Group Policy Object (GPO), or other remote software installation method. Single agent installer for Windows XP and later Lumension EMSS 7.0 Agent Allows you to run the Lumension EMSS (Endpoint Management and Security Suite) agent installer, entering the information as prompted. The Lumension EMSS agent then automatically installs the patch component. You can also modify the Microsoft Software Installer (MSI) file, using an MSI editor, to include your organization s configuration. The.msi file can be delivered by using a login script, Active Directory Group Policy Object (GPO), or other remote software installation method
12 Lumension Endpoint Management and Security Suite 7.0 SP1 Installation Type Agent Type Descriptions Single agent installer for Mac Lumension EMSS 7.0 Agent Allows you to run the installer, entering information as prompted. Single agent installer for Linux/ Unix/Mac Lumension EMSS 7.0 Agent Allows you to run the installer, entering the information as prompted. You can also perform a silent installation using rsh or SSH. Supported Agent Operating Systems There are multiple versions of the Lumension Endpoint Management and Security Suite (Lumension EMSS) agent to accommodate multiple platforms. In some cases, more than one agent version can be installed on a particular operating system. The following table lists the supported platforms on which the agent is supported. Table 2: Supported Operating Systems Operating System Version Edition Data Width Proc. Family Software Prerequisites Agent Version Microsoft Windows 2000 SP4 5.0 All(1) 32 bit Intel Microsoft Windows Installer 2.0+ Patch 6.4 Agent Microsoft Windows XP SP Professional(2) 32/64 bit Intel Microsoft Windows Installer 2.0+ Lumension EMSS 7.0 Agent Microsoft Windows 2003 SP Web 32/64 bit Intel Microsoft Windows Installer 2.0+ Lumension EMSS 7.0 Agent 32/64 bit Intel Microsoft.NET Framework 3.0+ Lumension EMSS 7.0 Agent 32/64 bit Intel Microsoft.NET Framework 3.0+ Lumension EMSS 7.0 Agent Standard Enterprise R2 Microsoft Windows Vista 6.0 Business Enterprise Ultimate Microsoft Windows Server Web(3) Standard Enterprise
13 Preparing for Agent Installation Operating System Version Edition Data Width Proc. Family Software Prerequisites Agent Version Microsoft Windows Professional 32/64 bit Intel Microsoft.NET Framework 3.0+ Lumension EMSS 7.0 Agent 64 bit Intel Microsoft.NET Framework 3.0+ Lumension EMSS 7.0 Agent All 32/64 bit Intel / PowerPC Sun Java JRE Patch 7.0 Agent All 64 bit PA-RISC Sun Java JRE Patch 7.0 Agent All 32/64 bit Power / PowerPC Sun Java JRE Patch 7.0 Agent Enterprise 32/64 bit Intel Sun Java JRE Patch 7.0 Agent 3.0 Enterprise 32/64 bit Intel Sun Java JRE Patch 7.0 Agent 4.0 AS 5.0 ES 32/64 bit SPARC / Intel Sun Java JRE Patch 7.0 Agent Enterprise Ultimate Microsoft Windows Server 2008 R2 7.0 Standard Enterprise Web Apple Mac OS X HP-UX IBM AIX Novell SUSE Linux Red Hat Linux WS Sun Solaris 8 All
14 Lumension Endpoint Management and Security Suite 7.0 SP1 Operating System Version Edition Data Width Proc. Family Software Prerequisites Agent Version Oracle Linux 4 All 32/64 bit Intel Sun Java JRE Patch 7.0 Agent All 32/64 bit Intel Sun Java JRE Patch 7.0 Agent 5 CentOS Linux 4 5 (1) The Datacenter editions of this OS family are not supported. (2) Home, Media Center, and Tablet PC editions are not supported. (3) The Datacenter and Core Editions of this OS family are not supported. Supported Languages The agent is supported in the following languages: en-au: English (Australia) en-bz: English (Belize) en-ca: English (Canada) en-jm: English (Jamaica) en-nz: English (New Zealand) en-za: English (South Africa) en-gb: English (United Kingdom) en-us: English (United States) es-es: Spanish (Spain) fi-fi: Finnish (Finland) fr-fr: French (France) de-de: German (Germany) it-it: Italian (Italy) ja-jp: Japanese (Japan) ko-kr: Korean (Korea) nl-nl: Dutch (Netherlands) pt-be: Portuguese (Brazil) zh-cn: Chinese (Simplified) zh-chs: Chinese (Simplified) zh-tw: Chinese (Traditional) zh-cht: Chinese (Traditional)
15 Preparing for Agent Installation Requirements The following section lists the hardware and software requirements for the agent. Note: You must disable any virus-scanning software prior to the installation of the Lumension Agent for Windows. Failure to do so may result in an unsuccessful agent installation. Agent for Windows The following minimum requirements must be met in order to install the agent on endpoints running the Microsoft Windows operating system. The install (and uninstall) must be done by an Administrator or Administrator equivalent. 500 MHz processor or higher. 256 MB RAM. 20 MB of free disk space for agent installation. 25 MB of free disk space once the agent is installed A single 10 Mbps network connection (with access to the Lumension Endpoint Management and Security Suite server). Sufficient free disk space to download and install patches (varies dependent upon size of patch). Windows Installer 2.0 or higher. Microsoft Internet Explorer 5.01 or higher (Internet Explorer 5.5 or higher if using SSL). Network connectivity to your Lumension Endpoint Management and Security Suite server (6.5 or higher). Note: Windows 2000 computers require Service Pack 1. The following table lists the supported platforms on which the agent is supported. Table 3: Supported Operating Systems Operating System Version Edition Data Width Proc. Family Software Prerequisites Agent Version Microsoft Windows 2000 SP4 5.0 All(1) 32 bit Intel Microsoft Windows Installer 2.0+ Patch 6.4 Agent Microsoft Windows XP SP Professional(2) 32/64 bit Intel Microsoft Windows Installer 2.0+ Lumension EMSS 7.0 Agent Microsoft Windows 2003 SP Web 32/64 bit Intel Microsoft Windows Installer 2.0+ Lumension EMSS 7.0 Agent Standard Enterprise R2-15 -
16 Lumension Endpoint Management and Security Suite 7.0 SP1 Operating System Version Edition Data Width Proc. Family Software Prerequisites Agent Version Microsoft Windows Vista 6.0 Business 32/64 bit Intel Microsoft.NET Framework 3.0+ Lumension EMSS 7.0 Agent 32/64 bit Intel Microsoft.NET Framework 3.0+ Lumension EMSS 7.0 Agent 32/64 bit Intel Microsoft.NET Framework 3.0+ Lumension EMSS 7.0 Agent 64 bit Intel Microsoft.NET Framework 3.0+ Lumension EMSS 7.0 Agent Enterprise Ultimate Microsoft Windows Server Web(3) Standard Enterprise Microsoft Windows 7 7 Professional Enterprise Ultimate Microsoft Windows 2008 R2 7 Standard Enterprise Web (1) The Datacenter editions of this OS family are not supported. (2) Home, Media Center, and Tablet PC editions are not supported. (3) The Datacenter and Core Editions of this OS family are not supported. Agent for Linux, UNIX, and Mac The following minimum requirements must be met in order to install the agent on endpoints running the Linux, UNIX, or Mac operating systems. The install (and uninstall) must be done by the root user (superuser). Presence of /tmp directory (/var/tmp directory on Solaris) for temporary file storage and processing. 105 MB of free disk space for the agent installation. It is recommended that there be 100 MB of free disk space in /temp (/var/tmp for Solaris) and a separate 50 MB of free disk space in the agent installation directory. 500 MHz or greater processor. 256 MB RAM. 10 Mbps network connection (with access to the Lumension Endpoint Management and Security Suite server). Sufficient free disk space to download and install patches. Network connectivity to your Lumension Endpoint Management and Security Suite server. The following table lists the supported platforms on which the agent is supported
17 Preparing for Agent Installation Table 4: Supported Operating Systems Operating System Version Edition Data Width Proc. Family Software Prerequisites Agent Version Apple Mac OS X 10.3 All 32/64 bit Intel / PowerPC Sun Java JRE Lumension EMSS 7.0 Agent All 64 bit PA-RISC Sun Java JRE Patch 7.0 Agent All 32/64 bit Power / PowerPC Sun Java JRE Patch 7.0 Agent Enterprise 32/64 bit Intel Sun Java JRE Patch 7.0 Agent 3.0 Enterprise 32/64 bit Intel Sun Java JRE Patch 7.0 Agent 4.0 AS 5.0 ES All 32/64 bit SPARC / Intel Sun Java JRE Patch 7.0 Agent All 32/64 bit Intel Sun Java JRE Patch 7.0 Agent All 32/64 bit Intel Sun Java JRE Patch 7.0 Agent HP-UX IBM AIX Novell SUSE Linux 9 10 Red Hat Linux WS Sun Solaris Oracle Linux 4 5 CentOS Linux
18 Lumension Endpoint Management and Security Suite 7.0 SP1-18 -
19 Chapter 2 Installing Agents In this chapter: Installing Agents on Endpoints Upgrading Agents Uninstalling Agents Installing agents on your endpoints allows you to manage the endpoint using Lumension Endpoint Management and Security Suite. The following section includes instructions for installing the agent. Installation instructions are specific to operating system type and version. Installing Agents on Endpoints Running the agent installer on an endpoint connects the endpoint to the Lumension Endpoint Management and Security Suite server. You can install an agent on an endpoint in either of the following ways: Download the appropriate installer to the endpoint that you want to manage, then run the installer locally on the endpoint. Create an agent management job to install the agent that targets the endpoint (Windows operating systems only). When the job executes, an agent is installed on the endpoint. Note: You should not perform the procedures listed in this section on the Lumension Endpoint Management and Security Suite server. The agent on the Lumension Endpoint Management and Security Suite server is installed and configured during the server installation process. Downloading the Installer The standard agent install requires logging in to the Lumension Endpoint Management and Security Suite administration console from the target computer then downloading the installer to that computer. For some operating systems, you have the option of downloading and installing the command line version of the agent installer or the graphical user interface version of the agent installer. The command line agent is installed and accessed after installation using the command line. The graphical user interface version of the agent is installed using an installation wizard and accessed after installation via the Control Panel (Windows) or System Preferences (Mac). 1. Log in to the target computer as the local administrator (or a member of the Local Administrators group). 2. Launch your Web browser
20 Lumension Endpoint Management and Security Suite 7.0 SP1 3. Log in to your Lumension Endpoint Management and Security Suite. The Lumension Endpoint Management and Security Suite Home page opens. 4. Select Tools > Download Agent Installer. The Download Agent Installers dialog opens. Figure 1: Download Agent Installers Dialog Note: You can click Cancel at any time to close this page and cancel the download procedure. 5. Select the endpoint's operating system from the Operating System drop-down list. 6. Select the version of the agent that you want to install from the Agent Version drop-down list. 7. Click Download to download the installer to the endpoint. The installer downloads to the location you specify on your computer. Tip: This dialog stays open during the installer download so that you can copy the server URL and the serial number for use during the agent installation. 8. In the Download Agent Installers page, click Close. The Download Agent Installers page closes
21 Installing Agents Installing the Single Agent for Windows 2000 Prerequisites: Verify that your computer meets the minimum requirements for agent installation. See Agent for Windows on page 15 for more information. Download the appropriate installer for your operating system. See Downloading the Installer on page 19 for more information. Caution: The following steps apply to the Lumension Windows 2000 Patch Agent installer. To install the agent for Windows XP or later, refer to Installing the Single Agent for Windows XP and Later on page From the downloaded location, open the PatchAgent.msi installer file to extract the Lumension Patch Agent for Windows InstallShield Wizard. The Welcome dialog opens. Figure 2: Welcome Dialog
22 Lumension Endpoint Management and Security Suite 7.0 SP1 2. Click Next. The License Agreement dialog opens. Figure 3: License Agreement Dialog 3. If you agree to the license terms select the I accept the terms in the license agreement option and click Next. The Destination Folder dialog opens. Figure 4: Destination Folder Dialog
23 Installing Agents 4. To change the location of the agent: a) Click Change. The Change Current Destination Folder dialog opens. Figure 5: Change Current Destination Folder Dialog b) Change the installation to the location you want. c) Click OK. The Change Current Destination Folder dialog closes and the Destination Folder dialog reflects the new location
24 Lumension Endpoint Management and Security Suite 7.0 SP1 5. Click Next. The Agent Registration dialog opens. Figure 6: Agent Registration Dialog 6. Type the appropriate IP address or URL in the LEMSS Server URL field including the protocol ( serveraddress or for a secure server). 7. Type your serial number in the field. Use the same serial number that was used for the installation of your Lumension Endpoint Management and Security Suite server, otherwise the agent will be unable to communicate with the server. Tip: The Lumension Endpoint Management and Security Suite serial number is available on the Lumension Endpoint Management and Security Suite Home page
25 Installing Agents 8. If your LAN uses a proxy server: a) Select Use a Proxy Server. The Proxy Information dialog opens. Figure 7: Proxy Information Dialog b) In the Proxy URL field, enter the URL of your proxy server. c) In the Proxy Port field, type the proxy port number (if required). d) If you are using an authenticated proxy: Select the My proxy server requires authorization option. In the Username field, type the user name. In the Password field, type a new password for the proxy. In the Confirm Password field, type the proxy password again. Note: In many LAN environments, although a proxy is used for Internet access, a proxy bypass is used to for all access within the corporate network. Therefore, only enter proxy information if your agents will be required to use a proxy to access your Lumension Endpoint Management and Security Suite server
26 Lumension Endpoint Management and Security Suite 7.0 SP1 9. Click Next. The Ready to Install the Program dialog opens. Figure 8: Ready to Install the Program Dialog 10. Click Install to install the agent. The agent is installed and the Installation Complete dialog displays. Figure 9: Installation Complete Dialog 11. Click Finish to exit the wizard. Result: The agent is installed
27 Installing Agents Installing the Single Agent for Windows XP and Later Prerequisites: Verify that your computer meets the minimum requirements for agent installation. See Agent for Windows on page 15 for more information. Download the appropriate installer for your operating system. See Downloading the Installer on page 19 for more information. The following steps apply to both the single agent for Windows MSI Installer and the single agent for Windows x64 MSI Installer. Note: If you downloaded the 64-bit installer, x64 will be appended to the file name for the installer. 1. From the downloaded location, open the LMAgent.msi installer file to extract the agent for Windows Installation Wizard. The Welcome dialog opens. Figure 10: Welcome Dialog
28 Lumension Endpoint Management and Security Suite 7.0 SP1 2. Click Next. The License Agreement dialog opens. Figure 11: License Agreement Dialog 3. If you agree to the license terms select the I accept the terms in the license agreement option and click Next. The Destination Folder dialog opens. Figure 12: Destination Folder Dialog
29 Installing Agents 4. To change the location of the agent: a) Click Change. The Change Current Destination Folder dialog opens. Figure 13: Change Current Destination Folder Dialog b) Change the installation to the location you want. c) Click OK. The Change Current Destination Folder dialog closes and the Destination Folder dialog reflects the new location
30 Lumension Endpoint Management and Security Suite 7.0 SP1 5. Click Next. The Lumension EMSS Server Information dialog opens. Figure 14: Lumension EMSS Server Information Dialog 6. Type the appropriate IP address or URL in the Server identity field including the protocol ( serveraddress or for a secure server). 7. If your LAN uses a proxy server: a) Select Use a Proxy Server. The Proxy Information dialog opens. Figure 15: Proxy Information Dialog b) In the Proxy URL field, type the proxy URL
31 Installing Agents c) In the Port number field, type the proxy port number (if required). d) If you are using an authenticated proxy: Select the Authentication is required check box. In the Username field, type the user name. In the Password field, type a new password for the proxy. In the Confirm Password field, type the proxy password again. Note: In many LAN environments, although a proxy is used for Internet access, a proxy bypass is used to for all access within the corporate network. Therefore, only enter proxy information if your agents will be required to use a proxy to access your Lumension Endpoint Management and Security Suite server. 8. Click Next. The Installation Ready dialog opens. Figure 16: Installation Ready Dialog
32 Lumension Endpoint Management and Security Suite 7.0 SP1 9. Click Install to install the agent. The agent is installed and the Installation Complete dialog displays. Figure 17: Installation Complete Dialog 10. Click Finish to exit the wizard. Result: The agent is installed. The agent's patch component is downloaded automatically to the agent. Installing the Single Agent for Mac Complete the following procedure to install an agent on the Mac. Prerequisites: Verify that your computer meets the minimum requirements for agent installation. See Agent for Linux, UNIX, and Mac on page 16 for more information. Download the appropriate installer for your operating system. See Downloading the Installer on page 19 for more information. 1. Verify that your computer meets the minimum requirements for agent installation. 2. From the downloaded location, select the updateagentformac.dmg to extract the Patch Agent for Mac Installer. 3. Open the installer
33 Installing Agents 4. Enter your system password. The Introduction dialog displays. Figure 18: Introduction Dialog 5. Click Next. The License Agreement dialog displays. Figure 19: License Agreement Dialog
34 Lumension Endpoint Management and Security Suite 7.0 SP1 6. If you agree to the license terms select the I Accept the terms of the License Agreement option and click Next. The Verify Sudo Password dialog opens. Figure 20: Verify Sudo Password Dialog 7. Enter your system password in the Please Enter the Password field. This is the same password that you entered in step previously. 8. Click Next. The Choose Install Folder dialog displays. Figure 21: Choose Install Folder Dialog
35 Installing Agents 9. To change the location of the agent: a) Click Choose. The Finder window opens. Figure 22: Finder window b) Change the installation to the location you need. c) Select Open. d) Optionally, you can click Restore Default Folder to restore the default installation location. 10. Select Next. The Server Information dialog displays. Figure 23: The Server Information Dialog 11. Type the appropriate URL in the URL field including the protocol ( or serveraddress for a secure server)
36 Lumension Endpoint Management and Security Suite 7.0 SP1 12. Type your serial number in the Serial Number field. Use the same serial number that was used for the installation of your Lumension Endpoint Management and Security Suite otherwise the agent will be unable to communicate with the server. Tip: The Lumension Endpoint Management and Security Suite serial number is available on the Lumension Endpoint Management and Security Suite Home page. 13. If your LAN uses a proxy server: a) Select the Use a Proxy Server check box. b) Click Next. The Proxy Configuration dialog displays. Figure 24: Proxy Configuration Dialog c) In the Proxy URL field, type the proxy URL. d) In the Proxy Port field, type the proxy port (if required). e) If you are using an authenticated proxy: 1. Enter the proxy server user name in the Proxy User (if authenticated) field. 2. Enter the proxy server password in the Proxy Password (if authenticated) field. 3. Enter the proxy server password a second time in the Confirm Password field. Note: In many LAN environments, although a proxy is used for Internet access, a proxy bypass is used for all access within the corporate network. Therefore, only enter proxy information if your agents will be required to use a proxy to access your Lumension Endpoint Management and Security Suite
37 Installing Agents 14. Click Next. The Additional Options dialog displays. Figure 25: Additional Options Dialog 15. To optionally add the agent to specific device groups, enter these names of the groups in the Groups field. Values should be separated by a ( ) symbol. 16. To optionally set the operating system's prioritization value for the agent, enter a value in the Agent Nice Value field. A value of -20 in this field gives the agent the highest priority and 20 is the lowest priority 17. To optionally configure the agent so that it's detectable but cannot have packages deployed to it, select the Detect Only check box. 18. Click Next. The Pre-Installation Summary dialog box displays. 19. Verify the agent pre-installation summary information is accurate
38 Lumension Endpoint Management and Security Suite 7.0 SP1 20. Click Next to begin the installation. The Install Complete Success dialog displays when the installation process is finished. Figure 26: Install Complete Success Dialog 21. Click Done to complete the installation and close the installer. Installing the Command Line Agent for Linux, UNIX, and Mac Prerequisites: Ensure that the currently installed Java version meets the requirements defined under Supported Agent Operating Systems on page 12. Verify that your computer meets the minimum requirements for agent installation. See Agent for Linux, UNIX, and Mac on page 16 for more information. Download the appropriate installer for your operating system. See Downloading the Installer on page 19 for more information. After ensuring the endpoint meets the minimum system requirements, complete the following steps to install the command line agent. 1. In the /root directory, create an UnixUpdateAgent directory. 2. From the downloaded location select the UnixUpdateAgent.tar file, and extract the file s contents to: / root/unixupdateagent. 3. Open a Terminal window. 4. Navigate to the /root/unixupdateagent/ directory. 5. Type./install to start the installation process. 6. At the Enter the Directory where the Agent should be installed [/usr/local]: prompt, type the desired installation path or press ENTER to accept the default path of /usr/local. 7. At the Enter your Lumension Endpoint Management and Security Suite address prompt, type the URL or IP of the Lumension Endpoint Management and Security Suite, to which the agent will be communicating, in the format of or
39 Installing Agents 8. At the Enter the product serial number that appears as xxxxxxxx-xxxxxxxx: prompt, type your serial number. Tip: You must enter your serial number in the xxxxxxxx-xxxxxxxx format. You can copy the serial number from the Lumension Endpoint Management and Security Suite Home page or the Download Agent Installers page. 9. At the Do you have a Proxy [Y/N]: prompt; type y to configure a proxy, or press ENTER to continue without configuring a proxy server. 10. At the Do you wish to add this agent to existing groups on Lumension Endpoint Management and Security Suite? [Y/N]: prompt, type y to add the agent to a group or n to continue. Result: The installation completes and the terminal link can be disconnected. Note: Some issues when installing the Agent for Linux/Unix/Mac may include: An incorrect Lumension Endpoint Management and Security Suite address (if using SSL, the URL starts with An incorrect serial number. Networking problems. An incorrect proxy address or port. Installing Agents by Agent Management Job You can install agents upon network endpoints remotely by using agent management jobs. Installing agents remotely substantially eases an administrator's workload, since they do not have to install agents locally. Prerequisites: Agent management jobs can only manage Windows-based endpoints. Unix-based endpoints are not agent management job-compatible. When configuring the job, you must enter credentials that authenticate with target endpoints for a successful job outcome. Windows Vista, Windows Server 2008, and Windows 7 targets must have Network discovery and File sharing enabled to be discovered by the agent management job. For additional information refer to Configuring Post-Windows Vista Endpoints for Discovery on page 99. Your server must be configured to allow agent management. For additional information, refer to Configuring the Scanning System on page 91. Targets must be configured to allow agent management. For additional information, refer to Configuring Endpoints for Agent Management Jobs (Pre-Windows Vista) on page 94 or Configuring Endpoints for Agent Management Jobs (Post-Windows Vista) on page 103. Verify that your computer meets the minimum requirements for agent installation. See Agent for Linux, UNIX, and Mac on page 16 for more information
40 Lumension Endpoint Management and Security Suite 7.0 SP1 Configuration of agent management jobs is similar to configuration of an ad hoc discovery scan job. Configuration occurs in the Schedule Agent Management Job - Install Wizard. Note: Agent management jobs can only manage Windows-based endpoints. Unix-based endpoints are not agent management job-compatible. 1. Select Discover > Assets and Manage Agents > Install Agents. The Schedule Agent Management Job - Install wizard opens to the Job Name and Scheduling page. Figure 27: Job Name and Scheduling Page 2. If desired, type a new name in the Scan job name field. Note: By default, new agent management jobs for installation are named New Agent Install Management Job, followed by the server's date and time, which is formatted according to your browser's locale setting. 3. Schedule the job. Use one of the following methods. Method Steps To schedule an immediate job: Select the Immediate option
41 Installing Agents Method Steps To schedule a one-time job: 1. Ensure the Once option is selected. 2. Define a start date. Complete one of the following sub step sets. To define a start date manually: You can also select the start date by clicking the Calender icon. a. Type the start date in the Start date field using a mm/dd/yyyy format. To define a start date using the UI: a. Click the Menu icon. b. Select a date from the calender. If necessary, use the arrow icons to open change months. 3. Define a start time. Complete one of the following sub step sets. To define a start time manually: a. Type the start time in the Start time field using a hh:mm format followed by AM or PM. The Start time field supports both 12and 24-hour time. To define a start time using the UI: a. Click the Clock icon. b. Select a time from the menu. Note: Scheduling a one-time job for a past date and time will launch the job immediately
42 Lumension Endpoint Management and Security Suite 7.0 SP1 Method Steps To schedule a recurring weekly job: 1. Select the Weekly option. 2. Define a start date. Complete one of the following sub step sets. To define a start date manually: You can also select the start date by clicking the Calender icon. a. Type the start date in the Start date field using a mm/dd/yyyy format. To define a start date using the UI: a. Click the Menu icon. b. Select a date from the calender. If necessary, use the arrow icons to open change months. 3. Define a start time. Complete one of the following sub step sets. To define a start time manually: a. Type the start time in the Start time field using a hh:mm format followed by AM or PM. The Start time field supports both 12and 24-hour time. To define a start time using the UI: a. Click the Clock icon. b. Select a time from the menu
43 Installing Agents Method Steps To schedule a recurring monthly job: 1. Select the Monthly option. 2. Define a start date. Complete one of the following sub step sets. To define a start date manually: You can also select the start date by clicking the Calender icon. a. Type the start date in the Start date field using a mm/dd/yyyy format. To define a start date using the UI: a. Click the Menu icon. b. Select a date from the calender. If necessary, use the arrow icons to open change months. 3. Define a start time. Complete one of the following sub step sets. To define a start time manually: a. Type the start time in the Start time field using a hh:mm format followed by AM or PM. The Start time field supports both 12and 24-hour time. To define a start time using the UI: a. Click the Clock icon. b. Select a time from the menu. Note: One-time and recurring jobs scheduled for the last day of a 31-day month are automatically rescheduled for the last day of shorter months
44 Lumension Endpoint Management and Security Suite 7.0 SP1 4. Click Next. The Targets page opens. Figure 28: Targets Page 5. Define targets (endpoints) for the job to locate. Use one or more of the following discovery methods. Method Steps To define targets using a single IP address: 1. From the Scan for list, select Single IP Address. 2. Type an IP address in the empty field. Wildcards are supported. For additional information refer to Defining Targets Within an Imported File in the Lumension Endpoint Management and Security Suite 7.0 User Guide ( 3. If necessary, edit the Timeout list. The Timeout list defines the number of seconds before a scan fails due to inactivity for a particular target. Under most network conditions, the Timeout field does not require editing. 4. If necessary, edit the Number of retries list. The Number of retries list defines the number of times a scan retries on that target if the scan times out
45 Installing Agents Method Steps To define targets using an IP range: 1. From the Scan for list, select IP Range. 2. In the first empty field, type the beginning of IP range. Wildcards are supported. For additional information refer to Defining Targets Within an Imported File in the Lumension Endpoint Management and Security Suite 7.0 User Guide ( 3. In the second empty field, type the ending of the IP range. 4. If necessary, edit the Timeout list. The Timeout list defines the number of seconds before a scan fails due to inactivity for that particular target. Under most network conditions, the Timeout field does not require editing. 5. If necessary, edit the Number of retries list. The Number of retries list defines the number of times a scan retries on that target if the scan times out. To define targets using a computer name: 1. From the Scan for list, select Computer name. 2. In the empty field, type an endpoint name in one of the following formats: endpointname or domain\endpointname. To define targets using network neighborhood: 1. From the Scan for list, select Network Neighborhood. 2. From the second list, select the desired network neighborhood. To define targets using active directory: 1. From the Scan for list, select Active Directory. 2. In the Fully-qualified domain name field, type the DNS domain name of the domain controller you want to scan. For example, if your domain controller's DNS name was box.domain.company.local, you would type domain.company.local in this field. 3. In the Organizational Unit field, type the active directory's organizational unit string from specific to broad (optional). The omission of this field returns job results containing the full contents of all the active directory's organizational units. 4. In the Domain controller field, type the domain controller's IP address. 5. In the Username field, type the user name that will authenticate with the domain controller. Type the user name in one of the following format: domainname\username or username. 6. In the Password field, type the password associated with the user name
46 Lumension Endpoint Management and Security Suite 7.0 SP1 Method Steps To define targets using an imported file: 1. From the Scan for list, select Import file. 2. Click Browse. 3. Browse to the file you want to use for target discovery. The following file types are supported:.txt and.csv. 4. Click Open. 6. Add targets to the wizard list. This list indicates whether defined targets are included in or excluded from the job. Use one of the following methods. Method Steps To include defined targets in the job: Click Add to Scan. To exclude defined targets from the job: Click Exclude from Scan. Note: You must include at least one target for Next to become available. You can also delete targets from the list by selecting the applicable check boxes and clicking Remove. 7. If desired, define additional targets and add them to the list. For more information, see Editing Targets in the Lumension Endpoint Management and Security Suite 7.0 User Guide ( 8. Click Next. The Options page opens. Figure 29: Options Page
47 Installing Agents 9. Select or clear the desired Scan Options. The following table defines each Scan Option. Option Description Verify With Ping Jobs using this option send ping requests to all network endpoints targeted for discovery. Endpoints that respond to the request are flagged for scanning; unresponsive endpoints are skipped. Endpoints unresponsive to Verify With Ping are not scanned by other selected discovery options. Note: Anti-virus software and host firewalls may block Verify With Ping. If necessary, adjust anti-virus and firewall configurations to permit ping requests. ICMP Discovery Jobs using this option request a series of echoes, information, and address masks from endpoints. Endpoint responses are then compared to a list of known ICMP fingerprints to identify endpoint operating systems. Note: ICMP Discovery is ineffective on endpoints configured to ignore ICMP requests. For best results identifying Windows operating systems, use this option in conjunction with Windows Version Discovery. Port Scan Discovery Jobs using this option perform a limited scan on endpoint FTP, Telnet, SSH, SMTP, and HTTP ports. Based on the application banners found in these ports, endpoint operating systems are generically identified. Note: For best results in identifying Windows operating systems, use this option in conjunction with Windows Version Discovery. SNMP Discovery Jobs using this option request system properties for SNMP devices (routers, printers, and so on) from the management information base. Following credential authentication, SNMP devices are identified. Note: Without authenticated credentials, SNMP devices ignore SNMP Discovery requests. In this event, one of two outcomes occur: the SNMP device is misidentified as a UNIX endpoint or the SNMP device is not detected. Jobs with no SNMP credentials use the public credential by default
48 Lumension Endpoint Management and Security Suite 7.0 SP1 Option Description Windows Version Discovery Jobs using this option identify an endpoint's specific version of Windows following generic operating system identification during ICMP or Port Scan Discovery. Note: Correct operating system identification is contingent upon authenticated credentials. This option must be used in conjunction with either ICMP or Port Scan Discovery. Resolve DNS Names Jobs using this option acquire the endpoint DNS name through a local DNS server query. These names are displayed in job results for easy endpoint identification. Resolve MAC Addresses Jobs using this option acquire endpoint MAC addresses through endpoint queries. These addresses are displayed in job results for easy endpoint identification. Note: Monitor network inventory reports to prevent MAC address spoofing that may alter the Resolve MAC Addresses results. Resolve NetBIOS Names Jobs using this option acquire endpoint NetBIOS names through WINS NetBIOS mapping. These names are displayed in job results for easy endpoint identification. Note: Security-hardened networks running Windows 2000, Windows 2003, or Windows XP may require enablement of NetBIOS over TCP/IP for Resolve NetBIOS Names to acquire NetBIOS names. Additionally, firewalls protecting endpoints using Windows XP Professional SP2 may require adjustment to permit NetBIOS communication. 10. Select the desired Agent Options. These options control which version of the agent are installed on Windows endpoints. a) For endpoints running Windows XP or a newer Windows operating system, select an agent version from the Windows XP and newer agent versions list. b) For endpoints running Windows 2000, select an agent version from the Windows 2000 agent version list. Note: The availability of different agents in these lists is determined by the Lumension Endpoint Management and Security Suite server settings. For more information, see Agent Versions in the Lumension Endpoint Management and Security Suite 7.0 User Guide ( c) If desired, select the Overwrite existing agents check box. This option controls whether the agent management job re-installs the agent on targets that already have agents installed. If the a Windows XP or later endpoint has a version 6.3 or 6.4 agent on it, the agent will be overwritten with a version 7.0 agent. If the endpoint has a version 6.2 agent on it, it will not be overwritten and the agent management job will show as Incomplete
49 Installing Agents 11. Click Next. The Credentials page opens. Figure 30: Credentials Page 12. Define Windows credentials for the target. Type the applicable information in the following fields. Note: When configuring an agent management job, you must define valid Windows credentials. Field Description Username A user name that authenticates with Windows-based endpoints. Type the user name in a local format (username) or a domain format (domain/username). Password The password associated with the Username. Confirm password The Password retyped
50 Lumension Endpoint Management and Security Suite 7.0 SP1 13. Click Next. The Agent Settings page opens. Figure 31: Agent Settings Page 14. Define the Distribution drop-down lists. The following table describes each list their available values. List Description Timeout Defines the number of minutes before the agent management job terminates due to a non-responsive agent installation or removal (0-30). Number of retries Defines the number of attempts an agent installation or removal will retry if the initial attempt fails (1-10). Number of simultaneous installs Defines the maximum number of agents that can installed or removed simultaneously during the job (1-25). A value of 1 indicates that serial installs or removals should occur. 15. Define how the endpoints that are having agents installed will name the Lumension Endpoint Management and Security Suite server within their registries by selecting a Server identity option. The following table describes each option. Method Steps To have agents list the Lumension Endpoint Management and Security Suite server by its default name: Do not edit the Server identity field. The server will be identified on the agent according to the value set in the Agent Installation section of the Agents tab located on the Options page. For more information, see Agent Installation in the Lumension Endpoint Management and Security Suite 7.0 User Guide (
51 Installing Agents Method Steps To have agent list the Lumension Endpoint Management and Security Suite server by a user-defined name: Type address information for your Lumension EMSS server in the Server identity field. Information must be entered in one of the following formats: endpointname.domainname.com computername If using a proxy during agent management, and that proxy requires authentication, select the Authentication required check box and define the following fields. Field Description Username A user name that authenticates with the proxy. Password The password associated with the Username. Confirm password The Password retyped. 17. Click Finish. Result: The Schedule Agent Management Job - Install wizard closes. Depending on how you configured the job, it moves to either the Scheduled tab or Active tab on the Job Results page. The job will run at the applicable time, installing agents on the defined targets, and move to Completed tab when finished. Upgrading Agents Endpoints running Windows XP or later operating systems are upgraded regularly when they connect to the Lumension Endpoint Management and Security Suite server due to the presence of the Lumension EMSS Agent. Endpoints running Windows 2000 or a version of the Linux, Unix, or Mac operating systems must be upgraded manually. In all cases, you should verify that your agents are being upgraded on your endpoints regularly
52 Lumension Endpoint Management and Security Suite 7.0 SP1 Upgrading Agents Locally Upgrading the agent replaces the version of the agent running on the endpoint with the most recent version of the agent. 1. Click Tools > Download Agent Installer. The Download Agent Installers page opens. Figure 32: Download Agent Installers Note: You can click Cancel at any time to close this page and cancel the download procedure. Tip: Click the copy icon to copy the version, URL, or serial number information to the clipboard. 2. Select the endpoint's operating system from the Operating System drop-down list. 3. Select the version of the agent that you want to install from the Agent Version drop-down list. 4. Click Download to download the installer to the endpoint. The installer downloads to the location you specify on your computer. 5. In the Download Agent Installers page, click Close. Result: The Download Agent Installers page closes
53 Installing Agents Uninstalling Agents Uninstalling an agent from an endpoint removes the agent from the endpoint. The endpoint can still be detected by the Lumension Endpoint Management and Security Suite server, but will no longer receive security content from the Lumension Endpoint Management and Security Suite server. You can uninstall an agent on an endpoint in either of the following ways: Uninstall the agent locally on the endpoint. Create an agent management job to uninstall the agent that targets the endpoint. When the job executes, an agent is uninstalled on the endpoint. Uninstalling Agents by Agent Management Job You can remotely uninstall agents from endpoints in your network using an agent management job. These jobs prevent administrators from having to uninstall agents locally. Prerequisites: Agent management jobs can only manage Windows-based endpoints. Unix-based endpoints are not agent management job-compatible. When configuring the job, you must enter credentials that authenticate with target endpoints for a successful job outcome. Windows Vista, Windows Server 2008, and Windows 7 targets must have Network discovery and File sharing enabled to be discovered by the agent management job. For additional information refer to Configuring Post-Windows Vista Endpoints for Discovery on page 99. Your server must be configured to allow agent management. For additional information, refer to Configuring the Scanning System on page 91. Targets must be configured to allow agent management. For additional information, refer to Configuring Endpoints for Agent Management Jobs (Pre-Windows Vista) on page 94 or Configuring Endpoints for Agent Management Jobs (Post-Windows Vista) on page 103. Configuration of agent management is similar to an ad hoc discovery scan. Configuration occurs in the Schedule Agent Management Job - Uninstall wizard. Note: Agent management jobs can only manage Windows-based endpoints. Unix-based endpoints are not agent management job-compatible
54 Lumension Endpoint Management and Security Suite 7.0 SP1 1. Select Discover > Assets and Manage Agents > Uninstall Agents. The Schedule Agent Management Job - Uninstall wizard opens to the Job Name and Scheduling page. Figure 33: Job Name and Scheduling Page 2. If desired, type a new name in the Scan job name field. Note: By default, new agent management jobs for uninstallation are named New Agent Uninstall Management Job, followed by the server's date and time, which is formatted according to your browser's locale setting. 3. Schedule the job. Use one of the following methods. Method Steps To schedule an immediate job: Select the Immediate option
55 Installing Agents Method Steps To schedule a one-time job: 1. Ensure the Once option is selected. 2. Define a start date. Complete one of the following sub step sets. To define a start date manually: You can also select the start date by clicking the Calender icon. a. Type the start date in the Start date field using a mm/dd/yyyy format. To define a start date using the UI: a. Click the Menu icon. b. Select a date from the calender. If necessary, use the arrow icons to open change months. 3. Define a start time. Complete one of the following sub step sets. To define a start time manually: a. Type the start time in the Start time field using a hh:mm format followed by AM or PM. The Start time field supports both 12and 24-hour time. To define a start time using the UI: a. Click the Clock icon. b. Select a time from the menu. Note: Scheduling a one-time job for a past date and time will launch the job immediately
56 Lumension Endpoint Management and Security Suite 7.0 SP1 Method Steps To schedule a recurring weekly job: 1. Select the Weekly option. 2. Define a start date. Complete one of the following sub step sets. To define a start date manually: You can also select the start date by clicking the Calender icon. a. Type the start date in the Start date field using a mm/dd/yyyy format. To define a start date using the UI: a. Click the Menu icon. b. Select a date from the calender. If necessary, use the arrow icons to open change months. 3. Define a start time. Complete one of the following sub step sets. To define a start time manually: a. Type the start time in the Start time field using a hh:mm format followed by AM or PM. The Start time field supports both 12and 24-hour time. To define a start time using the UI: a. Click the Clock icon. b. Select a time from the menu
57 Installing Agents Method Steps To schedule a recurring monthly job: 1. Select the Monthly option. 2. Define a start date. Complete one of the following sub step sets. To define a start date manually: You can also select the start date by clicking the Calender icon. a. Type the start date in the Start date field using a mm/dd/yyyy format. To define a start date using the UI: a. Click the Menu icon. b. Select a date from the calender. If necessary, use the arrow icons to open change months. 3. Define a start time. Complete one of the following sub step sets. To define a start time manually: a. Type the start time in the Start time field using a hh:mm format followed by AM or PM. The Start time field supports both 12and 24-hour time. To define a start time using the UI: a. Click the Clock icon. b. Select a time from the menu. Note: One-time and recurring jobs scheduled for the last day of a 31-day month are automatically rescheduled for the last day of shorter months
58 Lumension Endpoint Management and Security Suite 7.0 SP1 4. Click Next. The Targets page opens. Figure 34: Targets Page 5. Define targets (endpoints) for the job to locate. Use one or more of the following discovery methods. Method Steps To define targets using a single IP address: 1. From the Scan for list, select Single IP Address. 2. Type an IP address in the empty field. Wildcards are supported. For additional information refer to Defining Targets Within an Imported File in the Lumension Endpoint Management and Security Suite 7.0 User Guide ( 3. If necessary, edit the Timeout list. The Timeout list defines the number of seconds before a scan fails due to inactivity for a particular target. Under most network conditions, the Timeout field does not require editing. 4. If necessary, edit the Number of retries list. The Number of retries list defines the number of times a scan retries on that target if the scan times out
59 Installing Agents Method Steps To define targets using an IP range: 1. From the Scan for list, select IP Range. 2. In the first empty field, type the beginning of IP range. Wildcards are supported. For additional information refer to Defining Targets Within an Imported File in the Lumension Endpoint Management and Security Suite 7.0 User Guide ( 3. In the second empty field, type the ending of the IP range. 4. If necessary, edit the Timeout list. The Timeout list defines the number of seconds before a scan fails due to inactivity for that particular target. Under most network conditions, the Timeout field does not require editing. 5. If necessary, edit the Number of retries list. The Number of retries list defines the number of times a scan retries on that target if the scan times out. To define targets using a computer name: 1. From the Scan for list, select Computer name. 2. In the empty field, type an endpoint name in one of the following formats: endpointname or domain\endpointname. To define targets using network neighborhood: 1. From the Scan for list, select Network Neighborhood. 2. From the second list, select the desired network neighborhood. To define targets using active directory: 1. From the Scan for list, select Active Directory. 2. In the Fully-qualified domain name field, type the DNS domain name of the domain controller you want to scan. For example, if your domain controller's DNS name was box.domain.company.local, you would type domain.company.local in this field. 3. In the Organizational Unit field, type the active directory's organizational unit string from specific to broad (optional). The omission of this field returns job results containing the full contents of all the active directory's organizational units. 4. In the Domain controller field, type the domain controller's IP address. 5. In the Username field, type the user name that will authenticate with the domain controller. Type the user name in one of the following format: domainname\username or username. 6. In the Password field, type the password associated with the user name
60 Lumension Endpoint Management and Security Suite 7.0 SP1 Method Steps To define targets using an imported file: 1. From the Scan for list, select Import file. 2. Click Browse. 3. Browse to the file you want to use for target discovery. The following file types are supported:.txt and.csv. 4. Click Open. 6. Add targets to the wizard list. This list indicates whether defined targets are included in or excluded from the job. Use one of the following methods. Method Steps To include defined targets in the job: Click Add to Scan. To exclude defined targets from the job: Click Exclude from Scan. Note: You must include at least one target for Next to become available. You can also delete targets from the list by selecting the applicable check boxes and clicking Remove. 7. If desired, define additional targets and add them to the list. For more information, see Editing Targets in the Lumension Endpoint Management and Security Suite 7.0 User Guide ( 8. Click Next. The Options page opens. Figure 35: Options Page
61 Installing Agents 9. Select or clear the desired Scan Options. The following table defines each Scan Option. Option Description Verify With Ping Jobs using this option send ping requests to all network endpoints targeted for discovery. Endpoints that respond to the request are flagged for scanning; unresponsive endpoints are skipped. Endpoints unresponsive to Verify With Ping are not scanned by other selected discovery options. Note: Anti-virus software and host firewalls may block Verify With Ping. If necessary, adjust anti-virus and firewall configurations to permit ping requests. ICMP Discovery Jobs using this option request a series of echoes, information, and address masks from endpoints. Endpoint responses are then compared to a list of known ICMP fingerprints to identify endpoint operating systems. Note: ICMP Discovery is ineffective on endpoints configured to ignore ICMP requests. For best results identifying Windows operating systems, use this option in conjunction with Windows Version Discovery. Port Scan Discovery Jobs using this option perform a limited scan on endpoint FTP, Telnet, SSH, SMTP, and HTTP ports. Based on the application banners found in these ports, endpoint operating systems are generically identified. Note: For best results in identifying Windows operating systems, use this option in conjunction with Windows Version Discovery. SNMP Discovery Jobs using this option request system properties for SNMP devices (routers, printers, and so on) from the management information base. Following credential authentication, SNMP devices are identified. Note: Without authenticated credentials, SNMP devices ignore SNMP Discovery requests. In this event, one of two outcomes occur: the SNMP device is misidentified as a UNIX endpoint or the SNMP device is not detected. Jobs with no SNMP credentials use the public credential by default
62 Lumension Endpoint Management and Security Suite 7.0 SP1 Option Description Windows Version Discovery Jobs using this option identify an endpoint's specific version of Windows following generic operating system identification during ICMP or Port Scan Discovery. Note: Correct operating system identification is contingent upon authenticated credentials. This option must be used in conjunction with either ICMP or Port Scan Discovery. Resolve DNS Names Jobs using this option acquire the endpoint DNS name through a local DNS server query. These names are displayed in job results for easy endpoint identification. Resolve MAC Addresses Jobs using this option acquire endpoint MAC addresses through endpoint queries. These addresses are displayed in job results for easy endpoint identification. Note: Monitor network inventory reports to prevent MAC address spoofing that may alter the Resolve MAC Addresses results. Resolve NetBIOS Names Jobs using this option acquire endpoint NetBIOS names through WINS NetBIOS mapping. These names are displayed in job results for easy endpoint identification. Note: Security-hardened networks running Windows 2000, Windows 2003, or Windows XP may require enablement of NetBIOS over TCP/IP for Resolve NetBIOS Names to acquire NetBIOS names. Additionally, firewalls protecting endpoints using Windows XP Professional SP2 may require adjustment to permit NetBIOS communication
63 Installing Agents 10. Click Next. The Credentials page opens. Figure 36: Credentials Page 11. Define Windows credentials. Type the applicable information in the following fields. Note: When configuring an agent management job, you must define valid Windows credentials. Field Description Username A user name that authenticates with Windows endpoints. Type the user name in a local format (username) or a domain format (domain/ username). Password The password associated with the Username. Confirm password The Password retyped
64 Lumension Endpoint Management and Security Suite 7.0 SP1 12. Click Next. The Agent Settings page opens. Figure 37: Agent Settings Page 13. Define the Distribution drop-down lists. The following table describes each list their available values. List Description Timeout Defines the number of minutes before the agent management job terminates due to a non-responsive agent installation or removal (0-30). Number of retries Defines the number of attempts an agent installation or removal will retry if the initial attempt fails (1-10). Number of simultaneous installs Defines the maximum number of agents that can installed or removed simultaneously during the job (1-25). A value of 1 indicates that serial installs or removals should occur. 14. Define the Reboot option. Select one of the following options: Suppress the reboot Force a reboot (does not prompt the user) Note: If the agent being uninstalled resides on the Lumension Endpoint Management and Security Suite server, the reboot is automatically suppressed regardless of this setting. 15. Click Finish. Result: The Schedule Agent Management Job - Uninstall wizard closes. Depending on how you configured the job, it moves to either the Scheduled tab or Active tab on the Job Results page
65 Installing Agents The job will run at the applicable time, uninstalling agents on the defined targets, and move to the Completed tab when finished. Uninstalling the Agent for Windows 2000 Locally You can uninstall agents locally on managed endpoints running the pre-windows Vista operating system. Prerequisites: In order to uninstall an agent from an endpoint, you must provide the uninstall password. See Lumension Endpoint Management and Security Suite 7.0 User Guide ( for more information. 1. Select Start > Control Panel from the Windows menu bar. 2. Double-click Add/Remove Programs. 3. Select Patch Agent from the list of installed programs. 4. Click Change. The Patch Agent installer displays. 5. Click Next. 6. Enter the uninstall password for the endpoint in the Global or uninstall password field. The uninstall password is set in the Global Agent Policy Set. For more information on agent policy sets, see The Policies View in the Lumension Endpoint Management and Security Suite 7.0 User Guide ( portal.lumension.com). 7. Click Next. 8. Click Remove. 9. Click Finish. Result: The agent is uninstalled. Uninstalling the Agent for XP or Later Locally You can uninstall Patch Agents locally on managed endpoints running the Windows XP (or later) operating system. Prerequisites: In order to uninstall an agent from an endpoint, you must provide the uninstall password. See Lumension Endpoint Management and Security Suite 7.0 User Guide ( for more information. 1. Select Start > Control Panel from the Windows menu bar. 2. Double-click Programs and Features. 3. Select LM Agent from the list of installed programs. 4. Click Change. The Patch Agent installer displays. 5. Click Next
66 Lumension Endpoint Management and Security Suite 7.0 SP1 6. Enter the uninstall password for the endpoint in the Global or uninstall password field. The uninstall password is set in the Global Agent Policy Set. For more information on agent policy sets, see The Policies View in the Lumension Endpoint Management and Security Suite 7.0 User Guide ( portal.lumension.com). 7. Click Next. 8. Click Remove. 9. Click Finish. Result: The agent is uninstalled. Uninstalling the Agent for Linux Locally Perform the following procedure to uninstall the Linux agent locally. 1. Navigate to the agent installation directory. By default, this is /usr/local/patchagent. 2. Type./uninstall at the command prompt. 3. Press ENTER. The Linux agent is uninstalled. 4. Type cd /usr/local to navigate to the parent directory of the installation directory. If you installed the agent to a directory other than the default directory, navigate to the parent directory of the agent installation directory. 5. Press ENTER. 6. Type rm rf patchagent. 7. Press ENTER. Result: The Linux agent installation directory is deleted. Uninstalling the Agent for Solaris Locally Perform the following procedure to uninstall the Solaris agent locally. 1. Navigate to the agent installation directory. By default, this is /export/home/patchagent. 2. Type./uninstall at the command prompt. 3. Press ENTER. The Solaris agent is uninstalled. 4. Type cd /export/home to navigate to the parent directory of the installation directory. If you installed the agent to a directory other than the default directory, navigate to the parent directory of the agent installation directory. 5. Press ENTER. 6. Type rm rf patchagent. 7. Press ENTER. Result: The Solaris agent installation directory is deleted
67 Installing Agents Uninstalling the Agent for AIX Locally Perform the following procedure to uninstall the AIX agent locally. 1. Navigate to the agent installation directory. By default, this is /usr/local/patchagent. 2. Type./uninstall at the command prompt. 3. Press ENTER. The AIX agent is uninstalled. 4. Type cd /usr/local to navigate to the parent directory of the installation directory. If you installed the agent to a directory other than the default directory, navigate to the parent directory of the agent installation directory. 5. Press ENTER. 6. Type rm rf patchagent. 7. Press ENTER. Result: The AIX agent installation directory is deleted. Uninstalling the Agent for HP-UX Locally Perform the following procedure to uninstall the HP-UX agent locally. 1. Navigate to the agent installation directory. By default, this is /usr/local/patchagent. 2. Type./uninstall at the command prompt. 3. Press ENTER. The HP-UX agent is uninstalled. 4. Type cd /usr/local to navigate to the parent directory of the installation directory. If you installed the agent to a directory other than the default directory, navigate to the parent directory of the agent installation directory. 5. Press ENTER. 6. Type rm rf patchagent. 7. Press ENTER. Result: The HP-UX agent installation directory is deleted. Uninstalling the Command Line Agent for Mac Locally Perform the following procedure to uninstall the Mac command line agent locally. 1. Navigate to the agent installation directory. By default, this is /private/var/patchagent. 2. Type./uninstall at the command prompt. 3. Press ENTER. The Mac agent is uninstalled
68 Lumension Endpoint Management and Security Suite 7.0 SP1 4. Type cd /private/var to navigate to the parent directory of the installation directory. If you installed the agent to a directory other than the default directory, navigate to the parent directory of the agent installation directory. 5. Press ENTER. 6. Type rm rf patchagent. 7. Press ENTER. Result: The Mac command line agent installation directory is deleted
69 Chapter 3 Automating the Agent Installation In this chapter: Automating the Windows MSI Installer Performing a Silent Install on Windows The following section includes instructions for automating the installation of the agent to a device. Instructions include the following: Performing a Silent Install on Linux/ UNIX/Mac Automation of the PatchAgent.msi installer. This is the agent installer for the Windows 2000 operation system. Automation of the LMAgent.msi installer. This is the agent installer for the Windows XP, Windows Vista, Windows 7, Windows 2008, and Windows 2008 R2 operating systems. Command line options for installing the Windows 2000 agent automatically. Command line options for installing the Windows XP or later agent automatically. Command line options for installing the Linux/Unix/Mac agent automatically. Automating the Windows MSI Installer The Lumension Patch Agent (Patch Agent) and the Lumension Endpoint Management and Security Suite (LEMSS) Agent for Windows MSI Installers can be used to perform a single installation on the current computer or, through the use of the Windows MSI Installer, Group Policy Objects (GPOs), and the Orca package editor, on multiple computers. Using these tools you can install the agent on all windows computers within your domain. 1. Create a network share as defined in Creating a Network Share on page Modify the Lumension Patch Agent or LEMSS Agent for Windows MSI Installer (.msi) file as defined in Modifying the PatchAgent.msi File on page Create an organizational unit as defined in Creating an Organizational Unit on page 82. Note: Microsoft Group Policy Object (GPO) allows for mandatory software distribution to computers under control of a particular organizational unit (OU) and can be used to distribute the agent. However, the GPO installation does not check for an existing installation of the agent on the target computer and will reinstall the agent on any computers in the OU. In order to avoid potential problems caused by reinstalling the agent ensure that computers with existing agents are NOT members of the OU which contains the Lumension software GPO
70 Lumension Endpoint Management and Security Suite 7.0 SP1 Creating a Network Share Create a network share (with read-only access) from which all users can access and install the agent using the Windows MSI installer. 1. Create the Agent MSI folder on a network computer. 2. Right-click the Agent MSI folder and select Properties. 3. Select the Sharing tab. 4. Select the Share this folder option. If needed, change the Share name. Figure 38: Sharing Tab
71 Automating the Agent Installation 5. Click Permissions. The Permissions for Agent MSI dialog opens. Figure 39: Permissions Dialog 6. Click Add. The Select Users, Computers, or Groups dialog opens. Figure 40: Select Users, Computers, or Groups Dialog
72 Lumension Endpoint Management and Security Suite 7.0 SP1 7. In the Domain Users and Domain Admins groups, select the Domain Users group. If you cannot locate the groups, type the names in the Enter the object names to select field and click Check Names. Figure 41: Group Search Dialog 8. Click OK. The Select Users, Computers, or Groups dialog closes and displays the Permissions for Agent MSI dialog. Figure 42: Permissions for Agent MSI Dialog 9. Select the Everyone group and choose Deny Change and Allow Read access. 10. Select the Domain Admins group, and choose Allow Full Control access. 11. Click OK. The Permissions dialog closes and displays the Properties window. 12. Select the Security tab
73 Automating the Agent Installation 13. Add the Domain Users, Domain Admins, and Everyone groups (refer to steps 6 through 8) applying Allow Read and Deny Execute permissions to the Everyone and Domain Users groups. 14. Add the Allow Full Control to the Domain Admins group. 15. Click OK to close the Agent MSI Properties dialog. 16. Download the agent installer that you want to share on your network. For more information, see Downloading the Installer. 17. Copy the installer that you downloaded to the Agent MSI folder you created. Modifying the PatchAgent.msi File To fully automate the agent installation you must modify the PatchAgent.msi file to include your host name and serial number. Microsoft Orca allows you to make changes to the application so your users will not have to manually enter their name and serial number for their installs. This also allows the application to be installed remotely. The user-customized installer properties are defined in the following table: Table 5: Description of PatchAgent.msi Installation Properties Property Description HOST The URL (or IP) of your Lumension Endpoint Management and Security Suite. SERIAL The serial number of your Lumension Endpoint Management and Security Suite. USEPROXY Whether or not a proxy is used. 0=No, 1=Yes. PROXYURL The URL (or IP) of your proxy. PROXYUSER Login user for an authenticated proxy. PROXYPASS Login password for an authenticated proxy. GROUPLIST Automatically add the agent to the defined group(s). Either the group name or distinguished name can be used. If the group name is used, the agent will be added to all of the groups with that name. Note: Modifying the digitally signed MSI file will invalidate the digital signature assigned by Lumension. Depending upon your security settings, this may introduce security warnings and restrictions during agent installation. To Modify the PatchAgent.msi File Using Microsoft Orca This procedure explains how to modify the MSI file using Microsoft Orca. Prerequisites: You must download Microsoft Orca before you can complete this procedure. Orca is installed from the Microsoft Windows Installer SDK which can be downloaded from library/en-us/msi/setup/orca_exe.asp
74 Lumension Endpoint Management and Security Suite 7.0 SP1 Complete this procedure to modify the MSI file using Microsoft Orca. 1. Install Microsoft Orca (or a similar MSI editor tool) to your management workstation. 2. Select Start > Programs > Orca to open Microsoft Orca. 3. Open the PatchAgent.msi file that you copied to the network share you created. Orca displays the PatchAgent.msi file. Figure 43: Orca Initial Display 4. Scroll through the Tables list and select the Property table. The Rows field populates with the rows associated with the Property table. 5. Locate the Host row, and click the Value field. The Value field is activated and can be edited. 6. Type the Lumension Endpoint Management and Security Suite URL in the format: (or for a secure server) in the Value field. 7. Locate the Serial row, and click the Value field. The Value field is activated and can be edited
75 Automating the Agent Installation 8. Type your Lumension Endpoint Management and Security Suite serial number in the Value field. Figure 44: Enter Serial Number 9. If you are using a Proxy Server, add the necessary proxy entries as follows: a) Right-click in the right window pane and select Add Row. The Add Row dialog box opens. Figure 45: The Add Row dialog box
76 Lumension Endpoint Management and Security Suite 7.0 SP1 b) Enter USEPROXY as the Property Column field. Figure 46: Add Row Property c) Select Value and type 1 to indicate that proxy is enabled. Figure 47: Add Row Value d) Click OK. The USEPROXY row is added to the Property table. e) Add additional rows as needed for the following proxy entries: Table 6: Proxy specific entries Property Value USEPROXY 1 PROXYURL PROXYUSER (optional) Authenticated proxy login user
77 Automating the Agent Installation Property Value PROXYPASS (optional) Authenticated proxy login user s password. 10. To automatically add the agent to an existing group, add the following entry: a) Right-click in the right window pane and select Add Row. The Add Row dialog box opens. b) Enter GROUPLIST as the Property Column field. c) Select Value and enter the Group Names in the format: GroupName1 GroupName2 GroupNameN The GROUPLIST row is added to the Property table. 11. Click Save. Orca saves the changes to the PatchAgent.msi file. 12. Close Microsoft Orca. You can now use the PatchAgent.msi file to manually install the agent by browsing, from the Result: target computer, to the network share you created and manually opening the PatchAgent.msi file. Modifying the LMAgent.msi Installer To fully automate the agent installation you must modify the file to include your server IP address (or fully qualified domain name), group information, and the agent global uninstall password. Microsoft Orca allows you to make changes to the application so your users will not have to manually enter this information for their installs. This also allows the application to be installed remotely. The user-customized installer properties are defined in the following table: Table 7: Description of LMAgent.msi Installation Properties Property Description SERVERIPADDRESS The URL (or IP) of your Lumension Endpoint Management and Security Suite server. You can also use your server's fully qualified domain name as the value for this property. SERVERPORT The HTTP port used by the agent. The default value for this property is 80. SECUREPORT The HTTPS port used by the agent. The default value for this property is 443. STANDDOWNPASSWORD The global uninstall password. This is required if you want to uninstall the agent. PROXYADDRESS The URL (or IP) of your proxy. PROXYPORT The port used by the proxy. PROXYUSERNAME Login user for an authenticated proxy
78 Lumension Endpoint Management and Security Suite 7.0 SP1 Property Description PROXYPASSWORD Login password for an authenticated proxy. GROUPLIST Automatically add the agent to the defined group(s). Either the group name or distinguished name can be used. If the group name is used, the agent will be added to all of the groups with that name. Note: Modifying the digitally signed MSI file will invalidate the digital signature assigned by Lumension. Depending upon your security settings, this may introduce security warnings and restrictions during agent installation. To Modify the LMAgent.msi File Using Microsoft Orca Prerequisites: You must download Microsoft Orca before you can complete this procedure. Orca is installed from the Microsoft Windows Installer SDK which can be downloaded from library/en-us/msi/setup/orca_exe.asp. Complete this procedure to modify the MSI file using Microsoft Orca. 1. Install Microsoft Orca (or a similar MSI editor tool) to your management workstation. 2. Select Start > Programs > Orca to open Microsoft Orca. 3. Open the LMAgent.msi file that you copied to the network share you created. Orca displays the LMAgent.msi file. Figure 48: Orca Initial Display 4. Scroll through the Tables list and select the Property table. The Rows field populates with the rows associated with the Property table
79 Automating the Agent Installation 5. Right-click in the right window pane and select Add Row. The Add Row dialog box opens. Figure 49: The Add Row dialog box 6. Enter SERVERIPADDRESS as the Property Column field. 7. Select Value and type your server IP address or the server's fully qualified domain name. 8. Click OK. The SERVERIPADDRESS row is added to the Property table. 9. To change the default a value for the SERVERPORT property (80) to another value, perform the following steps: a) Double click in the Value column of the SERVERPORT property in the Property table. The Value column for the SERVERPORT property becomes editable. b) Enter the value that you want to use for the SERVERPORT property. c) Press Enter. The value for the SERVERPORT property is changed in the Property table. 10. To change the default value for the SECUREPORT property (443) to another value, perform the following steps: a) Double click in the Value column of the SECUREPORT property in the Property table. The Value column for the SECUREPORT property becomes editable. b) Enter the value that you want to use for the SECUREPORT property. c) Press Enter. The value for the SECUREPORT property is changed in the Property table. 11. Right-click in the right window pane and select Add Row. The Add Row dialog box opens. 12. Enter STANDDOWNPASSWORD as the Property Column field
80 Lumension Endpoint Management and Security Suite 7.0 SP1 13. Select Value and type the global agent uninstall password. 14. Click OK. The STANDDOWNPASSWORD row is added to the Property table. 15. If you are using a Proxy Server, add the necessary proxy entries as follows: a) Right-click in the right window pane and select Add Row. The Add Row dialog box opens. Figure 50: The Add Row dialog box b) Enter PROXYADDRESS as the Property Column field. Figure 51: Add Row Property
81 Automating the Agent Installation c) Select Value and type the URL or IP address of your proxy. Figure 52: Add Row Value d) Click OK. The PROXYADDRESS row is added to the Property table. e) Add additional rows as needed for the following proxy entries: Table 8: Proxy specific entries Property Value PROXYPORT The port used by the proxy. PROXYUSERNAME (optional) Authenticated proxy login user. PROXYPASSWORD (optional) Authenticated proxy login user s password. 16. To automatically add the agent to an existing group, add the following entry: a) Right-click in the right window pane and select Add Row. The Add Row dialog box opens. b) Enter GROUPLIST as the Property Column field. c) Select Value and enter the Group Names in the format: GroupName1 GroupName2 GroupNameN. The GROUPLIST row is added to the Property table. 17. Click Save. Orca saves the changes to the LMAgent.msi file. 18. Close Microsoft Orca. You can now use the LMAgent.msi file to manually install the agent by browsing, from the target Result: computer, to the network share you created and manually opening the LMAgent.msi file
82 Lumension Endpoint Management and Security Suite 7.0 SP1 Creating an Organizational Unit This procedure explains how to create an organizational unit. Complete the following procedure to use organizational units classify and differentiate between installer files. 1. Click Start > Administrative Tools > Active Directory Users and Computers. The Active Directory Users and Computers management console opens. 2. Right-click the domain tree (mydomain.com) and select New > Organizational Unit. Figure 53: Create New OU 3. Assign a name (LumensionMSI) to your Organizational Unit (OU) and click OK. 4. Right-click the new OU and select Properties
83 Automating the Agent Installation 5. In the Group Policy tab, click New and assign a name (Install Windows Agent) to the new Group Policy. Figure 54: OU Group Policy tab 6. Select your new Group Policy and click Edit. The Group Policy Editor opens. 7. Expand the Software Settings sub-branch of the Computer Configuration branch
84 Lumension Endpoint Management and Security Suite 7.0 SP1 8. Right-click Software Installation and select Properties opening the Software Installation Properties window. Figure 55: General tab 9. In the General tab, select the Assign radio button. 10. Select the Uninstall the applications when they fall out of the scope of management check box in the General tab (in the Advanced tab in Windows 2003). 11. Click OK. 12. Right-click Software Installation and select New > Package
85 Automating the Agent Installation 13. Browse to the shared folder you created and select the modified PatchAgent.msi or LMAgent.msi package. Figure 56: Group Policy 14. Close the Group Policy editor and click Close. 15. In the Active Directory Users and Computers management console, select the Computers branch of your domain tree (mydomain.com)
86 Lumension Endpoint Management and Security Suite 7.0 SP1 16. Select the computers to be added to the new OU. Figure 57: Add Computers to the OU 17. Right-click and select Move to add them to the OU. 18. Select your OU (LumensionMSI) from the Move window. 19. Close the Active Directory Users and Computers management console. Performing a Silent Install on Windows In addition to the Lumension Patch and Remediation Server URL (or IP) and Serial Number, you can define a Proxy and Auto-Assign groups when performing a silent install using the Single Agent Windows MSI Installer: 1. Open a command prompt. 2. Define the host/server location and other settings using the following syntax: To perform an install on a Windows 2000 endpoint with a proxy: msiexec /i C:\PatchAgent.msi /qn HOST= SERIAL=" " USEPROXY= 1 PROXYURL= PROXYPORT="xxxx" PROXYUSER= ProxyUser PROXYPASS= ProxyPassword GROUPLIST= GroupName1 GroupName2 GroupNameN
87 Automating the Agent Installation To perform an install on a Windows 2000 endpoint without a proxy: msiexec /i C:\PatchAgent.msi /qn HOST= SERIAL=" " USEPROXY= 0 GROUPLIST= GroupName1 GroupName2 GroupNameN Note: When performing a silent install on a Windows 2000 endpoint, the Patch Agent is installed. To perform an install on a Windows XP or later endpoint with a proxy: msiexec /i C:\LMAgent.msi /qn SERVERIPADDRESS= xxx.xxx.xxx.xxx SERVERPORT= xxxx SECUREPORT="xxxx" PROXYADDRESS= xxx.xxx.xxx PROXYPORT="xxxx" PROXYUSERNAME= ProxyUser PROXYPASSWORD= ProxyPassword GROUPLIST= GroupName1 GroupName2 GroupNameN To perform an install on a Windows XP or later endpoint without a proxy: msiexec /i C:\LMAgent.msi /qn SERVERIPADDRESS= xxx.xxx.xxx.xxx SERVERPORT= xxxx SECUREPORT="xxxx GROUPLIST= GroupName1 GroupName2 GroupNameN Note: When performing a silent install on a Windows XP or later endpoint, the Lumension Agent is installed. Command Line Descriptions for Windows 2000 The following commands can be used to perform a silent installation on endpoints running Windows The user customized installer properties are defined in the following table: Table 9: Description of Installation Properties Property Description HOST The URL (or IP address) of your Lumension Endpoint Management and Security Suite. SERIAL The serial number for your Lumension Endpoint Management and Security Suite. USEPROXY Indicates whether or not a proxy is used. 0=No, 1=Yes. PROXYURL The URL (or IP address) for your proxy. PROXYPORT The port your proxy server is using. PROXYUSER Login user for an authenticated proxy. PROXYPASS Login password for an authenticated proxy. GROUPLIST Automatically add the Agent to the defined group(s). Either the group name or distinguished name can be used. If the group name is used, the agent will be added to all of the groups with that name. Command Line Descriptions for Windows XP or Later The following commands can be used to perform a silent installation on endpoints running Windows XP or later. The user customized installer properties are defined in the following table:
88 Lumension Endpoint Management and Security Suite 7.0 SP1 Table 10: Description of Installation Properties Property Description SERVERIPADDRESS The IP address of your Lumension Endpoint Management and Security Suite. SERVERPORT The HTTP port for your Lumension Endpoint Management and Security Suite. If no value is specified, the default value (80) is used. SECUREPORT The SSL port for your Lumension Endpoint Management and Security Suite. If no value is specified, the default value (443) is used. PROXYADDRESS The IP address for your proxy server. PROXYPORT The port your proxy server is using. PROXYUSERNAME Login user for an authenticated proxy. PROXYPASSWORD Login password for an authenticated proxy. GROUPLIST Automatically add the Agent to the defined group(s). Either the group name or distinguished name can be used. If the group name is used, the agent will be added to all of the groups with that name. Performing a Silent Install on Linux/UNIX/Mac In addition to the Lumension Endpoint Management and Security Suite URL (or IP) and Serial Number, you can define a Proxy and Auto-Assign groups when performing a silent install using the Single Agent Installer for Linux/UNIX/Mac: 1. Open a command prompt. 2. Define the host location, serial number, and other optional settings using the following syntax: To perform a silent install with a proxy:./install -silent -d /user/local -p -sno proxy -port ## -g GroupName1 GroupName2 GroupNameN To perform a silent install without a proxy:./install -silent -d /user/local -p -sno g GroupName1 GroupName2 GroupNameN Command Line Descriptions The user customized installer properties are defined in the following table: Table 11: Command Line Descriptions Command Description -silent Performs installation silently
89 Automating the Agent Installation Command Description -d The install directory. -p The URL (or IP) of your Lumension Endpoint Management and Security Suite. -sno The serial number of your Lumension Endpoint Management and Security Suite. -proxy The URL (or IP) of your proxy. -port The proxy port. -g Automatically add the Agent to the defined group(s). Either the group name or distinguished name can be used. If the group name is used, the agent will be added to all of the groups with that name
90 Lumension Endpoint Management and Security Suite 7.0 SP1-90 -
91 Configuring the Server and Endpoints for Agent Management Jobs After installing Lumension Endpoint Management and Security Suite on a server, you must perform additional configuration on the endpoints that you want to manage so that agent management jobs will complete successfully. Configuring the Scanning System The Lumension Endpoint Management and Security Suite server must be configured in the following manner so that you can run agent management jobs on your managed endpoints. 1. Click Start > Run. 2. Enter regedit in the Open field. 3. Click OK. The registry editor displays. 4. In the registry editor, navigate to HKEY_LOCAL_MACHINE\SYSTEM\Currentcontrolset\Control\Lsa. 5. Verify that the value for the lmcompatibilitylevel registry key is set to 3. Note: Under most network conditions, a setting of 3 is sufficient. However, in some networks, this key may require a different value. To determine which value to use, refer to Configuring Pre-Windows Vista Endpoint for Discovery For pre-windows Vista endpoints behind local firewalls, certain ports must be opened in order for them to be discovered. Pre-Windows Vista endpoints that do not have local firewalls in place will be discovered without performing this procedure. Perform this task from the pre-windows Vista endpoint your are configuring for discovery. 1. Select Start > Control Panel. Control Panel opens
92 Lumension Endpoint Management and Security Suite 7.0 SP1 2. Double-click Windows Firewall. The Windows Firewall dialog opens. Figure 58: Windows Firewall Dialog
93 Configuring the Server and Endpoints for Agent Management Jobs 3. Select the Exceptions tab. Figure 59: Exceptions Tab 4. Ensure the File and Printer Sharing check box is selected. A File and Printer Sharing exception opens the following ports, which are essential for discovery and agent management. 445/TCP 139/TCP 135/UDP 137/UDP 5. Click OK. Result: The endpoint can now be discovered during discovery scan jobs and agent management jobs
94 Lumension Endpoint Management and Security Suite 7.0 SP1 Configuring Endpoints for Agent Management Jobs (Pre-Windows Vista) In order to successfully perform network-based assessments, you must complete the following configuration procedure on your managed endpoints after you install the Lumension Agent. Configure your networked devices running pre-windows Vista operating systems (Windows 2003, Windows XP, and so on) according the following procedure. 1. Select Start > Run. 2. Enter cmd in the Open field. 3. Click OK. The command prompt displays. 4. Type net share and press ENTER. 5. Verify that C$ and ADMIN$ are enabled and appear in the Share name column. If they are not, type the following commands to enable these shares. NET SHARE C$=C NET SHARE ADMIN$ These commands enable the shares until the system reboots. 6. Select Start > Control Panel. Control Panel opens
95 Configuring the Server and Endpoints for Agent Management Jobs 7. Double-click Administrative Tools. The Administrative Tools dialog opens. Figure 60: Administrative Tools Dialog 8. Double-click Services. The Services dialog opens. Figure 61: Services Dialog
96 Lumension Endpoint Management and Security Suite 7.0 SP1 9. Verify that the following services are running: DCOM Server Process Launcher Remote Procedure Call (RPC) Remote Registry Server Windows Firewall/Internet Connection Sharing Windows Management Instrumentation If any of these services is not running, start it by completing the following substeps. a) b) c) d) e) Double-click the applicable service. Ensure the General tab is selected. From the Startup type list, select Automatic. Click Start. Click OK. 10. Select Start > Run. 11. Enter gpedit.msc in the Open field. 12. Click OK. The Group Policy dialog opens. Figure 62: Services Dialog 13. Expand the directory tree structure to Computer Configuration > Administrative Templates > Network > Network Connections > Windows Firewall > Domain Profile/Standard Profiles. The standard profile is enforced for workgroup members, and the domain profile is enforced for domain members. Edit both lists for consistency
97 Configuring the Server and Endpoints for Agent Management Jobs 14. Edit the following settings according to the following table. Value Setting Enable Windows Firewall: Allow file and printer sharing exception Windows Firewall: Allow remote administration exception Disable Windows Firewall: Do not allow exceptions To edit these settings, perform the following substeps. a) b) c) d) Right-click the applicable setting. Select Properties. Select the applicable option (Enable or Disable). If desired, define an IP range in the Allow unsolicited incoming messages from field. Note: This substep is only applicable to the Windows Firewall: Allow file and printer sharing exception and Windows Firewall: Allow remote administration exception settings. To define a range, you may use the following syntax: * (any IP address), /24 (specific Class C subnet), and localsubnet (for local subnetwork access only). This input is not validated. By default, you should leave the box blank to allow any IP address. e) Click OK. 15. Select Start > Run. 16. Enter regedit in the Open field. 17. Click OK. The Registry Editor opens. Figure 63: Services Dialog 18. From the directory tree structure, expand to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet \Control\Lsa
98 Lumension Endpoint Management and Security Suite 7.0 SP1 19. Verify that the value for the lmcompatibilitylevel registry key is set to 3 or 5. If the key is not set to one of the following values, complete the following substeps. Note: Under most network conditions, a setting of 3 or 5 is sufficient. However, in some networks, this key may require a different value. To determine which value to use, refer to kb/ a) Double-click lmcompatibilitylevel. The Edit DWORD Value dialog opens. b) In the Value data field, type 3 or 5 (unless another value is required). c) Click OK. 20. Select Start > Run. 21. Enter cmd in the Open field. 22. Click OK. A command prompt displays. 23. Type gpupdate /force and press ENTER. 24. Select Start > Control Panel. Control Panel opens. 25. Double-click Network Connections. The Network Connections dialog opens. 26. Right-click your local area connection
99 Configuring the Server and Endpoints for Agent Management Jobs 27. Select Properties. The Local Area Connection Properties dialog opens. Figure 64: Local Area Connection Properties Dialog 28. Ensure the File and Printer Sharing for Microsoft Networks check box is selected. 29. Click OK. Configuring Post-Windows Vista Endpoints for Discovery For Lumension Patch and Remediation to discover Windows Vista, Windows Server 2008, and Windows 7 endpoints during discovery scan jobs and agent management jobs, they must have both network discovery and file sharing enabled. Target endpoints without these features enabled will not be discovered. Perform these steps on the applicable post-windows Vista endpoint. 1. Select Start > Control Panel. Control Panel opens
100 Lumension Endpoint Management and Security Suite 7.0 SP1 2. Open Network and Sharing Center. The Network and Sharing Center opens. Figure 65: Network and Sharing Center 3. Ensure Network discovery is enabled. 4. Select Start > Control Panel. Control Panel opens. 5. Double-click Windows Firewall. The Windows Firewall dialog opens
101 Configuring the Server and Endpoints for Agent Management Jobs 6. Click the Change Settings link. The Windows Firewall Settings dialog opens. Figure 66: Windows Firewall Settings Dialog
102 Lumension Endpoint Management and Security Suite 7.0 SP1 7. Select the Exceptions tab. Figure 67: Exceptions Tab 8. Ensure the File and Printer Sharing check box is selected. A File and Printer Sharing exception opens the following ports, which are essential for discovery and agent management. 445/TCP 139/TCP 135/UDP 137/UDP 9. Click OK. Result: Network discovery and File sharing are enabled, and the ports are opened. The endpoint can now be discovered during discovery scan jobs and agent management jobs
103 Configuring the Server and Endpoints for Agent Management Jobs Configuring Endpoints for Agent Management Jobs (Post-Windows Vista) In order to successfully perform network-based assessments, you must complete the following configuration procedure on your managed endpoints before you install the agent. Prerequisites: Complete Configuring Post-Windows Vista Endpoints for Discovery on page 99. Configure your networked endpoints running Windows Vista, Windows Server 2008, or Windows 7 according the following procedure. Note: While executing some of the following steps, a User Account Control dialog may appear, to verify permission to continue with the requested action. Click Continue and proceed to the next step. 1. Select Start > Run. 2. Enter cmd in the Open field. 3. Click OK. The command prompt displays. 4. Type net share and press ENTER. 5. Verify that C$ and ADMIN$ are enabled and appear in the Share name column. If they are not, type the following commands to enable these shares. NET SHARE C$=C NET SHARE ADMIN$ These commands enable the shares until the system reboots. 6. Select Start > Control Panel. Control Panel opens
104 Lumension Endpoint Management and Security Suite 7.0 SP1 7. Double-click Administrative Tools. The Administrative Tools dialog opens. Figure 68: Administrative Tools Dialog 8. Double-click Services. The Services dialog opens. Figure 69: Services Dialog
105 Configuring the Server and Endpoints for Agent Management Jobs 9. Verify that the following services are running: DCOM Server Process Launcher Remote Procedure Call (RPC) Remote Registry Server Windows Firewall/Internet Connection Sharing Windows Management Instrumentation If any of these services is not running, start it by completing the following substeps. a) b) c) d) e) Double-click the applicable service. Ensure the General tab is selected. From the Startup type list, select Automatic. Click Start. Click OK. 10. Select Start > Run. 11. Enter gpedit.msc in the Open field. 12. Click OK. The Group Policy Object Editor opens. Figure 70: Group Policy Object Editor 13. Expand the directory tree structure to Computer Configuration > Administrative Templates > Network > Network Connections > Windows Firewall > Domain Profile/Standard Profiles. The standard profile is enforced for workgroup members, and the domain profile is enforced for domain members. Edit both lists for consistency
106 Lumension Endpoint Management and Security Suite 7.0 SP1 14. Edit the following settings according to the following table. Value Setting Enable Windows Firewall: Allow file and printer sharing exception Windows Firewall: Allow remote administration exception Windows Firewall: Allow ICMP exceptions Disable Windows Firewall: Do not allow exceptions To edit these settings, perform the following substeps. a) Right-click the applicable setting. b) Select Properties. c) Select the applicable option (Enable or Disable). Note: After enabling the Windows Firewall: Allow ICMP exceptions setting, select the Allow inbound echo request check box. Ensure all other check boxes are clear. d) If desired, define an IP range in the Allow unsolicited incoming messages from field. Note: This substep is only applicable to the Windows Firewall: Allow file and printer sharing exception and Windows Firewall: Allow remote administration exception settings. To define a range, you may use the following syntax: * (any IP address), /24 (specific Class C subnet), and localsubnet (for local subnetwork access only). This input is not validated. By default, you should leave the box blank to allow any IP address. e) Click OK. 15. Select Start > Run. 16. Enter regedit in the Open field. 17. Click OK. The Registry Editor displays. 18. From the directory tree structure, expand to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet \Control\Lsa. 19. Verify that the value for the lmcompatibilitylevel registry key is set to 3 or 5. If the key is not set to one of the following values, complete the following substeps. Note: Under most network conditions, a setting of 3 or 5 is sufficient. However, in some networks, this key may require a different value. To determine which value to use, refer to kb/ a) Double-click lmcompatibilitylevel. The Edit DWORD Value dialog opens
107 Configuring the Server and Endpoints for Agent Management Jobs b) In the Value data field, type 3 or 5 (unless another value is required). c) Click OK. 20. Select Start > Run. 21. Enter cmd in the Open field. 22. Click OK. A command prompt displays. 23. Type gpupdate /force and press ENTER. Resolving Endpoint UAC Issues On endpoints running Windows Vista or later operating systems, UAC security features are set to highly restrictive levels by default. These settings must be configured properly to ensure agent management job success. When a post-windows Vista endpoint is in this default UAC configuration, agent management jobs fail with an access denied error. Use one of two methods to resolve this issue: Add a domain account Adding a domain account to the applicable endpoint's local administrator's group will typically resolve the issue. To use this method, add the endpoint to a domain (provided it isn't already added), and then add a domain user to the endpoint's local administrator group. Running an agent management job configured to use this domain account's credentials will allow the job to complete successfully. Note: The domain account added to the local administrator's group must be an individual domain account; you cannot add a domain group. Set a Registry Value If the user of a local administrative account is desired or required, you can set a registry value to resolve this issue. Create a DWORD registry value named LocalAccountTokenFilterPolicy in the HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies \System\ registry hive. Set its value to 1. No reboot is required. This method allows a local administrative account to successfully run agent management jobs. Note: For additional information about this method, refer to support.microsoft.com/kb/ Troubleshooting Agent Management Jobs If agent managements are not completing successfully, additional configuration may be required. If the Lumension Endpoint Management and Security Suite server or an applicable network endpoint has lost its trust relationship with the domain, agent management jobs will fail with an error of access denied
108 Lumension Endpoint Management and Security Suite 7.0 SP1 To verify if this issue is causing agent management job failure, ensure that the Lumension EMSS server can connect to the applicable endpoints C$, and that the applicable endpoints can connect to the server's C$. To verify these connections, type the following command from the applicable endpoint or server prompt: \ \EndpointIPAddress\C$. If the following system output results from the command, your endpoint or server has lost its trust relationship with the domain: The trust relationship between this workstation and the primary domain failed. To resolve this issue, remove the applicable server or endpoint from the domain, and then add it back. This process forces the domain to refresh the endpoint password. The endpoint password prompts users for resetting at scheduled intervals according to its security settings. To disable password changes, complete Disabling Password Changes on page 108. Disabling Password Changes Do disable password changes, create a registry key for the applicable endpoint. Perform this task from the applicable endpoint. 1. Select Start > Run. The Run dialog opens. 2. Type regedit in the Open field. 3. Click OK. The Registry Editor opens. 4. Expand the directory tree structure to My Computer\HKEY_LOCAL_MACHINE\SYSTEM \CurrentControlSet\Services\Netlogon\Parameters. 5. Right-click DisablePasswordChange. 6. Select Modify. The Edit DWORD Value dialog opens. 7. In the Value data field, type Click OK. Result: The key value is updated. User profile passwords can no longer be edited on the applicable endpoint
Agent Install Guide. New Boundary Prism Patch Manager 7.0 SP1
Agent Install Guide -2- Notices Version Information New Boundary Prism Patch Manager Agent Install Guide - New Boundary Prism Patch Manager Version 7.0 SP1 Released: April 2010 Document Number: 02_017_7.0
Agent Installation Guide. PatchLink Update v6.3
Agent Installation Guide PatchLink Update v6.3 02_017_6.3n PatchLink Corporation 8515 East Anderson Drive Scottsdale, AZ 85255 Phone: 480.970.1025 Fax: 480.970.6323 www.patchlink.com Copyright 1997-2006
Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1
Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite
Release Notes ZENworks Patch Management 6.4 SP2
Release Notes ZENworks Patch Management 6.4 SP2 02_014N 6.4SP2 Release Notes - 2 - Notices Version Information ZENworks Patch Management Release Notes - ZENworks Patch Management Version 6.4SP2 - Released:
Agent Install Guide. Lumension Endpoint Management and Security Suite 7.3
Agent Install Guide Lumension Endpoint Management and Security Suite 7.3 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite
Agent Install Guide. Lumension Endpoint Management and Security Suite 8.0
Agent Install Guide Lumension Endpoint Management and Security Suite 8.0 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite
Server Installation Guide ZENworks Patch Management 6.4 SP2
Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch
User Guide. Lumension Application Scanner Tool 2.3.2. December 2013. Copyright 2011-2013, Lumension
User Guide Lumension Application Scanner Tool 2.3.2 December 2013 Copyright 2011-2013, Lumension Notices VERSION INFORMATION Lumension Application Scanner Tool 2.3.2 User Guide Released: December 2013
Release Notes. ZENworks Patch Management Server v6.4
Release Notes ZENworks Patch Management Server v6.4 02_014N_6.4.2.19 Novell, Inc. 1800 South Novell Place Provo, UT 84606 Phone: 800.858.4000 www.novell.com Copyright 1997-2007 PatchLink Corporation. ALL
User Guide. Lumension Endpoint Management and Security Suite Patch and Remediation 8.0
User Guide Lumension Endpoint Management and Security Suite Patch and Remediation 8.0 Lumension Endpoint Management and Security Suite: Patch and Remediation - 2 - Notices Version Information Lumension
HEAT Endpoint Management and Security Suite 8.4. Server Install Guide
8.4 Server Install Guide - 2 - Notices Version Information Server Install Guide; - HEAT Endpoint Management and Security Suite Version 8.4 - Published: May 2016 Document Number: 02_202_8.4_161251152 Copyright
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
Freshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
TANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
Verax Service Desk Installation Guide for UNIX and Windows
Verax Service Desk Installation Guide for UNIX and Windows March 2015 Version 1.8.7 and higher Verax Service Desk Installation Guide 2 Contact Information: E-mail: [email protected] Internet: http://www.veraxsystems.com/
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide
Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government
BMC FootPrints Asset Core - Asset Discovery. Version 11.7
BMC FootPrints Asset Core - Asset Discovery Version 11.7 Legal Notices Copyright 1999, 2009 BMC Software, Inc. Copyright 1994-2013 Numara Software, Inc. BMC, BMC Software, and the BMC Software logo are
Backup Exec 15. Quick Installation Guide
Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark
AVG 8.5 Anti-Virus Network Edition
AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective
LifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
Reporting for Contact Center Setup and Operations Guide. BCM Contact Center
Reporting for Contact Center Setup and Operations Guide BCM Contact Center Document Number: NN40040-302 Document Status: Standard Document Version: 04.00 Part Code: N0060637 Date: June 2006 Copyright 2005
Enterprise Vault Installing and Configuring
Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise
Upgrading to Document Manager 2.7
Upgrading to Document Manager 2.7 22 July 2013 Trademarks Document Manager and Document Manager Administration are trademarks of Document Logistix Ltd. TokOpen, TokAdmin, TokImport and TokExRef are registered
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
Installing Management Applications on VNX for File
EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
Getting Started with ESXi Embedded
ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
Administration Quick Start
www.novell.com/documentation Administration Quick Start ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
Novell ZENworks Asset Management 7.5
Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 INSTALLATION GUIDE Table Of Contents 1. Installation Overview... 1 If you are upgrading... 1 Installation Choices... 1 ZENworks
Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010
Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install
SMART Vantage. Installation guide
SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
Software Version 5.1 November, 2014. Xerox Device Agent User Guide
Software Version 5.1 November, 2014 Xerox Device Agent User Guide 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United States and/or
Installation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
Installation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
Management Center. Installation and Upgrade Guide. Version 8 FR4
Management Center Installation and Upgrade Guide Version 8 FR4 APPSENSE MANAGEMENT CENTER INSTALLATION AND UPGRADE GUIDE ii AppSense Limited, 2012 All rights reserved. part of this document may be produced
QuarkCopyDesk 9.1 ReadMe
QuarkCopyDesk 9.1 ReadMe CONTENTS Contents QuarkCopyDesk 9.1 ReadMe...4 System requirements...5 System requirements: Mac OS...5 System requirements: Windows...5 Installing: Mac OS...7 Performing a silent
MGC WebCommander Web Server Manager
MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
GFI Product Manual. Version 6.0. Getting Started Guide
GFI Product Manual Version 6.0 Getting Started Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either
CimTrak Integrity & Compliance Suite 2.0.6.19
CimTrak Integrity & Compliance Suite 2.0.6.19 Master Repository Management Console App Server File System Agent Network Device Agent Command Line Utility Ping Utility Proxy Utility FTP Repository Interface
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
Remote Control 5.1.2. Tivoli Endpoint Manager - TRC User's Guide
Tivoli Remote Control 5.1.2 Tivoli Endpoint Manager - TRC User's Guide Tivoli Remote Control 5.1.2 Tivoli Endpoint Manager - TRC User's Guide Note Before using this information and the product it supports,
HP Business Availability Center
HP Business Availability Center for the Windows and Solaris operating systems Software Version: 8.05 Business Process Monitor Administration Document Release Date:September 2010 Software Release Date:
Software Version 5.2 June 2015. Xerox Device Agent User Guide
Software Version 5.2 June 2015 Xerox Device Agent User Guide 2015 Xerox Corporation. All rights reserved. Xerox, Xerox and Design and Phaser are trademarks of Xerox Corporation in the United States and/or
Legal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
Remote Filtering Software
Remote Filtering Software Websense Web Security Solutions v7.7-7.8 1996 2013, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2013 The products and/or
WhatsUp Gold v16.2 Installation and Configuration Guide
WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
PartnerConnect software. Installation guide
PartnerConnect software Installation guide 2012 Welch Allyn. All rights are reserved. To support the intended use of the product described in this publication, the purchaser of the product is permitted
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that
Getting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
HP ProLiant Essentials Vulnerability and Patch Management Pack Release Notes
HP ProLiant Essentials Vulnerability and Patch Management Pack Release Notes Supported platforms... 2 What s new in version 2.1... 2 What s new in version 2.0.3... 2 What s new in version 2.0.2... 2 What
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
2X Cloud Portal v10.5
2X Cloud Portal v10.5 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
Quick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
Pre-Installation Checks Installation Creating Users and Quick Setup Usage Examples and Settings Appendix
Standard Setup Guide 1 2 3 4 5 Pre-Installation Checks Installation Creating Users and Quick Setup Usage Examples and Settings Appendix Read this manual carefully before you use this product and keep it
XenClient Enterprise Synchronizer Installation Guide
XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V
SMART Meeting Pro System Administrator s Guide
PLEASE THINK BEFORE YOU PRINT SMART Meeting Pro System Administrator s Guide Windows Operating Systems Product Registration If you register your SMART product, we ll notify you of new features and software
QuarkXPress 8.01 ReadMe
QuarkXPress 8.01 ReadMe CONTENTS Contents QuarkXPress 8.01 ReadMe...4 System requirements...5 Mac OS...5 Windows...5 Installing: Mac OS...6 Performing a silent installation...6 Preparing for silent installation...6
Sharpdesk V3.5. Push Installation Guide for system administrator Version 3.5.01
Sharpdesk V3.5 Push Installation Guide for system administrator Version 3.5.01 Copyright 2000-2015 by SHARP CORPORATION. All rights reserved. Reproduction, adaptation or translation without prior written
DocuShare Installation Guide
DocuShare Installation Guide Publication date: February 2011 This document supports DocuShare Release 6.6.1 Prepared by: Xerox Corporation DocuShare Business Unit 3400 Hillview Avenue Palo Alto, California
Reflection DBR USER GUIDE. Reflection DBR User Guide. 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.
Reflection DBR USER GUIDE 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.net Page 1 of 1 Table of Contents Overview 3 Reflection DBR Client and Console Installation 4
NTP Software File Auditor for Windows Edition
NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor
Quick Start Guide for Parallels Virtuozzo
PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current
Xcalibur Global Version 1.2 Installation Guide Document Version 3.0
Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 December 2010 COPYRIGHT NOTICE TRADEMARKS 2010 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd., Chip PC GmbH All rights reserved.
026-1010 Rev 7 06-OCT-2011. Site Manager Installation Guide
026-1010 Rev 7 06-OCT-2011 Site Manager Installation Guide Retail Solutions 3240 Town Point Drive NW, Suite 100 Kennesaw, GA 30144, USA Phone: 770-425-2724 Fax: 770-425-9319 Table of Contents 1 SERVER
Administration guide. Océ LF Systems. Connectivity information for Scan-to-File
Administration guide Océ LF Systems Connectivity information for Scan-to-File Copyright 2014, Océ All rights reserved. No part of this work may be reproduced, copied, adapted, or transmitted in any form
CentreWare for Microsoft Operations Manager. User Guide
CentreWare for Microsoft Operations Manager User Guide Copyright 2006 by Xerox Corporation. All rights reserved. Copyright protection claimed includes all forms and matters of copyright material and information
CA Nimsoft Monitor Snap
CA Nimsoft Monitor Snap Quick Start Guide 7.0 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject to being changed,
Network Connect Installation and Usage Guide
Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing
Education Software Installer 2014
Education Software Installer 2014 SYSTEM ADMINISTRATOR S GUIDE FOR MAC OS X OPERATING SYSTEM SOFTWARE Product registration If you register your SMART product, we ll notify you of new features and software
DameWare Server. Administrator Guide
DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx
Heroix Longitude Quick Start Guide V7.1
Heroix Longitude Quick Start Guide V7.1 Copyright 2011 Heroix 165 Bay State Drive Braintree, MA 02184 Tel: 800-229-6500 / 781-848-1701 Fax: 781-843-3472 Email: [email protected] Notice Heroix provides
HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2
HYPERION SYSTEM 9 MASTER DATA MANAGEMENT RELEASE 9.2 N-TIER INSTALLATION GUIDE P/N: DM90192000 Copyright 2005-2006 Hyperion Solutions Corporation. All rights reserved. Hyperion, the Hyperion logo, and
Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.
Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information
Installing and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Online Backup Client User Manual
Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have
Spector 360 Deployment Guide. Version 7
Spector 360 Deployment Guide Version 7 December 11, 2009 Table of Contents Deployment Guide...1 Spector 360 DeploymentGuide... 1 Installing Spector 360... 3 Installing Spector 360 Servers (Details)...
About Recovery Manager for Active
Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System
Software Version 1.0 ConnectKey TM Share to Cloud April 2013. Xerox ConnectKey Share to Cloud User / Administrator s Guide
Software Version 1.0 ConnectKey TM Share to Cloud April 2013 Xerox ConnectKey Share to Cloud User / Administrator s Guide 2013 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and Xerox
Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.
Important Please read this User s Manual carefully to familiarize yourself with safe and effective usage. About This Manual This manual describes how to install and configure RadiNET Pro Gateway and RadiCS
Scholastic Reading Inventory Installation Guide
Scholastic Reading Inventory Installation Guide For use with Scholastic Reading Inventory version 2.0.1 or later and SAM version 2.0.2 or later Copyright 2011 by Scholastic Inc. All rights reserved. Published
2X SecureRemoteDesktop. Version 1.1
2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious
ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide
ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide Notice Altiris Software Delivery Solution for Windows 6.1 SP3 Product Guide 2007 Altiris, Inc. All rights reserved. Document Date: February
Installation Instructions Release Version 15.0 January 30 th, 2011
Release Version 15.0 January 30 th, 2011 ARGUS Software: ARGUS Valuation - DCF The contents of this document are considered proprietary by ARGUS Software, the information enclosed and any portion thereof
Embarcadero Performance Center 2.7 Installation Guide
Embarcadero Performance Center 2.7 Installation Guide Copyright 1994-2009 Embarcadero Technologies, Inc. Embarcadero Technologies, Inc. 100 California Street, 12th Floor San Francisco, CA 94111 U.S.A.
Reconfiguring VMware vsphere Update Manager
Reconfiguring VMware vsphere Update Manager vsphere Update Manager 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
Telelogic DASHBOARD Installation Guide Release 3.6
Telelogic DASHBOARD Installation Guide Release 3.6 1 This edition applies to 3.6.0, Telelogic Dashboard and to all subsequent releases and modifications until otherwise indicated in new editions. Copyright
INSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES
INSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES TECHNICAL ARTICLE November 2012. Legal Notice The information in this publication is furnished for information use only, and does not
Nexio Connectus with Nexio G-Scribe
Nexio Connectus with Nexio G-Scribe 2.1.2 3/20/2014 Edition: A 2.1.2 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and
Interworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
NETWRIX ACCOUNT LOCKOUT EXAMINER
NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a
Installation Guide Supplement
Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,
WhatsUp Gold v16.1 Installation and Configuration Guide
WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All
