Install Security Agents on computers within the network domains or install the Security Agent to a target endpoint by using its IP address.
Before installing the Security Agent, take note of the following:
- Record the logon credentials for each endpoint. Apex One will prompt you to specify the logon credentials during installation.
- The Security Agent
will not be installed on the endpoint if:
The Apex One server is installed on the endpoint.
The endpoint runs Windows 7™ Starter, Windows 7 Home Basic, Windows 7 Home Premium, Windows 8.1 (basic versions), and Windows 10 Home. If you have endpoints running these platforms, choose another installation method. See Deployment Considerations for details.
-
If the target endpoint runs Windows 7 (Professional, Enterprise, or Ultimate
Edition), Windows 8.1 (Pro, Enterprise), Windows 10 (Pro, Education,
Enterprise), Windows Server 2012 (Standard), Windows Server 2016 (all editions),
or Windows Server 2019 (all editions) perform the following steps on the
endpoint:
- Enable a built-in administrator account and set the password for the account.
- Disable the Windows firewall.
- Click Start > Programs > Administrative Tools > Windows Firewall with Advanced Security.
- For Domain Profile, Private Profile, and Public Profile, set the firewall state to "Off".
- Open Microsoft Management Console (click Start > Run and type services.msc) and start the Remote Registry service. When installing the Security Agent, use the built-in administrator account and password.
- If there are Trend Micro or third-party endpoint
security programs installed on the endpoint, check
if Apex One can automatically
uninstall the software and replace it with the Security Agent. For a list of
agent security software that Apex One automatically uninstalls,
open the following files in <Server installation
folder>\PCCSRV\Admin.
You can open these files using a text editor such
as Notepad.
tmuninst.ptn
tmuninst_as.ptn
If the software on the target endpoint is not included in the list, manually uninstall it first. Depending on the uninstallation process of the software, the endpoint may or may not need to restart after uninstallation.