This section provides a summary of the different Security Agent installation methods to perform a fresh installation of the Security Agent. All installation methods require local administrator rights on the target computers.
If you are installing agents and want to enable IPv6 support, read the guidelines in Security Agent Installation and IPv6 Support.
Installation Method/ Operating System Support |
Deployment Considerations |
|||||
---|---|---|---|---|---|---|
WAN Deployment |
Centrally Managed |
Requires User Intervention |
Requires IT Resource |
Mass deployment |
Bandwidth Consumed | |
Web install page Not supported on Windows Server Core platforms |
No |
No |
Yes |
No |
No |
High |
Email Link installation Not supported on Windows Server Core platforms |
No |
No |
Yes |
Yes |
No |
High, if installations start at the same time |
UNC-based installations Supported on all operating systems |
No |
No |
Yes |
Yes |
No |
High, if installations start at the same time |
Remote installations Supported on all operating systems except:
|
No |
Yes |
No |
Yes |
No |
High |
Login Script Setup Supported on all operating systems |
No |
No |
Yes |
Yes |
No |
High, if installations start at the same time |
Agent Packager Supported on all operating systems |
No |
No |
Yes |
Yes |
No |
Low, if scheduled |
Agent Packager (MSI package deployed through Microsoft SMS) Supported on all operating systems |
Yes |
Yes |
Yes/No |
Yes |
Yes |
Low, if scheduled |
Agent Packager (MSI package deployed through Active Directory) Supported on all operating systems |
Yes |
Yes |
Yes/No |
Yes |
Yes |
High, if installations start at the same time |
Agent disk image Supported on all operating systems |
No |
No |
No |
Yes |
No |
Low |
Trend Micro Vulnerability Scanner (TMVS) Supported on all operating systems except:
|
No |
Yes |
No |
Yes |
No |
High |
Security Compliance installations Supported on all operating systems except:
|
No |
Yes |
No |
Yes |
No |
High |