The Symantec ManagementAgent Installation page, located under the Settings > Agents/Plugins > Symantec ManagementAgent > Configuration tree node, is where users can enable installation of the Altiris Agent on a computer.
The site is designed to be extensible and other agents, e.g. Linux/Unix/Mac to add tabs to the page. This model provides a single page for all types of agent installations.
The InstallAgent tab can be divided into 3 main areas:
- 1. Deployment of agents in teams
- 2. Download page URL
- 3. Scheduled Push to Computer
Also, a Security section has been added to describe what security permissions are required to activate an Altiris Agent installation.
Altiris Agent is installed on computers
This section allows users to remotely install the SymantecManagementAgent on one or more computers. To send the agent to a computer, the computer must first be added to the grid. Users can then select one or more computers in the grid and click the "Install" button to start the automatic installation.
Note that adding computers to the grid does not mean adding them as an NS compute resource.
Selection of the equipment to be pushed
There are three ways users can add computers to the embed grid:
- Quickly add computer name (via text field)
- By team name
- Supported format:
- FQDN (z. B. name.domain.com)
- Name @domain
- [email protected]
- Name.Domain
- Name
- Invalid characters:
- Space (" ")
- Greater than (">")
- Less than ("<")
- Come (",")
- Extended ASCII characters are supported.
- The maximum length of the team name is 15 characters. This is a limitation of the NetBIOS protocol.
- Supported format:
Things to note also:
Windows does not allow characters: apostrophe (‘), (~), exclamation point (!), at sign (@), hash (#), dollar sign ($), (^), ampersand (&), asterisk ( * ), parentheses (()), equals (=), plus (+), parentheses ([]), parentheses ({}), forward slash (), (|), semicolon ((wink) , colon ( ( smile) , quotation marks ('), double quotation marks ("), backslash (/), and question mark (?).
Netbios does not allow characters: space (), slash (), backslash (/), colon ((smile), asterisk (*), question mark (?), double quote ("), semicolon ( ( wink), ( |) and Name with more than 15 characters.
Consider removing support for the name@domain format as it is not a commonly used format.
- By IP address
- Supported format:
- IPv4
- *Decimal only (we may not be able to support this by changing the IP address validation logic in the Altiris.NS.Utilities.ClientPushMgr.PushAgentToComputers() method to use IpAddress.TryParse() instead.
- IPv6
- *Decimals only
- * Does not work with computers without an IPv4 address. Internally, the push continues to be via the IPv4 address.
- The IP address is displayed in the "Name" column. This changes to the computer names when the agent push is triggered.
- By computer resource GUID
- Supported format:
- Import CSV files (using the Import devices from a selected file toolbar button)
- Supported format:
- Same as "Add Team Name Quickly" above.
- The failed import is logged but not shown in the UI.
- Select Computer dialog box
- By clicking the button:
- If no computers are found in the NS database, the user is redirected to the Discover Computers page.
- If devices are found, the device selection dialog is displayed.
- When you select one or more computers from the selector, the selected rows should be transferred to the insertion grid.
- If you cancel the selector, no more entries are added to the insertion grid
sliding grate
The embedding grid remembers all previously added computers unless specifically removed by the user. This data is stored in the NS database table AgentPushData.
As the selected computers are added to the insertion grid, the Name and Domain columns are filled in appropriately, based on the format you entered. The remaining columns are empty because the machines have not yet been discovered.
The following are the expected results in the grid when adding an input based on the input format:
Computernamensformat | Grid name column | Grid domain column |
FQDN (nombre.dominio.com) | Name | Domain |
Name @domain | Name @domain | |
[email protected] | Name @domain | com |
Name.Domain | Name | Domain |
Name | Name |
If a previously managed computer is added to the grid, only the "Name" and "Domain" columns need to be filled out.
The delete buttons in the toolbar are available to delete entries from the insertion grid. They are:
- "Remove All" - Simply hides the entries so they don't appear in the embed grid.
- "Delete" - Deletes the entry from the grid and the "AgentPushData" database table.
A Refresh button is located to the right of the grid toolbar. This button provides the ability to refresh the data in the grid. Because the agent push task is an asynchronous, long-running process, the user needs to refresh the grid regularly if they want to see the progress of the push in detail. Alternatively, you can browse the reports using the View Installation Status Report button below the grid.
The embedding grid also supports context menus. Right-clicking on an entry in the insertion grid opens the context menu depending on whether the machine was recognized or not.
If the machine has already been detected or pushed, you will see this context menu item:
- Delete Selected Teams - Equivalent to the Delete button.
If the machine was discovered or pushed, you will see these context menu items:
- Resource Manager - Opens the Resource Manager for the selected computer.
- Delete selected teams
Install from the Altiris Agent
Users can push install the agent to one or more computers by selecting them in the push grid and then clicking the Install Altiris Agent button. Multiple selection can be done with Ctrl+click or Shift+click.
When you click the Install Altiris Agent button, the Options dialog appears with the following options:
- View the Altiris Agent icon in the Start menu
- Specifies whether the Altiris Agent adds an entry to the Windows Start menu.
- View the Altiris Agent icon in the system tray
- Specifies whether the Altiris Agent adds an entry to the Windows notification area.
- These settings are overridden when the Altiris Agent first receives the configuration from the client (approximately 10 minutes after installation). The setting that overrides this is on the target agent's Settings page > Interaction tab, Show client tray icon option, which is on by default.
- US-Proxy
- Specifies whether the proxy settings found in the target computer's Internet Options will be used for communication between the NS and the target computer both during and after installation. If the attempt to connect through the proxy fails, a direct connection is attempted instead.
- Overwrite default installation patch
- Indicates whether the agent will be installed to an alternate location.
- Specify a different notification server
- Indicates whether the target computer will register with a different notification server after installation.
- Http and https compatible.
- Download the agent package from the nearest package server
- Specifies whether the target computer downloads the agent package from the closest package server instead of the current NS.
- Add the Altiris Agent to the Add/Remove Programs list
- Specifies whether the agent adds an entry to the Windows Add/Remove Programs list.
- Use the following administrator account instead of the application credentials
- Indicates whether different credentials are used to communicate and install the agent on the target computer.
- For the machine in a workgroup, specify the username in the format machinename\username.
- The credentials provided here are only used for the installation and initial communication between the agent and the NS before the initial configuration is received from the client. After that, the Agent Connectivity Credential (ACC) specified in the NS on the Agent Global Settings page > Authentication tab will be used.
- These credentials are transmitted for both push and pull. This is done using command line arguments (-accUserName and -accUserPassword).
- additional parameters
- Allows adding additional command line parameters during agent installation. These parameters are specified by a hyphen ("-") or forward slash ("/") and separated by a space (e.g. -diagnostic/log).
Installation
For the agent to install successfully, the following conditions must be met:
- The current NS (and alternate NS, if specified) must have a direct connection to the target computer.
- The target computer can be in the same or different domain as the NS.
- The target computer must be gbe 'pingable hostname'. See ETrack #1585494.
- The credentials used, either the application credentials or the specified administrator credentials, must be in the Windows Administrators group on the target computer.
- The credentials used, either the application credentials or the provided administrator credentials, must be valid in the domain (or domains for cross-domain push).
- The target computer is an x86 or x64-based computer.
- The operating system (OS) of the target computer must be supported by the Altiris Agent.
- The target computer's firewall is turned off or properly configured for NS Agent push installation communication. From Altiris KB Article #31920, the ports used for remote installation are:
- Ports for file and print services:
- TCP139
- TCP445
- UDP137
- UDP138
- Ports for file and print services:
- Enabling ports TCP 139 and TCP 445 is usually sufficient to allow remote installation.
If the installation fails, the push grid should display and update the push status according to the following failed scenarios:
- If the target computer does not exist:
- "Network path not found" is displayed in the status column.
- If the NS does not have a direct connection to the target computer:
- "Network path not found" is displayed in the status column.
- If the target computer's firewall is enabled and not properly configured for Agent Push:
- "Network path not found" is displayed in the status column.
- If the operating system of the target computer is not supported:
- Windows 95/98/NT etc.
- The Altiris.NS.Utilities.ClientPushMgr.MinimumOS variable determines the minimum operating system version supported by the Altiris Agent.
Other supported scenarios:
- If the agent push failed for any of the above reasons but later succeeded, the push grid will display the appropriate success messages.
- If the agent sends to multiple computers with some successes and some failures, the corresponding success or failure messages appear in the sending grid.
- If a computer was previously a client (ie the Altiris Agent was installed) and has since been reimaged, sending the agent to it will not fail.
- When a sydc001.testdom01.lab machine exists and a sydc001.syd-lab.altiris.com machine does not exist. When sydc001.syd-lab.altiris.com (which does not exist) is entered into the push page grid, the push attempts a DNS lookup on the FQDN and fails. It will then try to solve it with WINS and send the agent to machine testdom01.
The database tables used to store the Agent Push data are:
- Evt_AeX_Client_LogOn
- Evt_AeX_Push_Status
These will be created during NS setup time.
Download page URL (pull install)
This section is for "Pull Install". Pull installation provides another method to install the Altiris Agent on a target computer. Instead of pushing the installation to the target computer remotely, the installation pull works on the opposite side, where the target computer downloads the agent installation package and installs it manually.
To do this, users need to follow the steps below:
- Log on to the target computer as the computer's administrator.
- Locate the URL in this section. By default, the URL ishttp://\[NS_SERVER_FQDN\]/Altiris/NS/Agent/AltirisAgentDownload.aspx. The URL must be in the FQDN if accessed from another domain.
- Follow the instructions on the page to download and install the agent.
It is important to note that the pull install also uses the proxy settings within the Agent Push "Install Settings".
Scheduled sending to Teams
Schedule Push automates the agent push process using the NS resource target infrastructure. Users can select the computers on which they want to install the Altiris Agent and choose the schedule.
If the resource target's membership has changed, the scheduled push ensures that all computers belonging to the resource target have the Altiris Agent installed via the push install. If any of the scheduled agent transfers fail, users can view them in the Altiris Installation Status report.
Security
The Altiris Agent installation is protected by the NS item permissions. To push agents to computers, the current user must have at least the following NS security privileges:
- Read permission on the Altiris Agent Installation page.
- Write permission on the Install Altiris Agent page.
- Read permission for the data class "AeX AC Discovery", a basic inventory data class.
applies to
SMP 7.1 SP2 MP1
SMP7.5+
There may have been minor changes between versions, but the general behavior should be consistent.
FAQs
How do I install Altiris agent on Windows? ›
Manual use of the AeNSC.exe installer
Run the AeXNSC.exe on the target computer (see AeXNSC Command Line Arguments below). (On the Notification Server, this file is found in the following directory: C:\Program files\Altiris\Notification Server\NSCap\Bin\Win32\X86\NS Client Package.)
Symantec Management Agent establishes communication between Notification Server and the computers in your network. Notification Server interacts with Symantec Management Agent and lets you monitor and manage each computer from the Symantec Management Console.
What is Symantec Altiris agent? ›Altiris Application Metering Agent: This plug-in is used to monitor the applications that are installed on a client machine using the Application Metering Policy. For more information, please see the guide at the following location: http://www.symantec.com/docs/DOC9616.
What is Altiris software used for? ›Altiris Inc. is a subsidiary of Symantec specializing in service-oriented management software which allows organizations to manage IT assets. They also provide software for web services, security, and systems management products.
How do I manually install an agent? ›In the Operations console, select Administration. Select Pending Management. In the Pending Management pane, select computers in Type: Manual Agent Install. Right-click the computers, and then select Approve.
How do I install an agent on my machine? ›Installation for New Machine Agent
From AppDynamics Downloads, download the Machine Agent installation package for your OS environment onto the machine you want to monitor. If there is no download bundle for your OS, use the Machine Agent zip file without the JRE, and use a separately downloaded JRE to run it.
: Analyzes all incoming traffic and outgoing traffic and offers browser protection to block such threats before they can be executed on the computer. The rules-based firewall and browser protection protect against web-based attacks. See: Managing intrusion prevention.
How do I stop Symantec Management Agent? ›- Click Start.
- Click Run.
- Type smc -stop.
Navigate to the Start menu. In the Run menu, type in "Smc -stop" and click Ok. Symantec Endpoint Protection should now be disabled.
What is Symantec on my PC? ›Symantec Endpoint Protection. combines virus protection with advanced threat protection to proactively secure your client computers against known and unknown threats, such as viruses, worms, Trojan horses, and adware.
Is Symantec a good antivirus? ›
Good Virus Protection Suite
Symantec overall is a good and fast Virus/Threat Protection solution for small to mid-size workgroups. Symantec is fast and runs easily in the background. It doesn't load the system resources and provides easy-to-use central management capability.
Click the Symantec Endpoint Protection client icon on the menu bar, and then click Uninstall. Click Uninstall again to begin the uninstallation.
What is Altiris client? ›Altiris Client Management Suite from Symantec automates time-consuming and redundant tasks to reduce the effort and costs associated with deploying, managing, securing, and troubleshooting client systems so organizations can gain control of their IT environments.
What is Symantec application? ›Symantec Endpoint Protection Application and Device Control enables extra security protection for client systems. Simple rules created with Application and Device Control can enforce security policies and stop unknown malware. This page is a resource for those looking to get the most out of this feature.
What is Symantec Endpoint management? ›Symantec Endpoint Management with Remote Support
Bomgar enables technicians using Symantec to launch a secure remote support session directly from ITMS, CMS and DS assets. This integration increases the effectiveness of your technicians by placing robust remote support and secure chat at their fingertips.
- Learn about agents.
- Check prerequisites.
- Prepare permissions.
- Download and configure the agent.
- Run the agent.
- Replace an agent.
- Remove and re-configure an agent.
- Unattended config.
- From the Deep Security Manager, go to Administration > Updates > Software > Download Center. ...
- Select your agent software package from the list.
- Click Import to download the software from the Trend Micro Download Center to the Deep Security Manager.
- Click the Admin tab.
- In the Global Settings section, click Scope of Management.
- Click Download Agent.
- Click on the name of the remote office in which you want to install an agent. ...
- Install the agent in a computer in the remote office, manually.
- Availability Monitoring. Configuring Monitoring Interval. Managing and Unmanaging a device. Configuring Device Dependencies. Poll using IP Address/DNS. ...
- Performance Monitoring. Monitoring CPU, Memory, Disk Using SNMP. Monitoring CPU, Memory, Disk Using WMI. Monitoring CPU, Memory, Disk Using CLI. Adding More Monitors.
- Download the installable and follow the steps in the wizard as described below. ...
- Next, provide information to authenticate with the ACCELQ server. ...
- You can provide any name to your Agent which is easily identifiable. ...
- Now, select an installation path and proceed.
What is agent device? ›
The device agent (local or remote) establishes the SSH connection with the proxy file server and copies a configuration or an image file that you want to deploy on the device to the proxy file server using SFTP. The device agent instructs the device to copy the configuration or image file from the proxy file server.
Does Symantec disable Windows Firewall? ›An installation of Symantec Endpoint Protection with Network Threat Protection automatically detects and disables Windows Firewall, if enabled. If you install Symantec Endpoint Protection without Network Threat Protection, an active Windows Firewall is not disabled.
What is Symantec monitoring? ›Last Updated November 11, 2022. Symantec Endpoint Protection. collects information about the security events in your network. You can use log and reports to view these events, and you can use notifications to stay informed about the events as they occur.
How do I restart Symantec Management Agent? ›If the agents still receive tasks, you can run the task ''Restart Symantec Management Agent" on them. This task is in NS> Manage> Jobs and Tasks > Samples> Notification Server > Restart Symantec Management Agent.
How do I Uninstall agent? ›Uninstall the agent by using the Operations console
In the Operations console, select Administration. In the Administration workspace, select Agent Managed. In the Agent Managed pane, right-click the computers for which you want to uninstall the agent, and then select Uninstall.
- Open the registry.
- Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Symantec\Symantec Endpoint Protection\SMC.
- Change the value for SmcGuiHasPassword from 1 to 0.
- Restart the SMC service.
The default username and password for the Endpoint Protector Reporting and Administration Tool after setup is username "root" and "epp2011" is the password. We strongly recommend that the default user name and password are changed immediately after the system setup.
How to break Symantec Endpoint Protection password? ›- To reset a forgotten. Symantec Endpoint Protection Manager. ...
- On the management server computer, click. Start. ...
- In the. Logon. ...
- In the. Forgot Password. ...
- Click. Temporary Password. ...
- The administrator must change the temporary password immediately after logging on.
- Navigate to. Connectivity > Bypassed Traffic > Bypassed Executables. .
- Click. Add Executable. .
- Enter the executable information. Enter a. Name. that describes this application. (Optional) Enter a. Comment. for justification or future reference. Enter the. Executable Path. of the application.
Windows: Find Symantec EndPoint Protection in your Programs or quickly find it by pressing the Windows key on your keyboard and typing "Symantec". Or you can look in your system tray (next to your clock) at the bottom right of your screen.
How do I know if Symantec is running on Windows? ›
Windows 10 All sub versions (1903,1909, 20H2)
Clicking the Windows logo in the lower left corner and scrolling through the left column will reveal Symantec Endpoint Protection. Clicking on the shield in the lower right corner next to the temperature will also launch the application.
1, open the client user interface, then click Symantec Endpoint Protection > Uninstall Symantec Endpoint Protection. You may be required to enter a password. In versions earlier than 14.0. 1 (14 RU1), click the Symantec Endpoint Protection client icon in the Menu bar, then click Uninstall.
What is Symantec called now? ›Symantec may refer to: An American consumer software company now known as Gen Digital Inc. A brand of enterprise security software purchased by Broadcom Inc. in August 2019.
Is Symantec same as Norton? ›Norton, formerly known as Norton by Symantec, is a brand of Gen Digital (formerly NortonLifeLock) based in Tempe, Arizona. Since being acquired by the Symantec Corporation in 1990, Norton offers a variety of products and services related to digital security, identity protection, and online privacy.
Which is the best antivirus of all time? ›- Best Overall: Bitdefender Antivirus Plus.
- Best for Windows: Norton 360 With LifeLock.
- Best for Mac: Webroot SecureAnywhere.
- Best for Multiple Devices: McAfee Antivirus Plus.
- Best Premium Option: Trend Micro Antivirus+ Security.
- Best Malware Scanning: Malwarebytes.
Symantec Endpoint Protection, developed by Broadcom Inc., is a security software suite that consists of anti-malware, intrusion prevention and firewall features for server and desktop computers. It has the largest market-share of any product for endpoint security.
Does uninstalling Symantec require a reboot? ›Reboot the computer after the uninstallation finishes and the reboot prompt appears. Symantec Agent for Linux (SEPM) uninstalled successfully. A reboot is required to complete uninstallation.
What tool removes Symantec Endpoint Protection? ›Uninstall Symantec Endpoint Protection using CleanWipe
Double-click Cleanwipe.exe, and then click Next. Accept the license agreement, and then click Next. Select the Symantec products you want to remove, and then click Next twice. When the tool finishes running, you may be prompted to restart the computer.
- Step 1: Download the. ...
- Step 2: Install the Symantec Endpoint Protection Manager. ...
- Step 3: Activate your license and add a group. ...
- Step 4: Install the Symantec Endpoint Protection clients. ...
- Step 5: Check that the latest definitions are installed.
- Go to. Start > Programs > Symantec Endpoint Protection Manager. > Symantec Endpoint Protection Manager. .
- In the. Symantec Endpoint Protection Manager. logon dialog box, type the user name ( admin. by default) and the password that you configured during the installation. ...
- Click. Log On. .
What is Altiris Deployment Solution? ›
Altiris™ Deployment Solution from Symantec helps reduce the cost of deploying and managing servers, desktops, and notebooks from a centralized location in your environment.
Where is Symantec installed? ›The default installation folder of a Symantec Endpoint Protection (SEP) client is within C:\Program Files\ (or C:\Program Files (x86)). In some cases, you want to install Symantec Endpoint Protection to another folder, drive or both.
How do I activate Symantec? ›- You must log on to the Symantec Endpoint Protection Manager with a System Administrator account, such as the default account admin.
- Go to the. Admin. > Licenses. page to import and activate your SEP product license.
The Symantec Endpoint Security Suite provides attack prevention, detection and response for endpoints in an organization. It provides a broad feature set including traditional and machine-learning based prevention measures, Endpoint Detection and Response (EDR), application control, and deception technology.
Do I need Symantec Endpoint Protection? ›Endpoint Security is the critical last line of defense in preventing cyber attacks from compromising those devices and in protecting your sensitive information from falling into the wrong hands. That's why you need the best possible protection everywhere your data lives. That's why you need Symantec.
Is Symantec Endpoint Protection a firewall? ›firewall. Last Updated November 11, 2022. includes a default Firewall policy with default firewall rules and firewall settings for the office environment.
What is difference between Symantec Endpoint Protection and antivirus? ›Additionally, antivirus software is meant to be installed on an individual device basis, whereas endpoint security is usually installed on multiple machines that are networked together, and is managed centrally by an IT administrator.
How do I install Symantec Backup Exec Remote Agent for Windows? ›- Open the Backup Exec console on the media server.
- Click on the round Backup Exec button which is located to the left of the Home tab.
- Go to Installation and Licensing - select Install Agents and Backup Exec Servers on Other Servers.
- On the Remote Computers section - select Add.
- Run Setup to install the agent.
- On the Welcome page, click Next.
- On the License Terms page, read the license and then click I Agree.
- On the begin Upgrade page, click Upgrade.
- On the Completion page, click Finish.
- Once the agent installation completed, go to the Control Panel.
- Download the Agent Software.
- Create Install Key.
- Configure a Response File.
- Install Management Agent.
- Verify the Management Agent Installation.
How do I install an OEM Agent on Windows Server? ›
- We need to download the agent software from OMS Server for the platform which we will install. Login with sysman. ...
- Get the supported platform list. ...
- Download the agent software. ...
- let me copy the software to target server and unzip. ...
- Let me install the agent.
- Step 1: Download the. ...
- Step 2: Install the Symantec Endpoint Protection Manager. ...
- Step 3: Activate your license and add a group. ...
- Step 4: Install the Symantec Endpoint Protection clients. ...
- Step 5: Check that the latest definitions are installed.
This Agent optimizes data transfers for 32-bit and 64-bit remote Windows servers with exclusive Agent Accelerator technology that provides source-level compression and distributed processing at the client. Open files are protected with the Advanced Open File capability built into the Agent for Windows.
How to install Backup Exec remote agent? ›- Open the Backup Exec console on the media server.
- Click on the round Backup Exec button which is located to the left of the Home tab.
- Go to Installation and Licensing - select Install Agents and Backup Exec Servers on Other Servers.
- On the Remote Computers section - select Add.
- Visits Apps from your “Settings” menu.
- Select Apps & Features.
- Choose Optional features.
- Next, click on Add a feature.
- Type or scroll down to find “RSAT”
- Choose Install to add the tools to your device.
msi can be found in the Operations Manager installation media and in the following folder on a System Center - Operations Manager management server - %ProgramFiles%\Microsoft System Center\Operations Manager\Server\AgentManagement<platform>.
Where is Microsoft monitoring agent located? ›The 32-bit and 64-bit versions of the Microsoft Monitoring Agent can be downloaded from the Microsoft Download Center or it can be deployed through the Administration pane of the SCOM console.
What is Oracle Management Agent? ›Management Agent is a service that provides low latency interactive communication and data collection between Oracle Cloud Infrastructure and any other targets.
How do I install a management service? ›On the taskbar, click Start, and then click Control Panel. In Control Panel, click Programs and Features, and then click Turn Windows Features on or off. Expand Internet Information Services, then Web Management Tool. Select IIS Management Service, and then click OK.
How to install Oracle Management Agent 13c? ›- Navigate to the "Add Targets Manually" screen using the menu at the top-right of the screen (Setup > Add Target > Add Targets Manually).
- Click the "Install Agent on Host" button.
- Click the "+ Add" button.
- Enter the host and platform, then click the "Next" button.
How to install OEM 12c Agent manually on Windows? ›
To begin, open your Cloud Control and go to "Setup -> Extensibility -> Self Update". Open the "Agent Software" folder and check if the Agent Software of Windows x64 is with status "Applied", as in the image below: If the agent is not applied, you need to download it, deploy and then activate it.
How do I add an Agent to OEM? ›- Choose: Setup, Add Target, Add Targets Manually.
- Under “Add Host Targets” Click “Install Agent on Host”
- Add Host Name: tst01.example.com & Platform: Linux x86-64, Click Next.
- Deployment Type: Fresh Agent Install.
- Fill “Linux x86-64: Agent Installation Details” as below.
- Change directory to the following location in the AGENT_HOME directory: AGENT_HOME/bin.
- Enter the following emctl command to check status of the Management Agent: $PROMPT> ./emctl status agent.