Deploying agents
An agent is software that runs on each device. The agent has a unique identity on each installed computer and performs security actions outside of the user's control on behalf of the administrator.
The business products use two kinds of agents:
-
Endpoint Protection
-
Cloud-based.
-
Once you install the agent you do not need to install or update any definition files.
-
When a new Endpoint Protection threat is identified, the agent is updated in the cloud for immediate protection of Endpoint Protection devices.
-
-
DNS Protection
-
Only available when DNS Protection has been purchased.
-
The DNS Protection agent can be installed using the provided MSI or through an existing Endpoint Protection agent.
-
Can only be installed on Windows endpoints.
-
Mac endpoints can be protected through a DNS Protection protected network, either by using a VPN or on-site.
-
The DNS Protection agent will filter and manage DNS requests whenever access to the DNS Protection servers is available.
-
-
Endpoint Detection and Response
-
Only available when Endpoint Protection and Endpoint Detection and Response have been purchased.
-
-
Managed Detection and Response
-
Only available when Managed Detection and Response has been purchased.
-
There are multiple ways to deploy agents to devices, from manual installations on a local machine to remote deployments using RMM solutions or GPO to third-party tools like SCOM, PDQ Deploy, or AutoMox.
Regardless of your method, you should initially work with a small subset of devices until you are confident your deployment strategy is working. Once you are sure, you can implement the strategy for larger numbers of devices.
The following sections include instructions for a few of the most commonly used deployment methods.