Downloading and installing the agent
Endpoint Protection protects PCs and Macs by installing an agent that runs on each device. The agent has a unique identity on each installed computer and performs security actions outside of the user's control on behalf of the administrator.
The Endpoint Protection agent is cloud-based. If you will be installing agents on a network that greatly restricts internet access, specific URLs should be allowed through the firewall for the agent to function correctly.
For a list of URLs that need to be allowed, see the Knowledge Base.
To download and install the agent:
-
Locate the agent installation download links in the Management Console.
-
If you are using Business view:
-
Go to Settings > Downloads to see the installation file download links.
-
Click the Download link under the operating system used by the target device.
-
-
If you are using MSP view:
-
Click Sites List.
-
Find your Site in the list and click the name.
-
Open the Endpoint Protection tab.
-
In the Download Software box, click the Download Windows .exe, Download Windows (.msi), or Download Mac link to download the appropriate file for the target device.
-
-
-
Copy the Keycode for your company or for the Site for future reference. See Finding your keycode.
-
Move the installation file to the device you are installing the agent on.
-
Install the agent.
Note: A system extension is installed with Mac Agent version 9.6.4 or later. This system extension is required for securely isolating a device from the network. See Isolating and unisolating a device. If you silently install the Mac Agent using mobile device management (MDM), see this knowledge base article for configuration file requirements that prevent content filter and system extension dialog boxes from appearing to your customers. If you silently uninstall the Mac Agent, the system extension remains on the device.
After installation is finished, the agent scans for threats. Once the initial scan is complete, the agent checks in with the Management Console and the Devices column on the Entities page populates. This process typically takes 15 – 30 minutes but can take up to 24 hours.
Note that if you are using DNS Protection with Endpoint Protection, DNS Protection must be enabled in the Endpoint Policy. If the Site has DNS Protection enabled and the Endpoint Policy has DNS Protection turned to On, DNS filtering begins once the device is listed under Entities. For more information about DNS Protection, see DNS Protection.