Installation on macOS systems

Protection deployment overview

The installation process consists of a series of steps that vary depending on the status of the network at the time of deploying the software and the number of computers to protect:

  • Find unprotected devices on the network

  • Verify minimum requirements for target devices

  • Uninstall competitor products

  • Determine device default settings

  • Verify the security software has been correctly installed.

Find unprotected devices on the network

Find devices on the network without protection installed or with a third-party security product that needs replacing or complementing with Advanced EDR. Verify that you have purchased enough licenses for the unprotected devices. See Licenses.

Advanced EDR enables you to install the software even when you do not have enough licenses for all the computers you want to protect. Computers without a license show in the management console with some information (such as installed software and hardware), but are not protected.

Verify minimum requirements for target devices

For more information about minimum requirements, see Installation requirements.

Uninstall competitor products

We recommend that you uninstall any third-party antivirus and security software prior to installing Advanced EDR.

Determine device default settings

When the software is installed on the computer or device, Advanced EDR assigns the All group security settings to it. However, during installation, you can select a different target group for the computer with the required settings. See Managing settings.

Verify the security software has been correctly installed

  • Select Computers from the top menu. Find the corresponding computer. For more information about how to find computers, see Managing computers and devices.

  • Select the computer on which the security software has been installed. The computer details page opens.

  • Select the Details tab. All information collected from the computer is shown, along with the installation status.

  • In the Security section, verify the status of the various modules:

    • Installing...: The installation process is incomplete or there has been an error. If the process failed, the status does not change until the installation problem is resolved.

    • Enabled/Disabled: After a few minutes, if the installation has been successful, the status of the protection modules is shown.

Detect and resolve installation errors

If, after a few minutes, the Security section disappears from the computer details page, it is because the security software did not install correctly. Verify this: