Installation on Windows systems
Protection deployment overview
The installation process consists of a series of steps that depend on the status of the network at the time of deployment and the number of computers and devices you want to protect:
-
Find unprotected devices on the network.
-
Verify minimum requirements for target devices.
-
Uninstall competitor products and restart computers
-
Determine device default settings.
-
Select a deployment strategy.
-
Check that the security software has been correctly installed.
Find unprotected devices on the network
-
Find those computers on the network without protection installed or with a third-party security product that needs replacing or complementing with Advanced EDR. On large networks, this task can be sped up using discovery features (see Viewing discovered computers).
-
Verify that you have purchased enough licenses for the unprotected devices (see Licenses).
Advanced EDR enables you to install the software even when you do not have enough licenses for all the computers you want to protect. Computers without a license show in the management console with some information (such as installed software and hardware), but are not protected.
Verify minimum requirements for target computers
For more information about minimum requirements, see Installation requirements.
Uninstall competitor products and restart computers
The Advanced EDR protection services work without you having to restart your computers if you do not have any previously installed antivirus programs.
Some older versions of Citrix may require a computer restart or there may be a micro-interruption of the connection.
By default, Advanced EDR can coexist with other security solutions installed on your computers.
Uninstallation of other products applies to trial and commercial versions. To do this, assign a Workstations and servers settings profile with the Uninstall other security products option enabled (see Uninstall other security products). While looking for updates, Advanced EDR checks the assigned settings profiles once a day. For a list of the third-party security products that Advanced EDR uninstalls automatically, see https://www.pandasecurity.com/en/support/card?id=50021
Determine device default settings
When the software is installed on the computer or device, Advanced EDR assigns the All group security settings to it. However, during installation, you can select a different target group for the computer with the required settings. See Managing settings.
If the network settings for the selected group differ from the settings specified during installation, the installation settings apply. See Generating the installation package and manual deployment.
Select a deployment strategy
The deployment strategy depends on the number of computers to protect, the workstations and servers with a Cytomic agent already installed, and the company network architecture. Several options are available:
-
Manual deployment. See Generating the installation package and manual deployment.
-
Centralized distribution tool. See Installation from a gold image.
-
Remote deployment from the management console. See Computer discovery and remote installation of the client software.
-
Installation using gold image generation. See Installation from a gold image.
Check that the security software has been correctly installed
-
Select the Computers menu at the top of the console. Find the corresponding computer. For more information about how to find computers, see Managing computers and devices.
-
Click the computer on which the security software has been installed. The computer details page opens.
-
Select the Details tab. All information collected from the computer is shown, along with the installation status.
-
In the Security section, check the status of the various modules:
-
Installing...: The installation process is incomplete or there has been an error. Wait a few minutes.
-
Enabled/Disabled: After a few minutes, if the installation has been successful, the status of the protection modules is shown.
-
Detect and resolve installation errors
If, after a few minutes, the Security section disappears from the computer details page, it is because the security software did not install correctly. Verify this:
-
If you installed the security software manually, make sure the user computer does not show any error messages.
-
Verify whether the computer appears in lists. See Checking deployment.
-
Check the Event Viewer on the user computer. See Checking deployment
-
Verify the user computer meets the requirements specified in Installation requirements. Update the product or operating system version if required. See Product updates and upgrades.