Installation on Windows systems

Protection deployment overview

The installation process consists of a series of steps that depend on the status of the network at the time of deployment and the number of computers and devices you want to protect:

  • Find unprotected devices on the network.

  • Verify minimum requirements for target devices.

  • Uninstall competitor products and restart computers

  • Determine device default settings.

  • Select a deployment strategy.

  • Check that the security software has been correctly installed.

Find unprotected devices on the network

  • Find those computers on the network without protection installed or with a third-party security product that needs replacing or complementing with Advanced EDR. On large networks, this task can be sped up using discovery features (see Viewing discovered computers).

  • Verify that you have purchased enough licenses for the unprotected devices (see Licenses).

Advanced EDR enables you to install the software even when you do not have enough licenses for all the computers you want to protect. Computers without a license show in the management console with some information (such as installed software and hardware), but are not protected.

Verify minimum requirements for target computers

For more information about minimum requirements, see Installation requirements.

Uninstall competitor products and restart computers

The Advanced EDR protection services work without you having to restart your computers if you do not have any previously installed antivirus programs.

Some older versions of Citrix may require a computer restart or there may be a micro-interruption of the connection.

By default, Advanced EDR can coexist with other security solutions installed on your computers.

Uninstallation of other products applies to trial and commercial versions. To do this, assign a Workstations and servers settings profile with the Uninstall other security products option enabled (see Uninstall other security products). While looking for updates, Advanced EDR checks the assigned settings profiles once a day. For a list of the third-party security products that Advanced EDR uninstalls automatically, see https://www.pandasecurity.com/en/support/card?id=50021

Determine device default settings

When the software is installed on the computer or device, Advanced EDR assigns the All group security settings to it. However, during installation, you can select a different target group for the computer with the required settings. See Managing settings.

If the network settings for the selected group differ from the settings specified during installation, the installation settings apply. See Generating the installation package and manual deployment.

Select a deployment strategy

The deployment strategy depends on the number of computers to protect, the workstations and servers with a Cytomic agent already installed, and the company network architecture. Several options are available:

Check that the security software has been correctly installed

  • Select the Computers menu at the top of the console. Find the corresponding computer. For more information about how to find computers, see Managing computers and devices.

  • Click the computer on which the security software has been installed. The computer details page opens.

  • Select the Details tab. All information collected from the computer is shown, along with the installation status.

  • In the Security section, check the status of the various modules:

    • Installing...: The installation process is incomplete or there has been an error. Wait a few minutes.

    • Enabled/Disabled: After a few minutes, if the installation has been successful, the status of the protection modules is shown.

Detect and resolve installation errors

If, after a few minutes, the Security section disappears from the computer details page, it is because the security software did not install correctly. Verify this: