Understanding Agent Installation Methods
You can install the Ivanti Endpoint Security Agent on your network using a variety of methods.
Network administrators should carefully consider which method to use when installing the agent as each method has its own unique steps. The following table describes each installation method.
Installation Method |
Description |
---|---|
Agent Management Job |
Benefits in using this method:
Important: This method only supports endpoints that contain a Windows operating system. Refer to the Command Line method to install an agent on an endpoint that has a supported Mac, Linux, UNIX, or Mac operating system. |
Install Wizard |
Benefits in using this method:
|
Command Line |
Benefits in using this method:
|
Other Methods |
Third-Party Software: In some environments, customers may prefer to use third-party software, such as PsExec, to install the agent. Golden Image: In networks making substantial use of golden images, which are compressed operating system archives that are entirely installed and configured according to an organization's specifications, network administrators may benefit from adding the Ivanti Endpoint Security Agent to their image. Attention: These installation methods are not documented in this guide. For additional information on these installation methods, contact Support.. |
Supported operating systems listed in this topic are generalized for each operating system. Before installing the agent on an endpoint, ensure its operating system is supported by referring to Supported Endpoint Operating Systems.