Installing Host Checker Automatically or Manually
To automatically install Host Checker on client computers:
1.In the admin console, choose Authentication > Endpoint Security > Host Checker.
2.Under Options, select Auto-upgrade Host Checker if you want the system to automatically download the Host Checker application to a client computer when the version of Host Checker on the system is newer than the version installed on the client. Here is a summary of what happens when the Auto-upgrade Host Checker option is selected or not selected:
•If Host Checker is not installed on the client computer, Host Checker is installed automatically regardless of whether the Auto-upgrade Host Checker option is selected or not selected.
•If the Auto-upgrade Host Checker option is selected and a previous version of Host Checker is installed, Host Checker is upgraded on the client automatically.
•If the Auto-upgrade Host Checker option is not selected and a previous version of Host Checker is installed, Host Checker is not upgraded the client automatically.
If you select the Auto-upgrade Host Checker option, note the following:
•On Windows, the user must have administrator privileges in order for the system to automatically install the Host Checker application on the client. For more information, see the Client-side Changes Guide on the Pulse Secure Global Support Center (PSGSC) Center.
•If a user uninstalls Host Checker and then signs in to a device for which the Auto-upgrade Host Checker option is not enabled, the user no longer has access to Host Checker.
3.Click Save Changes.
An administrator may choose to download and install Host Checker manually on their client systems. The Maintenance > System > Installers page of the admin console provides several applications and a service for download. You can download an application or service as a Windows executable file, which enables you to:
•Distribute the file to client machines using software distribution tools. This option enables you to install an application or service on client machines whose users do not have Administrator privileges, which are required to install the application or service.
•Post the executable in a secure repository so that users with the proper administrator right may download and install the appropriate version.
•Download and execute a script that automatically retrieves the proper version of the installer from an FTP server.