Deployment - Installing the Client on Windows

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
35 minutes
Difficulty
Beginner
CEU/CPE
1
Video Transcription
00:06
>> In this module,
00:06
we will discuss deployment,
00:06
installing the client on Windows.
00:06
The process is very simple.
00:06
We download a 250k EXE file from the server.
00:06
Once we run it, a tiny agent is installed.
00:06
It connects to the server.
00:06
Based on the policy configured on the server,
00:06
the tiny agent will download and install
00:06
the end-point client and
00:06
the capabilities based on the policy.
00:06
If needed, it's possible to
00:06
download and export a package in advance which
00:06
contains all the prerequisites
00:06
you will need. Let's have a look.
00:06
I'm in the Infinity portal.
00:06
I'm going to go to Policy and under Software Deployment,
00:06
I'm going to verify which capabilities are enabled.
00:06
By default, I'll have the threat prevention capabilities.
00:06
If I'll expand it, I can see anti-malware,
00:06
anti-bot, anti-ransomware, and threat emulation.
00:06
I'm going to verify the version.
00:06
Currently, I'm using the recommended version.
00:06
Let's go ahead and download
00:06
the endpoint. I'm going to click here.
00:06
Change the version. I'm going to go ahead and select
00:06
the recommended version and hit "Download".
00:06
Here is the file. I will transfer the agent
00:06
to my Windows machine and begin the installation.
00:06
Since this is just a demo,
00:06
I will manually deploy and install
00:06
the client. This is my client.
00:06
I'm going to go ahead and run the installation.
00:06
Fast-forward and I can see that
00:06
the tiny agent is installed and connected.
00:06
If I'll change this and
00:06
drag it here, it's going to be easier.
00:06
Double-click and I can see
00:06
that I'm currently connected to my server.
00:06
If I'll go back to the portal
00:06
and go to the Computer Management tab,
00:06
I can see my client, PC-10,
00:06
and the status that is currently downloading.
00:06
Fast-forwarding and I'm prompted
00:06
to approve the installation right now.
00:06
I'm going to go ahead and select Install Now.
00:06
The Postpone settings can be
00:06
modified to even allow a silent installation.
00:06
From the Infinity portal,
00:06
we'll go to the Policy tab and
00:06
under Global Policy Settings,
00:06
we'll go to Client Settings.
00:06
Here on the right, I'm going to go
00:06
to Installation & Upgrade.
00:06
By default, this option is checked to enable
00:06
the user to postpone the client installation or upgrade.
00:06
I can simply unchecked it and save the policy.
00:06
Of course, if you want,
00:06
you can enable it and modify the timers.
00:06
We can see the status changed
00:06
to user approved start of deployment.
00:06
If I go back to the Infinity portal,
00:06
I can see that the status is currently deploying.
00:06
Yet another fast-forward and
00:06
I can see the endpoint icon right here.
00:06
I'll double-click it, I can
00:06
see all the capabilities that are currently installed.
00:06
All of them are part of
00:06
the threat prevention capabilities.
00:06
I do have a warning about
00:06
anti-malware because the machine was not scanned yet.
00:06
I'm going to go ahead and start scanning.
00:06
If I'll check Google Chrome,
00:06
my browser, I can see
00:06
that there's a new extension installed.
00:06
Actually, I have the notification
00:06
right here. Well, had it.
00:06
But if I click here, I can see new extension,
00:06
Check Point Sandblast Agent for Browsers.
00:06
From the Infinity portal,
00:06
I'm going to refresh it.
00:06
I can see the deployment status is completed.
00:06
Let me remind you, the client and
00:06
the server are communicating.
00:06
Going back to the clients,
00:06
I can see that my computer is compliant
00:06
with the organizational security policy.
00:06
I'm all good. I'm currently scanning for anti-malware.
00:06
I'm updating my anti-ransomware
00:06
and behavioral guard forensics.
00:06
Of course, I am connected to my endpoint server.
00:06
Thanks for watching,
00:06
>> and I'll see you in the next module.
Up Next