How to install the GFI EndPointSecurity Agent
The GFI EndPointSecurity agent is a client-side service responsible for the implementation of the protection policies on target computers. This service is automatically installed on the remote network target computer after the first deployment of the relevant protection policy through the GFI EndPointSecurity management console. Upon the next deployments of the same protection policy, the agent will be updated and not re-installed. For more information refer to How to install the GFI EndPointSecurity Agent.
The GFI EndPointSecurity Agent needs a machine with a minimum set of hardware and software requirements. For more information refer to System requirements.
The installation of the GFI EndPointSecurity Agent should be a transparent process. However, if you encounter any issues with the installation, ensure the following are configured correctly:
Enable File and printing sharing exception
Enable File and Printing sharing exception on the Windows Firewall of the GFI EndPointSecurity Agent machines.
If Microsoft Windows Firewall is enabled:
- Open Windows Firewall > Exceptions tab and select File and Print Sharing.
This allows the GFI EndPointSecurity main application to copy all required files in order to deploy the agent onto the remote Agent machine.
If this exception is disabled, the Agent installation will fail and the following error message will be displayed on the main application Deployment Report:
- Failed to contact remote computer. Computer might be offline or the specified credentials are invalid.
If you have another firewall client replacing the Microsoft Windows firewall, similar exceptions are necessary.
Network Firewalls
If you have a network firewall in the communication path between the GFI EndPointSecurity Management Console server and the Agent machines, make sure SMB communications is allowed. This is done over the following TCP ports:
- 135
- 139
- 445
Firewall port exception
Add the following exceptions to any firewall enabled on the GFI EndPointSecurity server:
- TCP Port 1116
The GFI EndPointSecurity Agents periodically send back status information to the GFI EndPointSecurity server. This includes a "beep" that is a CRC check of the policy (so that the Console knows if the policy is up to date) and the events that the Agent sent back to the Console for storage in the SQL backend database.
By default, this connection is done on port 1116, but can be changed from:
- GFI EndPointSecurity configuration > Options > Advanced Options > Communication
Access to the Remote Registry Service
GFI EndPointSecurity needs access to the registry service on the target machine where the Agent is going to be installed. Detailed information on how to enable access to the Remote Registry service of the target machine is discussed in the following article: http://go.gfi.com/?pageid=esec_remoteregistry.
Windows Services
The following services are required to be running on the agent machines:
- Server service
- Workstation service
- Remote Registry Service
- Remote Procedure Call
Hidden Shares and Server Permissions
Ensure that the following are met:
- The account under which the GFI EndPointSecurity service is running has administrative rights on the GFI EndPointSecurity server as well as the target machines.
- Access to the C$ hidden share is required to install/uninstall the agent, ensure you can browse to this hidden share from the GFI EndPointSecurity server.
- Access to the ADMIN$ hidden share is also required to update the Agent. Ensure you can browse to this hidden share from the GFI EndPointSecurity server.
Change the behavior of UAC
UAC policies may block the installation of the main installation or the agent. It is recommended to set UAC to run elevated tasks without a prompt.
NOTE
This setting can also be set via GPOGroup Policy Objects..
To change the behavior of UAC:
- Go to Start and run
secpol.msc
- If the User Account Control dialog box appears click Yes.
- In the console tree, go to Local Policies > Security Options.
- In the details pane, scroll to the Group Policy setting and double-click User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode.
- Select Elevate without prompt and click OK.