This
section provides a summary of the different Security Agent installation methods to perform a fresh
installation of the Security Agent. All installation methods require local
administrator rights on the target computers.
If you are installing agents and want to enable IPv6 support, read the guidelines in Security Agent Installation and IPv6 Support.
Deployment Considerations for Installation
Installation Method/ Operating System
Support
|
Deployment Considerations
|
|||||
WAN Deployment
|
Centrally Managed
|
Requires User Intervention
|
Requires IT Resource
|
Mass deployment
|
Bandwidth Consumed | |
Not supported on Windows Server Core platforms
|
No
|
No
|
Yes
|
No
|
No
|
High
|
Not supported on Windows Server Core platforms
|
No
|
No
|
Yes
|
Yes
|
No
|
High, if installations start at the same
time
|
No
|
No
|
Yes
|
Yes
|
No
|
High, if installations start at the same
time
|
|
Supported on all operating systems except:
|
No
|
Yes
|
No
|
Yes
|
No
|
High
|
Login Script Setup
|
No
|
No
|
Yes
|
Yes
|
No
|
High, if installations start at the same
time
|
Agent Packager
|
No
|
No
|
Yes
|
Yes
|
No
|
Low, if scheduled
|
Agent Packager (MSI package deployed through Microsoft SMS)
|
Yes
|
Yes
|
Yes/No
|
Yes
|
Yes
|
Low, if scheduled
|
Agent Packager (MSI package deployed through Active Directory)
|
Yes
|
Yes
|
Yes/No
|
Yes
|
Yes
|
High, if installations start at the same
time
|
Supported on all operating systems
|
No
|
No
|
No
|
Yes
|
No
|
Low
|
Trend Micro Vulnerability Scanner (TMVS)
|
No
|
Yes
|
No
|
Yes
|
No
|
High
|
Security Compliance installations
Supported
on all operating systems except:
|
No
|
Yes
|
No
|
Yes
|
No
|
High
|