Views:

This section provides a summary of the different installation methods to perform a fresh installation of the Security Agent. All installation methods require local administrator rights on the target endpoints.

If you are installing Security Agents and want to enable IPv6 support, read the guidelines in Security Agent Installation and IPv6 Support.

Table 1. Installation Methods

Installation Method/ Operating System Support

Deployment Considerations

WAN Deployment

Centrally Managed

Requires User Intervention

Requires IT Resource

Mass deployment

Bandwidth Consumed

Internal Web Page

Supported on all operating systems

Yes

Yes

Yes

No

No

Low, if scheduled

Email Notification

Supported on all operating systems

Yes

Yes

Yes

No

No

High, if installations start at the same time

Remote Install

Supported on all operating systems

No

Yes

No

Yes

Yes

Low, if scheduled

Login Script Setup

Supported on all operating systems

No

Yes

No

Yes

Yes

High, if installations start at the same time

Client Packager

Supported on all operating systems

Yes

No

Yes

Yes

No

Low, if scheduled

Trend Micro Vulnerability Scanner (TMVS)

Supported on all operating systems except Windows 10

No

Yes

No

Yes

Yes

Low, if scheduled

For single-site deployment and in organizations where IT policies are strictly enforced, IT administrators can choose to deploy using Remote Install or Login Script Setup.

In organizations where IT policies are less strictly enforced, Trend Micro recommends installing Security Agents using the Internal Web Page. Using this method, however, requires that end users who will install the Security Agent to have administrator privileges.

Remote Install is efficient for networks with Active Directory. If your network does not use Active Directory, use the Internal Web Page.