This section provides a summary of the different installation methods to perform a fresh installation of the Security Agent. All installation methods require local administrator rights on the target endpoints.
If you are installing Security Agents and want to enable IPv6 support, read the guidelines in Security Agent Installation and IPv6 Support.
Installation Method/ Operating System Support |
Deployment Considerations |
|||||
---|---|---|---|---|---|---|
WAN Deployment |
Centrally Managed |
Requires User Intervention |
Requires IT Resource |
Mass deployment |
Bandwidth Consumed | |
Internal Web Page Supported on all operating systems |
Yes |
Yes |
Yes |
No |
No |
Low, if scheduled |
Email Notification Supported on all operating systems |
Yes |
Yes |
Yes |
No |
No |
High, if installations start at the same time |
Remote Install Supported on all operating systems |
No |
Yes |
No |
Yes |
Yes |
Low, if scheduled |
Login Script Setup Supported on all operating systems |
No |
Yes |
No |
Yes |
Yes |
High, if installations start at the same time |
Client Packager Supported on all operating systems |
Yes |
No |
Yes |
Yes |
No |
Low, if scheduled |
Trend Micro Vulnerability Scanner (TMVS) Supported on all operating systems except Windows 10 |
No |
Yes |
No |
Yes |
Yes |
Low, if scheduled |
For single-site deployment and in organizations where IT policies are strictly enforced, IT administrators can choose to deploy using Remote Install or Login Script Setup.
In organizations where IT policies are less strictly enforced, Trend Micro recommends installing Security Agents using the Internal Web Page. Using this method, however, requires that end users who will install the Security Agent to have administrator privileges.
Remote Install is efficient for networks with Active Directory. If your network does not use Active Directory, use the Internal Web Page.