Views:
Worry-Free Services provides multiple options to deploy Security Agents. Determine which ones are most suitable for your environment based on your current management practices and the account privileges that end users are assigned.
Operating System
 
Windows
  • For single-site deployment, IT administrators can choose to deploy using a Login Script Setup. The Agent is deployed in the background and the end user does not notice the installation process.
  • In organizations where IT policies are strictly enforced Login Script Setup is recommended. Login-script setups do not require administrative privileges to be assigned to the end user. Instead, the administrator configures the installation program itself with the password to an administrative account. You do not need to modify the end user’s permissions.
  • In organizations where IT policies are less strictly enforced, Agent/Profile installation using simple Agent download is recommended. The administrator sends out an email message instructing users to visit the download site where they can install the Agent. Using this method, however, requires that end users who will install the Agent have administrator privileges.
Mac
In organizations that also have Macs in the environment, Agent installation using the email link is recommended. The administrator sends out an email message instructing users to visit the download site where they can install Agent. Using this method, however, requires that end users who will install the Agent have administrator privileges.
Note
Note
The downloaded package is unique for each machine. The same package cannot be used on a different Mac.
Android
In organizations also have Android devices in the environment, Agent installation using Worry-Free Services is recommended. Users download the Agent from Worry-Free Services and use the authentication code they receive from the administrator to enroll the device and activate the agent.
For more information about the installation methods, see Security Agent Installation Methods.
iOS
Before deploying Security Profiles to iOS devices, administrators must first create a valid Apple Push Notification Service (APNs) certificate. For more information about the certificate, go to ADMINISTRATIONMobile Device Enrollment Settings.