Skip to main content

How can we help you?

Find help articles, troubleshooting guides, and tutorials

Search

End-user self installation guide

The straightforward guide you may be looking for on self-installation.

Start here

See all articles
How to deploy and install agents

Endpoint security is the practice of securing endpoints or entry points of end-user devices such as desktops, laptops, servers, and mobile devices from being exploited by malicious actors and campaigns. Endpoint security has evolved from traditional antivirus software to providing comprehensive protection from sophisticated malware and evolving zero-day threats.

 

These endpoint security needed dedicated software component to be deployed on various devices to execute the security-related tasks. This endpoint's software we commonly called it an agent.

 

By installing this agent into your devices that running on Windows, Mac, or Linux operating systems for both users and servers, your devices receive continuous real-time protection, round the clock, tailored to the specific security services your organisation subscribed to.

 

Agent deployment methods and tools

There are many methods to consider or choose from when come to agent deployment or installation. It's all depending on your organisation's infrastructure, setup and resources. The most common and not limited methods and tools:

1. Agent installation through GPO: If you organisation has an Active Directory Domain based setup, the agent can be installed using the Group Policy Object.

2. Agent installation through network share: Agent installer files can be accessed from a common central location. There is no need for transferring complete agent installer files to all devices in a network.

3. Agent installation through RMM: Agent installing can be push via remote monitoring and management (RMM) tools.

4. Manual installation: IT administrators to manually install agent installer for every users.

5. Outsources services: This is the most common method but it could be quite expensive and often installation service providers need existing organisation tools' such as listed above in order for their service deliverables team to conduct the service.

 

ArmourZero's self installation methods

In ArmourZero, we understood very well the challenges you facing when come to agent installation especially dealing with modern-work-office such as distributed offices or users work-from-anywhere. If you are using any of above list methods, that's good. But if you didn't have these tool with you, don't get panic, we are here to help you.

 

We have developed Universal Email Installer feature to ensure all your users, wherever they are to get protected as soon as possible after you subscribed to our services. This can be easily done just a few steps and clicks away!

1. Assign those users who will be part of the service subscription.

2. Send onboarding email installer to the users.

3. Users open the email and immediately can start to install the agent themselves.

4. Hooray, it's all DONE!

 

To start with ArmourZero's self installation method, all you need to do is to How to import end-users into your directory. And if you have done imported your users into end-users directory, you may go straight to How to assign protection to end-users.

 

See more
How to import end-users to your directory

The very first thing to do for end-user self-installation is to identify who in your company that are eligible for cybersecurity protection. To simplify this step, ArmourZero have created a company's end-user directory for you. This directory is just one-time setup and it's universal that can be used in any of the service subscribed. All we need are.

  • User's full name (employee's name)
  • User's email address (employee's email name)

If you have done this, you may skip this guide and go straight to How to assign protection to end-users.

 

Step 1: Adding users in the end-user directory

There are two methods to add users into your end-user directory;

  • Add individual end-user (one by one).
  • Add by bulk import.

Add individual end user

1. Go to End Users under MANAGE section and click "Add End User".

2. Enter the user's name and email. 

3. Click "Add".

p6WYWPmr5h.gif

 

Add end-user by bulk import

1. Go to End Users under MANAGE section and click "Import List".

2. We have prepared a template file for you to fill up.

3. After you filled up the template file, you may browse, drop and import the file.

4. Click "Import" to complete the step.

RxXPmukZ3O.gif

 
See more
How to assign protection to end-users

In How to deploy and install agents article, it mentioned there many methods to consider or choose from when come to agent deployment or installation. It's depends on your IT setup and current tools deployed. This article specifically covers agent installation using ArmourZero's Universal Email Installer feature to ensure all your end-users, wherever they are to get protected as soon as possible after you subscribed to our services. This unique feature is part of our platform's feature.

 

Step 1: Check available users

If you are first time onboarded customer, you can skip this step. To use Universal Email Installer, make sure you have completed How to import end-users to your directory step and you still have available unused users. If you overused it, you will be charge on the additional user(s). 

 

1. Go to Subscription under MANAGE section, toggle at the relevant subscription, check what is the count for ACTIVE USERS.

Screenshot 2023-11-21 at 3.34.28 PM.png

2. If the Active Users are more than the subscribed users, our Security Operation Centre (SOC) will reach out to you on this matter or alternatively you can referred to over subscribed licenses article.

 

Step 2: Assign protection to end-users

1. Go to Subscription under MANAGE section, toggle at the relevant subscription and click on the three dots action icon 3 dots.jpg, a dropdown action menu will appear.
2. From the dropdown menu, select "Send OB Email", you will see a pop-up page after that.

Glossary: OB stands for Onboarding.

3. In the pop-up, select the end user(s) to whom you want to send the email installer to, then click "Send Email."

0SK7mobxeC.gif

4. The user(s) will receive an email titled "ArmourZero | Download" which include the unique license key. The user(s) can select the relevant Operating System to start download the installer package and install the agent in their computer.

Refer to below articles for relevant end-users self-installation guides

Endpoint Next-Gen Antivirus powered by Crowdstrike

Endpoint Protection with EDR and Threat Intelligence powered by Crowdstrike

Endpoint Antivirus powered by WithSecure

Endpoint Protection with EDR powered by WithSecure

Patch Management powered by Automox

Web Protection powered by DNSFilter

 

5. After successfully installing the agent on end user's device, it should automatically appear installed.jpg on the DEVICE page. If, however you don't see the device listed, it indicates that the installation was not successful, you may try again or reach out to Security Operation Centre (SOC) to troubleshoot this matter together.

 

See more
How to update or remove end-user in your directory

Over the time, you might need to update your end-users directory due to movement of users such as change or user's particular, transfer of device's ownership or resignation.

 

Edit end-user in your directory

1. Go to End Users under MANAGE section, select the particular end-user.

2. Click on the three dots action icon 3 dots.jpg,select "Edit End-Users".

3. Edit the end-user information accordingly.

4. Click “Save”.

kLKUw4g2Ps.gif

 

Remove end-user in your directory

1. Go to End Users under MANAGE section, select the particular end-user.

2. Click on the three dots action icon 3 dots.jpg,select "Remove End Users."

3. Confirm the removal by clicking "Delete End User".

eC6ECPinBF.gif

 

Notes: Removing End Users don't remove subscription.

See more

Endpoint Next-Gen Antivirus powered by Crowdstrike

See all articles
Installing Endpoint Next-Gen Antivirus powered by Crowdstrike - Windows

This guide details on how you could perform agent self-installation for Endpoint Next-Gen Antivirus powered by Crowdstrike. Before you start installing, please check the supported Windows OS version.

 

Step 1: Download the Windows OS installer

Download from email

1. From the email titled "ArmourZero | Download", click your computer model "I am a Windows user" to start download the installer package.

Email download NGAV CS.png

2. Copy the unique license key.

 

Download from ArmourZero console

1. Go to Subscription under MANAGE section and select the subscription.

Subscription NGAV CS.png

2. Download the installer package and copy the unique license key.

Console download NGAV CS.png

 

Step 2: Installing Windows OS installer

1. Open the downloaded file, click "Allow".

2. Follow the step by step on the prompt screen.  Check on "I accept the license agreement and privacy notice".

3. Please ensure to paste the license key (User Key) when prompted during the installation process.

4. Click "Install".

Crowdstrike_NGAV_install.gif

 

Congratulation, Crowdstrike's agent is now successfully installed and you are protected with Endpoint Next-Gen Antivirus services. Kindly inform your IT department accordingly. 

 

Contact your IT department should you have any further questions or need assistance.

 

See more
Installing Endpoint Next-Gen Antivirus powered by Crowdstrike - MacOS

This guide details on how you could perform agent self-installation for Endpoint Next-Gen Antivirus powered by Crowdstrike. Before you start installing, please check the supported MacOS version.

 

Step 1: Download the MacOS installer

Download from email

1. From the email titled "ArmourZero | Download", click your computer model "I am a MacOS user" to start download the installer package.

2. Copy the unique license key.

 

Download from ArmourZero console

1. Go to Subscription under MANAGE section and select the subscription.

2. Download the installer package and copy the unique license key.

 

Step 2: Installing MacOS installer

1. Open the downloaded file, click "Allow".

2. Follow the step by step on the prompt screen.

Screenshot 2023-08-09 at 2.08.48 PM.png

Screenshot 2023-08-09 at 2.08.57 PM.png

Screenshot 2023-08-09 at 2.09.15 PM.png

Y3FtyCz29R.gif

 

Additional step for MacOS Monterey :-

3. Open terminal. Navigate search, type "Terminal", click on the item.

Screenshot_2022-03-10_at_10.57.22_AM.png

open_terminal.gif

4. In terminal, paste below instruction and click enter :

sudo /Applications/Falcon.app/Contents/Resources/falconctl license <your licence key>

Notes : Replace the <your license key> with the license key in Step 1.

terminal_paste.gif

5. Key in your Mac's password when needed and enter.

6. Security and Privacy will prompt on your screen, click "Allow".

7. Click padlock to made changes and tick Cursor_and_white_tick_blue_square.jpg on Falcon.

Screenshot_2022-03-04_at_5.46.51_PM.png

 

Additional step for MacOS Ventura :-

3. Open terminal. Navigate search, type "Terminal", click on it.  

Screenshot 2023-08-08 at 5.13.21 PM.png

4. In terminal, paste below instruction and click enter :

sudo /Applications/Falcon.app/Contents/Resources/falconctl license your licence key

Notes : Replace the <your license key> with the license key in Step 1.

5. Enable Falcon when asked. Click "OK".

Screenshot 2023-08-08 at 5.18.55 PM.png

6. Alternatively, you can click "Open System Settings" and give permission to Falcon.

Screenshot 2023-08-08 at 5.20.23 PM.png

7. Key in your laptop password when asked.

Screenshot 2023-08-08 at 5.22.46 PM.png

 

Congratulation, Crowdstrike's agent is now successfully installed and you are protected with Endpoint Next-Gen Antivirus services. Kindly inform your IT department accordingly. 

 

Contact your IT department should you have any further questions or need assistance.

See more
Installing Endpoint Next-Gen Antivirus powered by Crowdstrike - Linux

This guide details on how you could perform agent self-installation for Endpoint Next-Gen Antivirus powered by Crowdstrike. Before you start installing, please check the supported Linux OS version.

 

Step 1: Download the Linux OS installer

Download from ArmourZero console

1. Go to Subscription under MANAGE section and select the subscription.

Subscription NGAV CS.png

2. Download the installer package and copy the unique license key.

Console download NGAV CS.png

 

Step 2: Installing Linux OS installer

1. Turn on the terminal by pressing the super key, go to the left-hand side application pane, and click the "Terminal" icon. Alternatively, you can search for Terminal in the search area and click the "Terminal" icon.

2. Login into Linux host as root before proceeding with the installation.

terminal_guide_2.gif

3. Go to the installer location, substitute <installer_package> with your installer’s file name, and run the command. Use these commands based on your kernel version.

Crowdstrike_install.png

 

Ubuntu:

sudo dpkg -i <installer_package>

 

RHEL, CentOS, Amazon Linux:

sudo yum install <installer_package>

 

SLES:

sudo zypper install <installer_package>

 

4. Substitute <CID> with your CID to set CID on your sensor. Use this command.

sudo /opt/CrowdStrike/falconctl -s --cid=<CID>

Note: Reach out to ArmourZero for the CID key

 

5. Manually start your sensor

Hosts with SysVinit:

service falcon-sensor start

Hosts with Systemd:

systemctl start falcon-

 

Congratulation, Crowdstrike's agent is now successfully installed and you are protected with Endpoint Next-Gen Antivirus powered by Crowdstrike. Kindly inform your IT department accordingly. 

 

See more
Supported Operating Systems (OS) - Windows

To find out if your computers, laptops, or/and servers Windows OS are compatible with Endpoint Next-Gen Antivirus powered by Crowdstrike, follow below steps.

 

Step 1: Supported Windows OS version

1. Compare your current Windows OS version with below supported Windows OS. If your current Windows OS version found below, you shouldn't have problem on the installation. Otherwise please contact your IT department immediately.

 

64-bit Window Server OS:

  • Server 2022
  • Server Core 2022
  • Server 2019
  • Server Core 2019
  • Server 2016
  • Server Core 2016
  • Server 2012 R2
  • Storage Server 2012 R2
  • Server 2012
  • Server 2008 R2 SP1

 

Microsoft ARM64:

  • Windows 11
  • Windows 10

 

Window Desktop OS:

  • Windows 11 22H2
  • Windows 11 21H2
  • Windows 10 22H2
  • Windows 10 21H2
  • Windows 10 21H1
  • Windows 10 20H2
  • Windows 10 1909
  • Windows 10 1809
  • Windows 10 1607
  • Windows 10 1507
  • Windows 8.1
  • Windows 7 SP1
  • Windows 7 Embedded POS Ready

2. Our policy is to support the latest macOS version minus one version earlier.

 

Step 2: System requirements

Resources needed in order to install the agent. Recommended system requirements are:

  • Processor: Intel Pentium 4 2GHz or higher (processor must support SSE2).
  • Memory: 1 GB on 32-bit systems / 2 GB or more on 64-bit systems.
  • Disk space: 2 GB free disk space.
  • Display with a resolution of 1024 x 768 or higher.
  • Internet Connection: An Internet connection is required to validate your subscription,
    receive product updates, and use cloud-based detection.
  • Javascript must be enabled in the browser settings to enable active block pages.

 

Step 3: Supported browsers

  • Edge (Windows 10). Does not support extensions.
  • Chrome, two latest major versions.
  • Firefox, the two latest major versions.

 

See more
Supported Operating Systems (OS) - MacOS

To find out if your computers, laptops, or/and servers MacOS are compatible with Endpoint Next-Gen Antivirus powered by Crowdstrike, follow below steps.

 

Step 1: Check your current MacOS version

1. Click on the Appletype-apple-logo.jpgmenu in the corner of your screen

2. Choose "About this Mac". You will see the name and version of MacOS

 

Step 2: Supported MacOS version

1. Compare your current MacOS version with below supported MacOS. If your current MacOS version found below, you shouldn't have problem on the installation. Otherwise please contact your IT department immediately.

  • MacOS Catalina 10.15.
  • MacOS Big Sur 11.0 and later.
  • MacOS Monterey 12.0 and later.
  • MacOS Ventura 13.0 and later
  • MacOS Sonoma 14.0 and later

2. Our policy is to support the latest macOS version minus one version earlier.

 

Step 3: System requirements

Resources needed in order to install the agent. Recommended system requirements are:

  • Intel or Apple Silicon Mac (requires Rosetta 2).
  • 250 MB of free disk space.
  • 1 GB or more of memory is recommended.
  • Internet connection: An internet connection is required in order to validate your subscription and receive updates.

 

Step 4: Supported browsers

  • Safari.
  • Chrome.
  • Firefox.
See more
Supported Operating Systems (OS) - Linux

To find out if your Linux servers are compatible with Endpoint Next-Gen Antivirus powered by Crowdstrike, follow below steps.

 

Step 1: Check your current Linux type and version

1. Compare your current Linux type and version with below supported Linux list. If your current Linux version found below, you shouldn't have problem on the installation. Otherwise please contact your IT department immediately. These are the supported Linux OS (x86_64 versions):

 

Alma Linux

  • 8.4 (supported kernels are the same as RHEL).

Amazon Linux

  • 2(x86).
  • 2 (with Cloud ML support on Graviton1 and Graviton2 ARM processors).

Amazon Linux AMI

  • 2018.03.
  • 2017.09.
  • CentOS.
  • 8.0 – 8.5.
  • 7.4 – 7.9.
  • 6.7 – 6.10.

Debian

  • 10.
  • 9.1 – 9.4.

Oracle Linux

  • Oracle Linux 8 – UEK 6.
  • Oracle Linux 7 – UEK 3, 4, 5, 6.
  • Oracle Linux 6 – UEK 3, 4.
  • Red Hat Compatible Kernels (supported RHCK kernels are the same as for RHEL).

Red Hat Enterprise Linux (RHEL)

  • 8.0 – 8.5.
  • 7.4 – 7.9.
  • 6.7 – 6.10.

Rocky Linux

  • 8.4 (supported kernels are the same as RHEL).

SUSE Linux Enterprise (SLES)

  • 15 – 15.3.
  • 12.2 – 12.5.
  • 11.4.

Ubuntu

  • 20.04 LTS.
  • 18 AWS.
  • 18.04 LTS.
  • 16 – AWS.
  • 16.04 LTS.

Docker

  • Amazon Linux 2
    • requires sensor 5.34+
  • Amazon Linux 2018.03
  • CentOS7 and RHEL 7
  • Debian 9.4 – requires sensor 5.33.9804+
  • SLES 12 SP3
  • SLES 12 SP4 and SLES 15
  • SLES 12 SP5
  • Ubuntu 14.04, 16.04, and 18.04

Linux

These are the supported Linux OS:

 

Alma Linux

  • 8.4 (supported kernels are the same as RHEL).

Amazon Linux

  • 2(x86).
  • 2 (with Cloud ML support on Graviton1 and Graviton2 ARM processors).

Amazon Linux AMI

  • 2018.03.
  • 2017.09.
  • CentOS.
  • 8.0 – 8.5.
  • 7.4 – 7.9.
  • 6.7 – 6.10.

Debian

  • 10.
  • 9.1 – 9.4.

Oracle Linux

  • Oracle Linux 8 – UEK 6.
  • Oracle Linux 7 – UEK 3, 4, 5, 6.
  • Oracle Linux 6 – UEK 3, 4.
  • Red Hat Compatible Kernels (supported RHCK kernels are the same as for RHEL).

Red Hat Enterprise Linux (RHEL)

  • 8.0 – 8.5.
  • 7.4 – 7.9.
  • 6.7 – 6.10.

Rocky Linux

  • 8.4 (supported kernels are the same as RHEL).

SUSE Linux Enterprise (SLES)

  • 15 – 15.3.
  • 12.2 – 12.5.
  • 11.4.

Ubuntu

  • 20.04 LTS.
  • 18 AWS.
  • 18.04 LTS.
  • 16 – AWS.
  • 16.04 LTS.

Docker

Please note that Docker is supported on the following Linux OSes only:

  • Amazon Linux 2
    • requires sensor 5.34+
  • Amazon Linux 2018.03
  • CentOS7 and RHEL 7
  • Debian 9.4 – requires sensor 5.33.9804+
  • SLES 12 SP3
  • SLES 12 SP4 and SLES 15
  • SLES 12 SP5
  • Ubuntu 14.04, 16.04, and 18.04
See more

Endpoint Protection with EDR and Threat Intelligence powered by Crowdstrike

See all articles
Installing Endpoint Protection with EDR and Threat Intelligence powered by Crowdstrike - Windows

This guide details on how you could perform agent self-installation for Endpoint Protection with EDR and Threat Intelligence powered by Crowdstrike. Before you start installing, please check the supported Windows OS version.

 

Step 1: Download the Windows OS installer

Download from email

1. From the email titled "ArmourZero | Download", click your computer model "I am a Windows user" to start download the installer package.

2. Copy the unique license key.

 

Download from ArmourZero console

1. Go to Subscription under MANAGE section and select the subscription

2. Download the installer package and copy the unique license key.

 

Step 2: Installing Windows OS installer

1. Open the downloaded file, click "Allow"

2. Follow the step by step on the prompt screen.  Check on "I accept the license agreement and privacy notice"

3. Please ensure to paste the license key (User Key) when prompted during the installation process.

4. Click "Install"

Crowdstrike_NGAV_install.gif

 

Congratulation, Crowdstrike's agent is now successfully installed and you are protected with Endpoint Protection with EDR and Threat Intelligence services. Kindly inform your IT department accordingly. 

 

Contact your IT department should you have any further questions or need assistance.

 

 

See more
Installing Endpoint Protection with EDR and Threat Intelligence powered by Crowdstrike - MacOS

This guide details on how you could perform agent self-installation for Endpoint Protection with EDR and Threat Intelligence powered by Crowdstrike. Before you start installing, please check the supported MacOS version.

 

Step 1: Download the MacOS installer

Download from email

1. From the email titled "ArmourZero | Download", click your computer model "I am a MacOS user" to start download the installer package.

Email download EDR CS.png

2. Copy the unique license key.

 

Download from ArmourZero console

1. Go to Subscription under MANAGE section and select the subscription

Subscription EDR CS.png

2. Download the installer package and copy the unique license key.

Console download EDR CS.png

 

Step 2: Installing MacOS installer

1. Open the downloaded file, click "Allow".

2. Follow the step by step on the prompt screen.

Screenshot 2023-08-09 at 2.08.48 PM.png

Screenshot 2023-08-09 at 2.08.57 PM.png

Screenshot 2023-08-09 at 2.09.15 PM.png

Y3FtyCz29R.gif

 

Additional step for MacOs Monterey :-

3. Open terminal. Navigate search, type "Terminal", click on the item.

Screenshot_2022-03-10_at_10.57.22_AM.png

open_terminal.gif

4. In terminal, paste below instruction and click enter :

sudo /Applications/Falcon.app/Contents/Resources/falconctl license <your licence key>

Notes : Replace the <your license key> with the license key in Step 1.

terminal_paste.gif

5. Key in your Mac's password when needed and enter.

6. Security and Privacy will prompt on your screen, click "Allow".

7. Click padlock to made changes and tick Cursor_and_white_tick_blue_square.jpg on Falcon.

Screenshot_2022-03-04_at_5.46.51_PM.png

 

Additional step for MacOs Ventura :-

3. Open terminal. Navigate search, type "Terminal", click on it.  

Screenshot 2023-08-08 at 5.13.21 PM.png

4. In terminal, paste below instruction and click enter :

sudo /Applications/Falcon.app/Contents/Resources/falconctl license your licence key

Notes : Replace the <your license key> with the license key in Step 1.

5. Enable Falcon when asked. Click "OK".

Screenshot 2023-08-08 at 5.18.55 PM.png

6. Alternatively, you can click "Open System Settings" and give permission to Falcon.

Screenshot 2023-08-08 at 5.20.23 PM.png

7. Key in your Mac's password when asked.

Screenshot 2023-08-08 at 5.22.46 PM.png

 

Congratulation, Crowdstrike's agent is now successfully installed and you are protected with Endpoint Protection with EDR and Threat Intelligence services. Kindly inform your IT department accordingly. 

 

Contact your IT department should you have any further questions or need assistance.

See more
Installing Endpoint Protection with EDR and Threat Intelligence powered by Crowdstrike - Linux

This guide details on how you could perform agent self-installation for Endpoint Protection with EDR and Threat Intelligence powered by Crowdstrike. Before you start installing, please check the supported Linux OS version.

 

Step 1: Download the Linux OS installer

Download from ArmourZero console

1. Go to Subscription under MANAGE section and select the subscription

Subscription EDR CS.png

2. Download the installer package and copy the unique license key.

Console download EDR CS.png

 

Step 2: Installing Linux OS installer

1. Turn on the terminal by pressing the super key, go to the left-hand side application pane, and click the "Terminal" icon. Alternatively, you can search for Terminal in the search area and click the "Terminal" icon.

2. Login into Linux host as root before proceeding with the installation.

terminal_guide_2.gif

3. Go to the installer location, substitute <installer_package> with your installer’s file name, and run the command. Use these commands based on your kernel version.

Crowdstrike_install.png

 

Ubuntu:

sudo dpkg -i <installer_package>

 

RHEL, CentOS, Amazon Linux:

sudo yum install <installer_package>

 

SLES:

sudo zypper install <installer_package>

 

4. Substitute <CID> with your CID to set CID on your sensor. Use this command.

sudo /opt/CrowdStrike/falconctl -s --cid=<CID>

Note: Reach out to ArmourZero for the CID key

 

5. Manually start your sensor

Hosts with SysVinit:

service falcon-sensor start

Hosts with Systemd:

systemctl start falcon-

 

Congratulation, Crowdstrike's agent is now successfully installed and you are protected with Endpoint Protection with EDR and Threat Intelligence powered by Crowdstrike. Kindly inform your IT department accordingly. 

 

See more
Supported Operating Systems (OS) - Windows

To find out if your computers, laptops, or/and servers Windows OS are compatible with Endpoint EDR with Threat Intelligence powered by Crowdstrike, follow below steps.

 

Step 1: Supported Windows OS version

1. Compare your current Windows OS version with below supported Windows OS. If your current Windows OS version found below, you shouldn't have problem on the installation. Otherwise please contact your IT department immediately.

 

64-bit Window Server OS:

  • Server 2022
  • Server Core 2022
  • Server 2019
  • Server Core 2019
  • Server 2016
  • Server Core 2016
  • Server 2012 R2
  • Storage Server 2012 R2
  • Server 2012
  • Server 2008 R2 SP1

 

Microsoft ARM64:

  • Windows 11
  • Windows 10

 

Window Desktop OS:

  • Windows 11 22H2
  • Windows 11 21H2
  • Windows 10 22H2
  • Windows 10 21H2
  • Windows 10 21H1
  • Windows 10 20H2
  • Windows 10 1909
  • Windows 10 1809
  • Windows 10 1607
  • Windows 10 1507
  • Windows 8.1
  • Windows 7 SP1
  • Windows 7 Embedded POS Ready

2. Our policy is to support the latest macOS version minus one version earlier.

 

Step 2: System requirements

  • Processor: Intel Pentium 4 2GHz or higher (processor must support SSE2).
  • Memory: 1 GB on 32-bit systems / 2 GB or more on 64-bit systems.
  • Disk space: 2 GB free disk space.
  • Display with a resolution of 1024 x 768 or higher.
  • Internet Connection: An Internet connection is required to validate your subscription,
    receive product updates, and use cloud-based detection.
  • Javascript must be enabled in the browser settings to enable active block pages.

 

Step 3: Supported browsers

  • Edge (Windows 10). Does not support extensions.
  • Chrome, two latest major versions.
  • Firefox, the two latest major versions.

 

See more
Supported Operating Systems (OS) - MacOS

To find out if your computers, laptops, or/and servers MacOS are compatible with Endpoint Protection with EDR and Threat Intelligence powered by Crowdstrike, follow below steps.

 

Step 1: Check your current MacOS version

1. Click on the Appletype-apple-logo.jpgmenu in the corner of your screen

2. Choose "About this Mac". You will see the name and version of MacOS

 

Step 2: Supported MacOS version

1. Compare your current MacOS version with below supported MacOS. If your current MacOS version found below, you shouldn't have problem on the installation. Otherwise please contact your IT department immediately.

  • MacOS Catalina 10.15.
  • MacOS Big Sur 11.0 and later.
  • MacOS Monterey 12.0 and later.
  • MacOS Ventura 13.0 and later
  • MacOS Sonoma 14.0 and later

2. Our policy is to support the latest macOS version minus one version earlier.

 

Step 3: System requirements

Resources needed in order to install the agent. Recommended system requirements are:

  • Intel or Apple Silicon Mac (requires Rosetta 2).
  • 250 MB of free disk space.
  • 1 GB or more of memory is recommended.
  • Internet connection: An internet connection is required in order to validate your subscription and receive updates.

 

Step 4: Supported browsers

  • Safari.
  • Chrome.
  • Firefox.
See more
Supported Operating Systems (OS) - Linux

To find out if your Linux servers are compatible with Endpoint Protection with EDR and Threat Intelligence powered by Crowdstrike, follow below steps.

 

Step 1: Check your current Linux type and version

1. Compare your current Linux type and version with below supported Linux list. If your current Linux version found below, you shouldn't have problem on the installation. Otherwise please contact your IT department immediately. These are the supported Linux OS (x86_64 versions):

 

Alma Linux

  • 8.4 (supported kernels are the same as RHEL).

Amazon Linux

  • 2(x86).
  • 2 (with Cloud ML support on Graviton1 and Graviton2 ARM processors).

Amazon Linux AMI

  • 2018.03.
  • 2017.09.
  • CentOS.
  • 8.0 – 8.5.
  • 7.4 – 7.9.
  • 6.7 – 6.10.

Debian

  • 10.
  • 9.1 – 9.4.

Oracle Linux

  • Oracle Linux 8 – UEK 6.
  • Oracle Linux 7 – UEK 3, 4, 5, 6.
  • Oracle Linux 6 – UEK 3, 4.
  • Red Hat Compatible Kernels (supported RHCK kernels are the same as for RHEL).

Red Hat Enterprise Linux (RHEL)

  • 8.0 – 8.5.
  • 7.4 – 7.9.
  • 6.7 – 6.10.

Rocky Linux

  • 8.4 (supported kernels are the same as RHEL).

SUSE Linux Enterprise (SLES)

  • 15 – 15.3.
  • 12.2 – 12.5.
  • 11.4.

Ubuntu

  • 20.04 LTS.
  • 18 AWS.
  • 18.04 LTS.
  • 16 – AWS.
  • 16.04 LTS.

Docker

  • Amazon Linux 2
    • requires sensor 5.34+
  • Amazon Linux 2018.03
  • CentOS7 and RHEL 7
  • Debian 9.4 – requires sensor 5.33.9804+
  • SLES 12 SP3
  • SLES 12 SP4 and SLES 15
  • SLES 12 SP5
  • Ubuntu 14.04, 16.04, and 18.04
See more

Endpoint Antivirus powered by WithSecure

See all articles
Installing Endpoint Antivirus powered by WithSecure - Windows

This guide details on how you could perform agent self-installation for Endpoint Next-Gen Antivirus powered by Crowdstrike. Before you start installing, please check the supported Windows OS version.

 

Notes:

WithSecure is formerly known as F-Secure

 

Step 1: Download the Windows OS installer

Download from email

1. From the email titled "ArmourZero | Download", click your computer model "I am a Windows user" to start download the installer package.

2. Copy the unique license key.

 

Download from ArmourZero console

1. Go to Subscription under MANAGE section and select the subscription

2. Download the installer package and copy the unique license key.

 

Step 2: Installing Windows OS installer

1. Open the downloaded file, click "Allow"

2. Follow the step by step on the prompt screen. 

3. Select the language and click "Agree and Continue" after you have read the End User License Term in the installer

4. The installer will automatically install the agent into your computer

5. A restart may be required after installation. Restart your computer to complete the installation process

After your computer has finished installing the agent, you can check the agent by clicking on the agent icon on the taskbar of your computer

F_Secure_App.gif

 

Congratulation, WithSecure's agent is now successfully installed and you are protected with Endpoint Antivirus services. Kindly inform your IT department accordingly. 

 

Contact your IT department should you have any further questions or need assistance.

 

See more
Installing Endpoint Antivirus powered by WithSecure - MacOS

This guide details on how you could perform agent self-installation for Endpoint Antivirus powered by WithSecure. Before you start installing, please check the supported MacOS version.

 

Notes:

WithSecure is formerly known as F-Secure

 

Step 1: Download the MacOS installer

Download from email

1. From the email titled "ArmourZero | Download", click your computer model "I am a MacOS user" to start download the installer package.

2. Copy the unique license key.

 

Download from ArmourZero console

1. Go to Subscription under MANAGE section and select the subscription

2. Download the installer package and copy the unique license key.

 

Step 2: Installing MacOS installer

1. Open the downloaded file, click "Allow".

2. Follow the step by step on the prompt screen. Move the installer to trash when you are done with installation to save your computer space.

Screenshot 2023-08-09 at 3.33.05 PM.png

Screenshot 2023-08-09 at 3.33.34 PM.pngScreenshot 2023-08-09 at 3.33.05 PM.pngScreenshot 2023-08-09 at 3.33.50 PM.png

42bcb5ed-a426-4b59-a7f8-7553b1277a82.gif

3. Paste the license key when prompted during the installation process. 

Screenshot 2023-08-09 at 3.15.27 PM.png

 

Additional step for MacOS Monterey & Ventura :-

4. Open the WithSecure Computer Protection

5. Follow the following step to allow full disk access for your Mac.

Full_disk_access.gif

6. Open the F-Secure Computer Protection again, click "Set up now" to set up safari browser extension

Screenshot_2022-03-11_at_4.41.42_PM.png

safari_extension.gif

7. Start scanning to confirm your installation. It might take some times to scan all your files. 

start_scan.gif

 

Congratulation, WithSecure's agent is now successfully installed and you are protected with Endpoint Antivirus services. Kindly inform your IT department accordingly. 

 

Contact your IT department should you have any further questions or need assistance.

 
See more
Installing Endpoint Antivirus powered by WithSecure - Linux

This guide details on how you could perform agent self-installation for Endpoint Next-Gen Antivirus powered by WithSecure. Before you start installing, please check the supported Linux OS version.

 

Notes:

WithSecure is formerly known as F-Secure

 

Step 1: Download the Linux OS installer

Download from ArmourZero console

1. Go to Subscription under MANAGE section and select the subscription

2. Download the installer package and copy the unique license key.

Console download AV WS.png

 

Step 2: Installing Linux OS installer

1. Turn on the terminal by pressing the super key, go to the left-hand side application pane, and click the "Terminal" icon. Alternatively, you can search for Terminal in the search area and click the "Terminal" icon.

2. Login into Linux host as root before proceeding with the installation.

terminal_guide_2.gif

Notes

There are 3 different packages depending on your system which are

  • DEB Package - for Debian and Ubuntu systems
  • RPM Package - for Red Hat Enterprise Linux, CentOS, Oracle Linux, Amazon Linux, and SUSE Linux Enterprise Server systems

WithSecure installer - automatically install and activates the account on suitable systems

3. Navigate to the installer location. To install the program, run the command depending on the package downloaded

  • DEB Package: dpkg -i f-secure-linuxsecurity.deb
  • RPM Package: rpm -Uvh f-secure-linuxsecurity.rpm
  • WithSecure installer: ./f-secure-linuxsecurity-installer --subscription-key SUBSCRIPTION-KEY

fsecure_install.jpg

Notes

When using the WithSecure installer, a licence key can be used by renaming the file, for example:

f-secure-linuxsecurity-installer-[SUBSCRIPTION-KEY]

This action will prevent running the installation package with additional command-line arguments.

 

Congratulation, WithSecure's agent is now successfully installed and you are protected with Endpoint Antivirus services. Kindly inform your IT department accordingly. 

 

Contact your IT department should you have any further questions or need assistance.

See more
Supported Operating Systems (OS) - Windows

To find out if your computers, laptops, or/and servers Windows OS are compatible with Endpoint Antivirus powered by WithSecure, follow below steps.

 

Step 1: Supported Windows OS version

1. Compare your current Windows OS version with below supported Windows OS. If your current Windows OS version found below, you shouldn't have problem on the installation. Otherwise please contact your IT department immediately.

 

Window Server OS:

  • Microsoft® Windows Server 2016 Standard
  • Microsoft® Windows Server 2016 Essentials
  • Microsoft® Windows Server 2016 Datacenter
  • Microsoft® Windows Server 2016 Core
  • Microsoft® Windows Server 2019 Standard
  • Microsoft® Windows Server 2019 Essentials
  • Microsoft® Windows Server 2019 Datacenter
  • Microsoft® Windows Server 2019 Core
  • Microsoft® Windows Server 2022 Standard
  • Microsoft® Windows Server 2022 Essentials
  • Microsoft® Windows Server 2022 Datacenter
  • Microsoft® Windows Server 2022 Core

Notes:

All operating systems are required to have the latest Service Pack installed and they must have TLS 1.2 configured and enabled. Also, make sure that the Turn off Automatic Root Certificate Update option in Microsoft Group Policy is turned off to allow establishing TLS connections. The operating systems must support Microsoft Azure Code Signing certificates

The client requires .NET Framework 4.7.2 and installs it automatically if it is missing.

 

Window Desktop OS:

  • Microsoft Windows 10 (all 32-bit and 64-bit editions, including Windows 10 IoT Enterprise)
  • Microsoft Windows 11 (all editions)

 

Step 2: System requirements

The recommended system requirements are:

  • Processor: Intel Pentium 4 2GHz or higher (processor must support SSE2).
  • Memory: 1 GB on 32-bit systems / 2 GB or more on 64-bit systems.
  • Disk space: 2 GB free disk space.
  • Display with a resolution of 1024 x 768 or higher.
  • Internet Connection: An Internet connection is required to validate your subscription,
    receive product updates, and use cloud-based detection.
  • Javascript must be enabled in the browser settings to enable active block pages.

 

Step 3: Supported browsers

  • Microsoft Edge.
  • Chrome, two latest major versions.
  • Firefox, the two latest major versions.

 

See more
Supported Operating Systems (OS) - MacOS

To find out if your computers, laptops, or/and servers MacOS are compatible with Endpoint Antivirus powered by WithSecure, follow below steps.

 

Step 1: Check your current MacOS version

1. Click on the Appletype-apple-logo.jpgmenu in the corner of your screen

2. Choose "About this Mac". You will see the name and version of MacOS

 

Step 2: Supported MacOS version

1. Compare your current MacOS version with below supported MacOS. If your current MacOS version found below, you shouldn't have problem on the installation. Otherwise please contact your IT department immediately.

  • MacOS Catalina 10.15.
  • MacOS Big Sur 11.0 and later.
  • MacOS Monterey 12.0 and later.
  • MacOS Ventura 13.0 and later
  • MacOS Sonoma 14.0 and later

2. Our policy is to support the latest macOS version minus one version earlier.

 

Step 3: System requirements

Resources needed in order to install the agent. Recommended system requirements are:

  • Intel or Apple Silicon Mac (requires Rosetta 2).
  • 250 MB of free disk space.
  • 1 GB or more of memory is recommended.
  • Internet connection: An internet connection is required in order to validate your subscription and receive updates.

 

Step 4: Supported browsers

  • Safari
  • Chrome
  • Firefox
See more
Supported Operating Systems (OS) - Linux

To find out if your Linux servers are compatible with Endpoint Antivirus powered by WithSecure, follow below steps.

 

Step 1: Check your current Linux type and version

1. Compare your current Linux type and version with below supported Linux list. If your current Linux version found below, you shouldn't have problem on the installation. Otherwise please contact your IT department immediately.

 

32-bit Linux distributions:

  • CentOS 6.7 - 6.x
  • Debian 7.10 - 7.x
  • Debian 8.5 - 8.x *
  • Debian 9.2 - 9.x
  • Oracle Linux 6.7 - 6.x RHCK and UEK **
  • RHEL 6.7 - 6.x
  • SUSE Linux Enterprise Server 11 SP3, SP4
  • Ubuntu 14.04.4 - 14.04.x
  • Ubuntu 16.04.0 - 16.04.x

 

64-bit (AMD64/EM64T) distributions:

  • Amazon Linux 2017.03, 2017.09, 2018.3
  • CentOS 6.7 - 6.x
  • CentOS 7.1 - 7.x ***
  • Debian 7.10 - 7.x
  • Debian 8.5 - 8.x *
  • Debian 9.2 - 9.x
  • Oracle Linux 6.7 - 6.x RHCK and UEK **
  • Oracle Linux 7.2 - 7.x RHCK and UEK **
  • RHEL 6.7 - 6.x
  • RHEL 7.2 - 7.x ***
  • SUSE Linux Enterprise Server 11 SP3, SP4
  • SUSE Linux Enterprise Server 12, 12 SP1 - 12 SP5
  • Ubuntu 14.04.4 - 14.04.x
  • Ubuntu 16.04.0 - 16.04.x
  • Ubuntu 18.04.0 - 18.04.x ****

The on-access scanning is not supported on Debian 8 because its kernel configuration has fanotify only partially enabled.

 

RHCK: Red Hat Compatible Kernel, UEK: Unbreakable Enterprise Kernel

The on-access scanning is supported on RHEL/CentOS 7.x only with a current kernel update (kernel-3.10.0-327.36.1.el7 or later) that fixes a critical bug in the fanotify subsystem.

 

Notes:

Linux Security firewall is not compatible with Ubuntu 18.04 and Ubuntu 18.04.1. We recommend that you disable the firewall and use the firewall service that is provided with the operating system.

 

See more

Endpoint Protection with EDR powered by WithSecure

See all articles
Installing Endpoint Protection with EDR powered by WithSecure - Windows

This guide details on how you could perform agent self-installation for Endpoint Protection with EDR powered by WithSecure. Before you start installing, please check the supported Windows OS version.

 

Notes:

WithSecure is formerly known as F-Secure

 

Step 1: Download the Windows OS installer

Download from email

1. From the email titled "ArmourZero | Download", click your computer model "I am a Windows user" to start download the installer package.

Email download EDR WS.png

2. Copy the unique license key.

 

Download from ArmourZero console

1. Go to Subscription under MANAGE section and select the subscription

2. Download the installer package and copy the unique license key.

Console download EDR WS.png

 

Step 2: Installing Windows OS installer

1. Open the downloaded file, click "Allow"

2. Follow the step by step on the prompt screen. 

3. Select the language and click "Agree and Continue" after you have read the End User License Term in the installer

4. The installer will automatically install the agent into your computer

5. A restart may be required after installation. Restart your computer to complete the installation process

After your computer has finished installing the agent, you can check the agent by clicking on the agent icon on the taskbar of your computer

F_Secure_App.gif

 

Congratulation, WithSecure's agent is now successfully installed and you are protected with Endpoint Protection with EDR services. Kindly inform your IT department accordingly. 

 

Contact your IT department should you have any further questions or need assistance.

 

See more
Installing Endpoint Protection with EDR powered by WithSecure - MacOS
See more
Installing Endpoint Protection with EDR powered by WithSecure - Linux

This guide details on how you could perform agent self-installation for Endpoint Protection with EDR powered by WithSecure. Before you start installing, please check the supported Linux OS version.

 

Notes:

WithSecure is formerly known as F-Secure

 

Step 1: Download the Linux OS installer

Download from ArmourZero console

1. Go to Subscription under MANAGE section and select the subscription

2. Download the installer package and copy the unique license key.

Console download EDR WS.png

 

Step 2: Installing Linux OS installer

1. Turn on the terminal by pressing the super key, go to the left-hand side application pane, and click the "Terminal" icon. Alternatively, you can search for Terminal in the search area and click the "Terminal" icon.

2. Login into Linux host as root before proceeding with the installation.

terminal_guide_2.gif

Notes

There are 3 different packages depending on your system which are

  • DEB Package - for Debian and Ubuntu systems
  • RPM Package - for Red Hat Enterprise Linux, CentOS, Oracle Linux, Amazon Linux, and SUSE Linux Enterprise Server systems

WithSecure installer - automatically install and activates the account on suitable systems

3. Navigate to the installer location. To install the program, run the command depending on the package downloaded

  • DEB Package: dpkg -i f-secure-linuxsecurity.deb
  • RPM Package: rpm -Uvh f-secure-linuxsecurity.rpm
  • WithSecure installer: ./f-secure-linuxsecurity-installer --subscription-key SUBSCRIPTION-KEY

fsecure_install.jpg

Notes

When using the WithSecure installer, a licence key can be used by renaming the file, for example:

f-secure-linuxsecurity-installer-[SUBSCRIPTION-KEY]

This action will prevent running the installation package with additional command-line arguments.

 

Congratulation, WithSecure's agent is now successfully installed and you are protected with Endpoint Protection with EDR services. Kindly inform your IT department accordingly. 

 

Contact your IT department should you have any further questions or need assistance.

 

See more
Supported Operating Systems (OS) - Windows

To find out if your computers, laptops, or/and servers Windows OS are compatible with Endpoint Protection with EDR powered by WithSecure, follow below steps.

 

Step 1: Supported Windows OS version

1. Compare your current Windows OS version with below supported Windows OS. If your current Windows OS version found below, you shouldn't have problem on the installation. Otherwise please contact your IT department immediately.

 

Window Server OS:

  • Microsoft® Windows Server 2016 Standard
  • Microsoft® Windows Server 2016 Essentials
  • Microsoft® Windows Server 2016 Datacenter
  • Microsoft® Windows Server 2016 Core
  • Microsoft® Windows Server 2019 Standard
  • Microsoft® Windows Server 2019 Essentials
  • Microsoft® Windows Server 2019 Datacenter
  • Microsoft® Windows Server 2019 Core
  • Microsoft® Windows Server 2022 Standard
  • Microsoft® Windows Server 2022 Essentials
  • Microsoft® Windows Server 2022 Datacenter
  • Microsoft® Windows Server 2022 Core

Notes:

All operating systems are required to have the latest Service Pack installed and they must have TLS 1.2 configured and enabled. Also, make sure that the Turn off Automatic Root Certificate Update option in Microsoft Group Policy is turned off to allow establishing TLS connections. The operating systems must support Microsoft Azure Code Signing certificates

The client requires .NET Framework 4.7.2 and installs it automatically if it is missing.

 

Window Desktop OS:

  • Microsoft Windows 10 (all 32-bit and 64-bit editions, including Windows 10 IoT Enterprise)
  • Microsoft Windows 11 (all editions)

 

Step 2: System requirements

The recommended system requirements are:

  • Processor: Intel Pentium 4 2GHz or higher (processor must support SSE2).
  • Memory: 1 GB on 32-bit systems / 2 GB or more on 64-bit systems.
  • Disk space: 2 GB free disk space.
  • Display with a resolution of 1024 x 768 or higher.
  • Internet Connection: An Internet connection is required to validate your subscription,
    receive product updates, and use cloud-based detection.
  • Javascript must be enabled in the browser settings to enable active block pages.

 

Step 3: Supported browsers

  • Microsoft Edge.
  • Chrome, two latest major versions.
  • Firefox, the two latest major versions.

 

See more
Supported Operating Systems (OS) - MacOS

To find out if your computers, laptops, or/and servers MacOS are compatible with Endpoint Protection with EDR powered by WithSecure, follow below steps.

 

Step 1: Check your current MacOS version

1. Click on the Appletype-apple-logo.jpgmenu in the corner of your screen

2. Choose "About this Mac". You will see the name and version of MacOS

 

Step 2: Supported MacOS version

1. Compare your current MacOS version with below supported MacOS. If your current MacOS version found below, you shouldn't have problem on the installation. Otherwise please contact your IT department immediately.

  • MacOS Catalina 10.15.
  • MacOS Big Sur 11.0 and later.
  • MacOS Monterey 12.0 and later.
  • MacOS Ventura 13.0 and later
  • MacOS Sonoma 14.0 and later

2. Our policy is to support the latest macOS version minus one version earlier.

 

Step 3: System requirements

Resources needed in order to install the agent. Recommended system requirements are:

  • Intel or Apple Silicon Mac (requires Rosetta 2).
  • 250 MB of free disk space.
  • 1 GB or more of memory is recommended.
  • Internet connection: An internet connection is required in order to validate your subscription and receive updates.

 

Step 4: Supported browsers

  • Safari
  • Chrome
  • Firefox

 

See more
Supported Operating Systems (OS) - Linux

To find out if your Linux servers are compatible with Endpoint Protection with EDR powered by WithSecure, follow below steps.

 

Step 1: Check your current Linux type and version

1. Compare your current Linux type and version with below supported Linux list. If your current Linux version found below, you shouldn't have problem on the installation. Otherwise please contact your IT department immediately.

 

32-bit Linux distributions:

  • CentOS 6.7 - 6.x
  • Debian 7.10 - 7.x
  • Debian 8.5 - 8.x *
  • Debian 9.2 - 9.x
  • Oracle Linux 6.7 - 6.x RHCK and UEK **
  • RHEL 6.7 - 6.x
  • SUSE Linux Enterprise Server 11 SP3, SP4
  • Ubuntu 14.04.4 - 14.04.x
  • Ubuntu 16.04.0 - 16.04.x

 

64-bit (AMD64/EM64T) distributions:

  • Amazon Linux 2017.03, 2017.09, 2018.3
  • CentOS 6.7 - 6.x
  • CentOS 7.1 - 7.x ***
  • Debian 7.10 - 7.x
  • Debian 8.5 - 8.x *
  • Debian 9.2 - 9.x
  • Oracle Linux 6.7 - 6.x RHCK and UEK **
  • Oracle Linux 7.2 - 7.x RHCK and UEK **
  • RHEL 6.7 - 6.x
  • RHEL 7.2 - 7.x ***
  • SUSE Linux Enterprise Server 11 SP3, SP4
  • SUSE Linux Enterprise Server 12, 12 SP1 - 12 SP5
  • Ubuntu 14.04.4 - 14.04.x
  • Ubuntu 16.04.0 - 16.04.x
  • Ubuntu 18.04.0 - 18.04.x ****

The on-access scanning is not supported on Debian 8 because its kernel configuration has fanotify only partially enabled.

 

RHCK: Red Hat Compatible Kernel, UEK: Unbreakable Enterprise Kernel

The on-access scanning is supported on RHEL/CentOS 7.x only with a current kernel update (kernel-3.10.0-327.36.1.el7 or later) that fixes a critical bug in the fanotify subsystem.

 

Notes:

Linux Security firewall is not compatible with Ubuntu 18.04 and Ubuntu 18.04.1. We recommend that you disable the firewall and use the firewall service that is provided with the operating system.

See more

Patch Management powered by Automox

See all articles
Installing Patch Management powered by Automox - Windows

This guide details on how you could perform agent self-installation for Patch Management powered by Automox. Before you start installing, please check the supported Windows OS version.

 

Step 1: Download the Windows OS installer

Download from email

1. From the email titled "ArmourZero | Download", click your computer model "I am a Windows user" to start download the installer package.

Patch Automox installer.png

2. Copy the unique license key.

 

Download from ArmourZero console

1. Go to Subscription under MANAGE section and select the subscription.

Patch Automox Subscription.png

2. Download the installer package and copy the unique license key.

Patch Automox console download.png

 

Step 2: Installing Windows OS installer

1. Open the downloaded file, click "Allow".

2. Please ensure to paste the license key (User Key) when prompted during the installation process.

3. Follow the step by step on the prompt screen.  Check on "I accept the terms in the License Agreement".

4. Click "Install".

Automox_Agent_Install.gif

 

Congratulation, Automox's agent is now successfully installed and you are protected with Patch Management services. Kindly inform your IT department accordingly. 

 

Contact your IT department should you have any further questions or need assistance.

 

See more
Installing Patch Management powered by Automox - MacOS

This guide details on how you could perform agent self-installation for Endpoint Patch Management powered by Automox. Before you start installing, please check the supported MacOS version.

 

Step 1: Download the MacOS installer

Download from email

1. From the email titled "ArmourZero | Download", click your computer model "I am a MacOS user" to start download the installer package.

2. Copy the unique license key.

 

Download from ArmourZero console

1. Go to Subscription under MANAGE section and select the subscription

2. Download the installer package and copy the unique license key.

 

Step 2: Installing MacOS installer

1. Open the downloaded file, click "Allow".

2. Follow the step by step on the prompt screen.

auAiB23YQu.gif

3. Insert the license key (Automox Licence Key) when prompted during the installation process. 

4. Key in your Mac's password when asked.

1nPOTWKthG.gif

 

Compulsory additional steps for MacBook M1 user

Screenshot_2022-03-14_at_4.49.15_PM.png

1. Open terminal. Navigate search, type "Terminal", click on the item.

Screenshot_2022-03-10_at_10.57.22_AM.pngopen_terminal.gif

2. Copy the following command, and paste it in your terminal. click "Enter"

sudo /usr/local/bin/amagent --automox-service-account enable 

 

3. Key in your Mac's password and click "Enter".

paste_sudo_1.gif

4. Copy and paste the second command. Click "Enter".

sudo /usr/local/bin/amagent --automox-user-prompt enable 

second_command.gif

 

Congratulation, Automox's agent is now successfully installed and you are protected with Patch Management services. Kindly inform your IT department accordingly. 

 

Contact your IT department should you have any further questions or need assistance.

 

See more
Installing Patch Management powered by Automox - Linux

This guide details on how you could perform agent self-installation for Patch Management powered by Automox. Before you start installing, please check the supported Linux OS version.

 

Step 1: Download the Linux OS installer

Download from ArmourZero console

1. Go to Subscription under MANAGE section and select the subscription.

Patch Automox Subscription.png

2. Download the installer package and copy the unique license key.

Patch Automox console download.png

 

Step 2: Installing Linux OS installer

1. Turn on the terminal by pressing the super key, go to the left-hand side application pane, and click the "Terminal" icon. Alternatively, you can search for Terminal in the search area and click the "Terminal" icon.

2. Login into Linux host as root before proceeding with the installation.

terminal_guide_2.gif

3. Replace the "YOUR-LICENCE-KEY" with your licence key that you copied and run this command on your terminal to start the installation.

curl -sS https://console.automox.com/downloadInstaller?accesskey=YOUR-LICENCE-KEY | sudo bash

Avanan_install.jpeg

4. Finally, to start your agent, use the command below 

sudo service amagent start

Avanan_start.jpg

 

Congratulation, Automox's agent is now successfully installed and you are protected with Patch Management services. Kindly inform your IT department accordingly. 

 

Contact your IT department should you have any further questions or need assistance.

See more
Supported Operating Systems (OS) - Windows

To find out if your computers, laptops, or/and servers Windows OS are compatible with Patch Management powered by Automox, follow below steps.

 

Step 1: Supported Windows OS version

1. Compare your current Windows OS version with below supported Windows OS. If your current Windows OS version found below, you shouldn't have problem on the installation. Otherwise please contact your IT department immediately.

  • Windows 10, 10S, and 11

  • Windows Server 2012 R2, 2016, 2019, and 2022

 

Step 2: System requirements

Resources needed in order to install the agent. Recommended system requirements are:

  • Processor: < 1% (may varies based on agent activities)
  • Memory: 10 MB (may varies based on agent activities)
  • Disk space: 20 MB
  • Internet Connection: An Internet connection is required to validate your subscription,
    receive product updates, and use cloud-based detection.

 

Step 3: Supported browsers

  • Edge (Windows 10). Does not support extensions
  • Chrome, two latest major versions
  • Firefox, the two latest major versions
  • Safari

 

See more
Supported Operating Systems (OS) - MacOS

To find out if your computers, laptops, or/and servers MacOS are compatible with Patch Management powered by Automox, follow below steps.

 

Step 1: Check your current MacOS version

1. Click on the Appletype-apple-logo.jpgmenu in the corner of your screen

2. Choose "About this Mac". You will see the name and version of MacOS

 

Step 2: Supported MacOS version

1. Compare your current MacOS version with below supported MacOS. If your current MacOS version found below, you shouldn't have problem on the installation. Otherwise please contact your IT department immediately.

 

See more
Supported Operating Systems (OS) - Linux

To find out if your Linux servers are compatible with Patch Management powered by Automox, follow below steps.

 

Step 1: Check your current Linux type and version

1. Compare your current Linux type and version with below supported Linux list. If your current Linux version found below, you shouldn't have problem on the installation. Otherwise please contact your IT department immediately. These are the supported Linux OS (x86_64 versions):

  • Red Hat Enterprise Linux (RHEL) 7 to 9
  • Suse Linux Enterprise Server (SLES) 15
  • CentOS 7
  • Fedora 36
  • Debian 10 and 11
  • Ubuntu 16, 18, 20, and 22
  • Amazon Linux 2 and 2023
  • AlmaLinux 8 and 9
  • Oracle Linux 8 and 9
  • Rocky Linux 8 and 9

 

Step 2: System requirements

Resources needed in order to install the agent. Recommended system requirements are:

  • Processor: < 1% (may varies based on agent activities)
  • Memory: 10 MB (may varies based on agent activities)
  • Disk space: 5~10 MB
  • Internet Connection: An Internet connection is required to validate your subscription,
    receive product updates, and use cloud-based detection.

 

See more

Web Protection powered by DNSFilter

See all articles
Installing Web Protection powered by DNSFilter - Windows

This guide details on how you could perform agent self-installation for Web Protection powered by DNSFilter. Before you start installing, please check the supported Windows version.

 

Step 1: Download the Windows installer

Download from email

1. From the email titled "ArmourZero | Download", click your computer model "I am a Windows user" to start download the installer package.

2. Click on either 32-bit or 64-bit  to start the download for the Windows installer.

3. If you unsure you are using 32-bit or 64-bit, you may refer to below section "Check your version of Windows".

4. . Copy the unique license key.

 

Download from ArmourZero console

1. Go to Subscription under MANAGE section and select the subscription

2. Download the installer package and copy the unique license key.

 

To check your current Windows version.

1. Open the Settings app by pressing Windows+i.

2. Go to System > About.

3. On the right side, look for the “System type” entry. It will show you two pieces of information— whether you’re using a 32-bit or 64-bit operating system and whether you have a 64-bit capable processor

Screenshot_2022-01-19_at_2.58.50_PM.png

 

Step 2: Installing Windows installer

1. Open the downloaded file.

2. Follow the step by step on the prompt screen.

3. Paste the license key (User Key) when prompted during the installation process. 

DNS_Filter_Install.gif

Notes

The hostname is optional to fill in. If it is left empty, it will use your computer hostname by default.

 

4. Click "Install" and then "Finish" to finish installing DNSFilter.

 

Congratulation, DNSFilter's agent is now successfully installed and you are protected with Web Protection services. Kindly inform your IT department accordingly. 

 

Contact your IT department should you have any further questions or need assistance.

 

See more
Installing Web Protection powered by DNSFilter - MacOS

This guide details on how you could perform agent self-installation for Web Protection powered by DNSFilter. Before you start installing, please check the supported MacOS version.

 

Step 1: Download the MacOS installer

Download from email

1. From the email titled "ArmourZero | Download", click your computer model "I am a MacOS user" to start download the installer package.

2. Copy the unique license key.

 

Download from ArmourZero console

1. Go to Subscription under MANAGE section and select the subscription

2. Download the installer package and copy the unique license key.

 

Step 2: Installing MacOS installer

1. Open the downloaded file, click "Allow".

2. Follow the step by step on the prompt screen.

Screenshot 2023-08-07 at 4.42.29 PM.pngScreenshot 2023-08-07 at 4.43.33 PM.png

3. Paste the license key (Site Secret Key) when prompted during the installation process.

4. Key in your Mac's password when asked.

Screenshot 2023-08-07 at 4.45.05 PM.png

Screenshot 2023-08-07 at 4.46.35 PM.png

5. You should be able to see this logo on your computer now. 

Screenshot_2022-03-11_at_4.53.59_PM.png

 

Congratulation, DNSFilter's agent is now successfully installed and you are protected with Web Protection services. Kindly inform your IT department accordingly. 

 

Contact your IT department should you have any further questions or need assistance.

See more
Installing Web Protection powered by DNSFilter - Linux

No DNSFilter support for Linux operating system. 

See more
Supported Operating Systems (OS) - Windows

To find out if your computers, laptops, or/and servers Windows OS are compatible with Web Protection powered by DNSFilter, follow below steps.

 

Step 1: Supported Windows OS version

1. Compare your current Windows OS version with below supported Windows OS. If your current Windows OS version found below, you shouldn't have problem on the installation. Otherwise please contact your IT department immediately.

 

Window Desktop OS:

  • Windows 10
  • Windows 11
  • Windows .NET Framework 4.5 or higher.

 

Step 2: System requirements

Resources needed in order to install the agent. Recommended system requirements are:

  • Processor: Intel Pentium 4 2GHz or higher (processor must support SSE2).
  • Memory: 1 GB on 32-bit systems / 2 GB or more on 64-bit systems.
  • Disk space: 2 GB free disk space.
  • Display with a resolution of 1024 x 768 or higher.
  • Internet Connection: An Internet connection is required to validate your subscription,
    receive product updates, and use cloud-based detection.
  • Javascript must be enabled in the browser settings to enable active block pages.

 

Step 3: Supported browsers

  • Edge (Windows 10). Does not support extensions.
  • Chrome, two latest major versions.
  • Firefox, the two latest major versions.
See more
Supported Operating Systems (OS) - MacOS

To find out if your computers, laptops, or/and servers MacOS are compatible with Web Protection powered by DNSFilter, follow below steps.

 

Step 1: Check your current MacOS version

1. Click on the Appletype-apple-logo.jpgmenu in the corner of your screen

2. Choose "About this Mac". You will see the name and version of MacOS

 

Step 2: Supported MacOS version

1. Compare your current MacOS version with below supported MacOS. If your current MacOS version found below, you shouldn't have problem on the installation. Otherwise please contact your IT department immediately.

  • MacOS Catalina 10.15.
  • MacOS Big Sur 11.0 and later.
  • MacOS Monterey 12.0 and later.
  • MacOS Ventura 13.0 and later
  • MacOS Sonoma 14.0 and later

 

Step 3: System requirements

Resources needed in order to install the agent. Recommended system requirements are:

  • Intel or Apple Silicon Mac (requires Rosetta 2).
  • 250 MB of free disk space.
  • 1 GB or more of memory is recommended.
  • Internet connection: An internet connection is required in order to validate your subscription and receive updates.

 

Step 4: Supported browsers

  • Safari.
  • Chrome.
  • Firefox.
See more

Devices management

See all articles
Device management introduction

Device administration, keeping track on the movement of devices and end users and ensuring all users are protected all the time is no easy task! Let alone you need to access each of this information with different solution console! The more you deploy, the more complex and tedious to manage.

 

That's not the case when come to ArmourZero! You can now easily manage and track all your endpoints' usage, protected devices and users in single glance. Remember we eliminate silos, everything make easy and simplify for you. 

 

You can access to our Device Management feature under MANAGE section. All devices (based on device's name) will automatically be shown on this device page upon successful installation. You do not need to manually add any devices!

 

You can use this feature for:

1. Inventory management.

2. Keep track of agent's status.

3. End user management.

4. Tracking of subscribed users.

5. Compliance check purposes.

6. Eliminate "ghost" devices (devices that not able to identify or unknown devices) and more.

 

CG40lHJmP5.gif

 

This page displays a summary of subscription usage across devices, providing various available information.

Screenshot 2022-10-11 at 4.45.24 PM.png

Useful information

Status

  • Installed: The agent was successfully installed and in protection mode.

  • Not installed: The agent was not successfully installed, no protection.

Type

  • Server: Endpoint server type.

  • Endpoint: Endpoint laptop, PC, computer type.

 

End Users

On this page, 'End User' refers to individuals using company devices

Screenshot 2023-11-15 at 2.36.11 PM.png

 

Subscription usage and count

On this page, the highlighted in blue boxes show subscription usage and count. The first number indicate the usage of it while the second number represent the total subscribed users.

Screenshot 2023-11-15 at 2.42.59 PM.png

 

Notes: The red color highlight that the usage count was more than subscribed. You can find out more about overly subscription used.

 

See more
How to link devices to end users

After successfully installing the agent on your device, the agent will report back to the console with your device's name. The agent wouldn't know which device belong to which user. 

 

Making sure each device is linking to the right user is important for proper device and inventory management. But this exercise often can be very hassle and tedious in order to administrator and track from time to time. But with ArmourZero, everything make easy and simplify for you.

 

You can use this feature for:

1. Inventory management.

2. End user management.

3. Tracking of subscribed users.

4. Eliminate "ghost" devices (devices that not able to identify or unknown devices).

 

Step 1: Identify the device and link with user

1. Go to Devices under MANAGE section.

2. Toggle to the device that you want to link to an end user. 

3. Click Assign device to end user.jpg at the End-user's column and select "Assign End User".

4. Select an end-user from the dropdown list "Devices belongs to".

Assign device to end user drop down list.jpg

5. Click “Assign”.

 

Notes: If the device owner's name or end-user is not listed in the 'Devices Belongs To' list, add them into the directory.

 

See more
How to monitor your off boarding request

When you submit a request to off board a device, you can monitor the status on the "Off Board Request" tab. Our in-house Security Operation Center (SOC) will be in touch within the next 24 working hours.

 

1. Go to Devices under MANAGE section.

2. Click on the "Off Boarding Request" tab. Our in-house Security Operation Center (SOC) will be in touch within the next 24 working hours for confirmation.

off board request page.png

 

Available statuses are as follows:

Pending: If you've submitted a request for approval, and it hasn't been reviewed or approved yet, the status would be "Pending."

In Progress: If you're submitted a request, and the tasks are actively reviewed the status would be "In Progress".

Completed: This status signifies that the request has been successfully finished or fulfilled. All necessary steps have been taken, and the objectives or requirements have been met.

Screenshot_2022-10-11_at_5.16.01_PM.png

See more
How to off board existing device

Device changes and upgrades for users are very common but that often can be very hassle and tedious in order to administrator and track. Device changes could affect the total usage of active protection users count in the event in which the device is no longer in use but the protection is still active. And over the time, inventory of protected device could be a big mess. But with ArmourZero, everything make easy and simplify for you. 

 

Step 1: Off board (remove) the device

1. Go to Devices under MANAGE section.

2. Toggle to the device that you intend to off board.

3. Click on the three dots action icon 3 dots.jpg,select "Off Board Devices".

Offboard devices.jpg

4. The device could be associated with one or more subscribed protection. You may select the desire service to be removed from this off boarding device. 

5. Click “Request Off Board Selected Devices License/Licenses from Subscriptions”.

5. Click “Yes” to confirm the removal.

Offboard devices from product request confirmation.jpg

6. Our in-house Security Operation Center (SOC) will be in touch within the next 24 working hours for confirmation. Your request is now available "Off Boarding Request" tab.

 

You can easily monitor the off boarding status here

Available statuses are as follows:

Pending: If you've submitted a request for approval, and it hasn't been reviewed or approved yet, the status would be "Pending."

In Progress: If you're submitted a request, and the tasks are actively reviewed the status would be "In Progress".

Completed: This status signifies that the request has been successfully finished or fulfilled. All necessary steps have been taken, and the objectives or requirements have been met.

See more
How to remove protected device and reduce the subscription

In the license purchase world, there is no such thing as reducing the licence subscription whenever the subscription is still active.

 

ArmourZero know this problem very well; thus we introduced true-utility-subscription model in which we allow customers to off board the unused user and we credit back amount to you! The credit amount is based on proration of unused period. This feature only applicable for our direct sign-up customers.

 

Step 1: Off board (remove) the device

1. Go to Devices under MANAGE section.

2. Toggle to the device that you intend to off board.

3. Click on the three dots action icon 3 dots.jpg,select "Off Board Devices".

Offboard devices.jpg

4. The device could be associated with one or more subscribed protection. You may select the desire service to be removed from this off boarding device. 

Offboard devices from product request w credit.jpg

5. Check on the "Request to removal quantity of the licenses". You will see the prorated amount that will credit back to you. Click “Request Off Board Selected Devices License/Licenses from Subscriptions” once confirm.

Offboard devices from product request with credit.jpg

5. Click “Yes” to confirm the removal.

6. Our in-house Security Operation Center (SOC) will be in touch within the next 24 working hours. Your request is now available "Offboarding Request Tab".

 

Once completed, you can check the credit.

See more
Overly used on subscription

When you install an agent on your device, they're automatically recognised and linked to your subscription. You can monitor all protecting devices on the Devices management page.

 

If the number of protecting devices exceeded your total subscribed users, you are subjected to additional user billing. The additional billing will be based on proration towards the same end date of your current subscription. Don't be surprise that our Security Operation Center (SOC) contact you to verify the users usage.

 

Step 1: Check the subscription usage

1. Go to Subscription under MANAGE section.

2. If the number of protecting devices exceeded your total subscribed users, the "Active Users" column will be highlighted in red.

Notes: The first number indicate the usage of it while the second number represent the total subscribed users.

 

Step 2: Check the protecting device list

1. Go to Devices under MANAGE section.

2. Check who and which device have installed the agent.

3. If you found any device or user that shouldn't have protection, you may off board (remove) this device accordingly. 

Notes: You can off board as many devices as you want. If it's a valid usage, our Customer Success team will guide you on how to proceed with the add-on user subscription. 

 

See more

Get in touch

image

Email us

Reach out to our team on any matters

image

Request demo

Request a demo from our consultant

image

Start for free

Sign up for free

Can't find what you're looking for?

Have you any question which is not answered?