MDR for Windows Defender Agent Install Instructions
01/07/2025 0 People found this article helpful 9,960 Views
Description
Please navigate to your device OS for ARR (Active Ready Response) agent installation instructions.
Required Parameters:
Your ARR Instance\ c-name: www.YOURINSTANCE.infocyte.com
Please be certain to replace the *********** in the commands with the Instancename provided to you by your SonicWall Managed Services Engineer.
Your ARR Agent Registration Key (Regkey)
Please be certain to replace the %%%%%%%%% in the commands with the Regkey provided to you by your SonicWall Managed Services Engineer.
Windows Installing Agent
Method 1 - PowerShell command (RECOMMENDED):
-
Ensure to run PSConsole as Administrator if doing a manual install
-
Make sure your current AntiVirus policy does not block PSConsole usage or have Memory protection enabled without the proper Infocyte exclusions placed
- Copy script into PowerShell Console
[System.Net.ServicePointManager]::SecurityProtocol = [Enum]::ToObject([System.Net.SecurityProtocolType], 3072); (new-object Net.WebClient).DownloadString("https://raw.githubusercontent.com/Infocyte/PowershellTools/master/AgentDeployment/install_huntagent.ps1") | iex; installagent *********** %%%%%%%%%
64 Bit Installer
-
Download the installer from:
-
Run the installer using the following command in an elevated command prompt:
agent.windows.exe --url https://***********.infocyte.com --key %%%%%%%%%
32 Bit Installer
-
Download the installer from:
-
Run the installer using the following command in an elevated command prompt:
agent.windows32.exe --url https://***********.infocyte.com --key %%%%%%%%%
Method 3 - Group Policy
Prerequisites:
-
Windows Server 2012 R2 or greater
-
Domain Administrator account
-
Microsoft Windows endpoints
-
File to convert into a Batch file "install_agent.txt"
-
Instancename (provided by SonicWall Managed Services, Inc
-
Regkey (provided by SonicWall Managed Services, Inc)
Getting Ready:
-
Copy the following code into a text editor
@echo off
:: Install Hunt Agent
:: For use in a GPO Startup Script (Note: Logon script will not work as it operates with the user's non-admin permissions)
:: Best Reference for steps: https://www.petri.com/run-startup-script-batch-file-with-administrative-privileges
:: Set "instancename" to the instance name provided by Solutions Granted, Inc
:: Set "regkey" to your registration key provided by Solutions Granted, Inc
set instancename=myinstancename123
set regkey=myregkey123
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -nologo -win 1 -executionpolicy bypass -nop -command "[System.Net.ServicePointManager]::SecurityProtocol = [Enum]::ToObject([System.Net.SecurityProtocolType], 3072); (new-object Net.WebClient).DownloadString('https://raw.githubusercontent.com/Infocyte/PowershellTools/master/AgentDeployment/install_huntagent.ps1') | iex; installagent %instancename% %regkey%"
-
Change the myinstancename123 to the the instancename provided by SonicWall Managed Services, Inc
-
Change the myregkey123 to the regkey provided by SonicWall Managed Services, Inc
-
Save the file as “install_agent.bat”
-
If you use Notepad, you will want to make sure it doesn’t default to “install_agent.bat.txt”
Create the GPO:
-
Open Server Manager and go to Tools > Group Policy Management
-
In Group Policy Management Console select domain and click Group Policy Objects
-
Right-click Group Policy Objects and select New
-
For Name type "Install HUNT Agent" and click OK
-
Right-click the new GPO in the right pane and click Edit
-
In the Group Policy Management Editor window, click Computer Configuration, then Policies, then Scripts. Double-click Startup
-
On the Scripts tab of the Startup Properties box, click Show Files. Copy the "install_agent.bat" file created in the previous Getting Ready section of this article
-
Click Add
-
Click Browse and select the file "install_agent.bat"
-
Click OK
-
Find the Domain or OU that you wish to link to the newly created GPO
-
Right-click it and click Link an Existing GPO
-
Click OK
Your script should now run and install the ARR agent on all machines in the selected group.
Validating Install
- You can validate a successful install if you see the service ‘Infocyte HUNT Agent’ running on the machine
- You can also validate a successful install by searching for the device in the Portal and ensuring it is reporting the latest agent version and in a “Monitored” Status
Uninstall (Windows)
Linux Installation Linux Support for Agent Installation:
- To install the Linux Agent, systemd is required as the default init for the system. This is the default with most modern Linux OS's.
- The check if you are using systemd, type this command:
file /sbin/init
Installing Agent
64-Bit
32-Bit
Validating Install
- Please let us know once you have confirmed a good push and we can provide confirmation of what is registered in the console.
Uninstall (Linux)
Manual Uninstall
MacOS Installation
El Capitan -> Mojave Installing Agent
Open the terminal, navigate to the download folder (or location of downloaded file)
Validating Install (All macOS)
- Run the following command from a macOS terminal:
ps -u root | grep agent
- You should see something similar to the following screenshot.
Uninstall
Manual Uninstall
Catalina –> Monterey Installing Agent
Validating Install (All macOS)
- Run the following command from a macOS terminal:
ps -u root | grep agent
- You should see something similar to the following screenshot.
Uninstall
Manual Uninstall
Ventura –> Sonoma Installing Agent
-
chmod +x rts.macos-catalina.exe
-
sudo ./rts.macos-catalina.exe --url https://***********.infocyte.com --key %%%%%%%%%
- Enter Admin Password when prompted
-
sudo spctl --master-enable
BE CERTAIN TO RUN THE LAST COMMAND TO RE-ENABLE SYSTEM SECURITY
Validating Install
You can use EITHER of the following methods to validate agent is installed and running on the device.
- Look for agent.exe process in the Activity Monitor.
OR
- Run the following command from a macOS terminal:
ps -u root | grep agent
- You should see something similar to the following screenshot.
Uninstall
Manual Uninstall
Infocyte Exclusions Windows
1) C:\windows\temp\infocyte.exe
2) C:\Program Files\Infocyte\Agent
Linux
1) /tmp/infocyte.exe
2) /opt/infocyte/agent
Agent Whitelisting While rare, some AV engines may require the Agent Application folder to be whitelisted in Agent based deployments of Infocyte. You can whitelist the following directories or use the hashes found under the download section to specify the specific files.
Windows:
C:\program files\infocyte\agent
Linux:
/opt/infocyte/
Whitelisting by Hash
You can whitelist in your AV by hash as well assuming it supports this. Our hashes can always be found in the "/admin/downloads" page of your Infocyte console.
Endpoint to Cloud:
- For each agent deployed in your environment, bidirectional communication from TCP port 443 to the URL for your instance must be permitted.
- Infocyte IP Addresses to allow:
- 3.221.153.58
- 3.227.41.20
- 3.229.46.33
- 35.171.204.49
- 52.200.73.72
- 52.87.145.239
- dl.infocyte.com (Amazon CloudFront, IP Range can vary based on location. Recommended for optimal performance)
- *.infocyte.com- This communication is secured with TLS 1.2/1.3 (HTTPS) and applies to both agents and agentless (temporary agents). If you are on a network with SSL Inspection/Decryption you might need to bypass decryption for your instance <CNAME>.infocyte.com, and dl.infocyte.com.
- Required ports for communication with EDR cloud infrastructure
- Brokers communication with EDR cloud infrastructure; can alternatively allowlist *.es.datto.net
- Amazon S3 webhosts for Datto EDR cloud infrastructure
- Additional Exclusions on an as needed basis
- .infocyte.com
- hunt-saas-surveys.s3.amazonaws.com
- hunt-saas-surveys.s3.us-east-1.amazonaws.com
- infocyte-downloads.s3.us-east-1.amazonaws.com
Related Articles
Categories
Was This Article Helpful?
YESNO