- Knowledge base
- Getting started
- Device Agent
-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
How do I get started with the Device Agent?
The Device Agent is a lightweight agent for devices used in computers, laptops and desktops, as well as servers. The agent detects vulnerability and is used for asset tracking.1. Understand the requirements and limitations
Before you begin, it is important to familiarize yourself with the requirements and limitations of the Device Agent.
https://support.holmsecurity.com/knowledge/what-is-supported-and-what-are-the-limitations-using-the-device-agent
2. Rollout planning and best practices
When planning your rollout across many targets, it is important to allocate a few minutes for careful planning. Holm Security provides a quick recommendation and best practice to consider for this step.
https://support.holmsecurity.com/knowledge/how-do-i-plan-a-rollout-for-a-large-it-environment
3. Configure the Security Center
Before deploying the Device Agent on a large scale, it is crucial to follow the steps in the Security Center to ensure proper configuration.
https://support.holmsecurity.com/knowledge/how-do-i-deploy-a-new-device-agent
Here, we also describe how the token works:
https://support.holmsecurity.com/knowledge/how-does-the-device-agent-deployment-token-work4.
4. Deployment
Using several different products, you can deploy and distribute the MSI across a large environment. Here, we list the procedures based on the most common variants.- Microsoft Endpoint Configuration Manager (ECM) (Previously called Microsoft System Center Configuration Manager (SCCM)): https://support.holmsecurity.com/knowledge/how-do-i-install-a-device-agent-automatically-via-ecm-old-sccm
- Microsoft Azure Intune: https://support.holmsecurity.com/knowledge/how-do-i-install-a-device-agent-automatically-via-intune