ConnectSecure Agent Deployment
Purpose
This solution automates the deployment of the ConnectSecure v4 vulnerability scan agent across Windows and macOS endpoints managed in NinjaRMM. ConnectSecure (formerly CyberCNS) continuously monitors endpoints for vulnerabilities, misconfigurations, and exposure risks; this solution eliminates manual installation by driving deployments entirely through NinjaRMM custom fields.
How it works:
- Authentication values -> Three secure custom fields (
Company ID,Tenant ID, andUser Secret) are populated at the organization, location, or device level. These credentials are sourced from the ConnectSecure portal and authenticate each agent registration automatically. - Deployment targeting -> The cPVAL Connect Secure Agent Deployment drop-down field controls which platforms are eligible for automated installation. Setting this field to a value such as
All,Windows, orMacintoshat the organization level enables deployment for all devices underneath, while setting it toDisableat the location or device level excludes those specific items. - Automated triggering -> Three compound conditions (one per platform tier: Windows Workstation, Windows Server, and macOS) run continuously. Whenever a targeted device does not have the ConnectSecure agent service running, the appropriate automation fires and installs the agent using the stored credentials.
- Forced reinstallation -> If an agent needs to be reinstalled or updated, the
Forceparameter on both automations can be used to bypass the existing-service check and rerun the full installer.
This solution supports deployment scoping at any level of the NinjaRMM hierarchy (organization → location → device), giving granular control over where the agent is deployed.
Associated Content
Custom Fields
| Content | Definition Scope | Required | Type | Function |
|---|---|---|---|---|
| cPVAL Connect Secure Agent Deployment | Organization, Location, Device | True | Drop-Down | Controls which OS platforms receive automatic ConnectSecure agent installation; setting Disable at a location or device excludes it from automated deployment |
| cPVAL Connect Secure Company ID | Organization, Location, Device | True | Secure | Stores the ConnectSecure Company ID that uniquely identifies the organization within the ConnectSecure portal |
| cPVAL Connect Secure Tenant ID | Organization, Location, Device | True | Secure | Stores the top-level Tenant ID for the ConnectSecure environment |
| cPVAL Connect Secure User Secret | Organization, Location, Device | True | Secure | Stores the authentication secret/token required to register the agent with the ConnectSecure portal |
Automations
| Content | Function |
|---|---|
| Deploy ConnectSecure Agent [Windows] | Downloads and deploys the ConnectSecure vulnerability scan agent on Windows endpoints using company-level custom fields for authentication |
| Deploy ConnectSecure Agent [Macintosh] | Downloads and deploys the ConnectSecure vulnerability scan agent on macOS endpoints using company-level custom fields for authentication |
Compound Conditions
| Content | Function |
|---|---|
| Connect Secure Deployment [Windows Workstation] | Triggers the Windows deployment automation on workstations where deployment is enabled but the agent service is not yet detected |
| Connect Secure Deployment [Windows Server] | Triggers the Windows deployment automation on servers where deployment is enabled but the agent service is not yet detected |
| Connect Secure Deployment [Macintosh] | Triggers the macOS deployment automation on Mac computers where deployment is enabled but the agent service is not yet detected |
Implementation
Step 1: Create Custom Fields
- cPVAL Connect Secure Agent Deployment
- cPVAL Connect Secure Company ID
- cPVAL Connect Secure Tenant ID
- cPVAL Connect Secure User Secret
Step 2: Import Automations
- Import the Deploy ConnectSecure Agent [Windows] automation
- Import the Deploy ConnectSecure Agent [Macintosh] automation
Step 3: Create Compound Conditions
- Create the Connect Secure Deployment [Windows Workstation] compound condition and assign it to the
Windows Workstation Policy [Default] - Create the Connect Secure Deployment [Windows Server] compound condition and assign it to the
Windows Server Policy [Default] - Create the Connect Secure Deployment [Macintosh] compound condition and assign it to the
Mac Policy [Default]
Step 4: Populate Authentication Fields
For each organization where ConnectSecure should be deployed, populate the following fields at the organization level (or at the location/device level for more granular control):
- cPVAL Connect Secure Company ID -> Enter the Company ID from the ConnectSecure portal
- cPVAL Connect Secure Tenant ID -> Enter the Tenant ID from the ConnectSecure portal
- cPVAL Connect Secure User Secret -> Enter the authentication secret from the ConnectSecure portal
For instructions on locating these values in the ConnectSecure portal, refer to the ConnectSecure installation guide.
Step 5: Enable Deployment via the Deployment Field
Set the cPVAL Connect Secure Agent Deployment field value at the appropriate scope:
| Value | Effect |
|---|---|
All | Deploys to all Windows (workstations and servers) and macOS endpoints |
Windows | Deploys to all Windows endpoints (workstations and servers) |
Windows Workstation | Deploys to Windows workstations only |
Windows Server | Deploys to Windows servers only |
Windows Workstation and Macintosh | Deploys to Windows workstations and macOS endpoints |
Macintosh | Deploys to macOS endpoints only |
Disable | Excludes this organization, location, or device from automated deployment |
Once the field is set, the compound conditions will automatically detect eligible endpoints and trigger the appropriate automation to install the ConnectSecure agent.
FAQ
1. What does this solution do for me on a daily basis?
It automatically deploys the ConnectSecure agent to eligible endpoints so vulnerability scanning can start without manual installation effort.
2. How do I know whether a device is eligible for deployment?
Check the effective value of cPVAL Connect Secure Agent Deployment for that endpoint. If the selected option includes the endpoint OS, it is eligible.
3. Why did deployment work for one site but not another?
A location or device may have an override value that differs from the organization setting. Lower-level values take priority over higher-level values.
4. Why did a specific endpoint not receive the agent?
Common causes are: endpoint offline, deployment option excludes its OS, secure credential fields are empty/invalid at effective scope, or installer execution was blocked.
5. Will this keep reinstalling the agent every time policies evaluate?
No. The normal behavior is install-if-missing. If the expected agent service is detected, the automation does not reinstall unless forced manually.
6. What happens if the endpoint already has the agent installed?
If the service is present and healthy, the endpoint is treated as compliant and will not be reinstalled during standard runs.
7. Does this solution support both Windows and macOS?
Yes. It supports Windows workstations, Windows servers, and macOS using separate platform-aware conditions and automations.
8. Can I target only servers or only workstations?
Yes. Use the deployment field option that matches your target platform, such as
Windows ServerorWindows Workstation.
9. Can I pause deployment for one location only?
Yes. Set cPVAL Connect Secure Agent Deployment to
Disableat that location.
10. Can I exclude just one endpoint?
Yes. Set cPVAL Connect Secure Agent Deployment to
Disableat the device level.
11. How long after enabling deployment should I expect results?
Deployment occurs when the endpoint checks in and the condition cycle evaluates. Most environments see execution shortly after the next policy/condition pass.
12. What if the credentials were entered incorrectly?
Deployment attempts will fail until valid values are entered in cPVAL Connect Secure Company ID, cPVAL Connect Secure Tenant ID, and cPVAL Connect Secure User Secret.
13. I updated credentials. Will existing installs be affected immediately?
Updated values are used on future deployment attempts. Existing installed agents are not automatically reinstalled unless a forced run is initiated.
14. What if endpoint security software blocks the installer?
The deployment will fail until the block is removed. After allow-listing or policy adjustment, the next run should proceed normally.
15. Can users continue working while deployment happens?
Yes, in most cases. Deployment runs silently in the background, though short spikes in CPU/network usage may occur during download and install.
16. What should I check first if deployment seems stuck?
Verify endpoint online status, OS targeting value, effective credential values, and recent automation activity for errors.
17. Can this solution deploy to Linux devices?
No. This solution currently targets only Windows and macOS endpoints.
18. Is internet access required for deployment?
Yes. Endpoints need outbound connectivity to download and register the ConnectSecure agent.
19. How can I confirm deployment actually ran on a device?
Review the endpoint's automation activity history in NinjaRMM for the corresponding ConnectSecure deployment automation and result details.
20. What should I do when only a small subset of devices fail repeatedly?
Treat those as endpoint-specific issues: compare effective field values, check local security/network restrictions, and run the relevant deployment automation manually for deeper error output.
Changelog
2026-03-16
- Renamed custom field
cPVAL ConnectSecure DeploymenttocPVAL Connect Secure Agent Deploymentand updated its drop-down options. - Changed
cPVAL Connect Secure Company IDandcPVAL Connect Secure Tenant IDfield types fromTexttoSecure. - Added new
cPVAL Connect Secure User Secretcustom field for agent authentication. - Updated Windows and macOS automations to retrieve the user secret from the new custom field, support a
Forceparameter for reinstallation, and use a service-based agent detection method. - Updated all three compound conditions to reference the renamed custom field and updated automations.
- Added FAQs.
2025-12-15
- Initial version of the document