Skip to main content

56 docs tagged with "Deployment"

Documents on deploying software and services in various environments

View all tags

Agent Deployment - GPO

This document provides a comprehensive guide on the implementation of the Automate Deploy Group Policy Object (GPO) for ConnectWise Automate. It explains how to create both a startup script GPO and a scheduled task GPO to effectively deploy the Automate agent across devices in a network. The document includes details on user parameters, dependencies, implementation steps, and frequently asked questions.

Agent Monitors - Disk - Remove and Rebuild - ProVal

This document outlines a script that clears existing Disk Monitors from an agent and reinstalls new Disk Monitors, intended for use during the initial deployment of service plans for servers and workstations. The process saves approximately 5 minutes by automating the removal and reinstallation of disk monitors.

Agents Missing Rapid Fire Compliance Manager

This document describes a monitor that detects agents based on the presence of the "Compliance Management Installer Key" and ensures that deployment is enabled. It highlights the importance of not excluding any locations or computers from this monitoring process.

Application - Network Glue Collector

This document provides detailed instructions for the deployment and uninstallation of the Network Glue Collector, including associated scripts and monitors. It outlines the necessary steps for implementation and configuration within the ConnectWise Automate environment.

Available GPOs for Deployment

This document provides a comprehensive overview of the GPO Import Process, detailing the available Group Policy Objects (GPOs) for deployment through the specified script. It includes dependencies and a description of the columns in the dataview.

Bitlocker - Volume - Initialize Autofix,Param - Wrapper

This document provides details on a script designed for the automatic deployment of BitLocker initialization to agents detected by the Internal Monitor for BitLocker. It includes sample runs, dependencies, user parameters, and output details.

BlackPoint - SnapAgent Installer

This document provides a comprehensive guide on the SnapAgent installation script, detailing its dependencies, variables, and ticketing features for efficient deployment and monitoring. It includes sample runs, variable documentation, and logging information to assist in successful implementation.

BlackPoint SnapAgent Deployment

This document outlines a monitor designed to detect online Windows agents where the SnapAgent is not installed. It includes dependencies on specific EDFs for installation confirmation and exclusion criteria, as well as ticketing control through the SnapAgent Installer script.

CRI Agent Deployment

This document outlines the steps to deploy the Cyrisma Censor Application using a custom task in ConnectWise Automate, including script implementation, scheduling, and logging.

CRI Agent Deployment Status Check

This document outlines the steps to create a monitor that generates a ticket for CRI Agent deployment failures, ensuring timely alerts for critical non-impact issues.

CWM - Automate - Script -Automate Agent - InstallRepair - For GPO Globals

This document outlines a PowerShell script designed for creating and managing the Automate agent deployment via Group Policy Objects (GPO). It includes steps for installation, repair, and replacement of the agent, ensuring that it remains up-to-date with a new Installation Token. The guide targets Domain Controllers and provides detailed implementation steps, variable definitions, and expected outputs.

CWM - Automate - Template - MSI Deployment

This document provides a comprehensive guide on utilizing the Template - MSI Deployment for creating a software installation script that employs a .msi file. It includes detailed steps for exporting, duplicating, renaming, and configuring the script, as well as setting dynamic properties and ensuring successful deployment.

Cyrisma

This document provides a comprehensive guide on deploying, monitoring, and auditing the Cyrisma sensor application, including associated tasks, custom fields, and monitoring strategies.

Dell Command Update - Deploy

This document outlines the procedure for deploying Dell Command | Update to an endpoint. It includes steps for downloading the software, installing it, and performing a scan and update based on the configuration specified in the DCU_Config.ps1 file. The document also provides example logs and dependencies for the procedure.

Deploy Huntress Agent

This document outlines the purpose and functionality of the internal monitor designed to detect Windows and Macintosh machines that are missing the Huntress Agent and have deployment enabled. It includes details on dependencies, client-level, location-level, and computer-level EDFs, as well as the alert template for deploying the Huntress Agent.

Deploy Perch Log Shipper

This document outlines a monitor designed to detect Windows machines that are missing the Perch Log Shipper. It details the necessary client-level EDF settings required to initiate the installation on targeted machines, including the deployment and installation codes needed for successful implementation.

Deploy Perch Log Shipper

This document provides a comprehensive guide on deploying the Perch Log Shipper on Windows machines, detailing the necessary client-level and location-level EDFs, dependencies, and output generated during the installation process.

Deploy PerchLogShipper

This document outlines the steps to deploy Perch Log Shipper on Windows machines, detailing associated scripts and monitors needed for effective implementation.

Deploy Rapid Fire Compliance Management

This document outlines the process to deploy the Rapid Fire Compliance Management software using client-level EDFs with specific location and computer-level exclusions. It includes associated scripts, monitors, and implementation steps to ensure a successful deployment.

Deploy Threatlocker

This document outlines the creation of a dynamic group for machines eligible for Threatlocker deployment that do not currently have Threatlocker installed. It details the criteria for both Windows and Mac systems, ensuring proper identification and grouping for deployment.

DNS Filter Agent Deployment

This document outlines the steps to automatically deploy the DNS filter agent to client machines using associated scripts and monitors in the ConnectWise Automate environment. It includes detailed instructions for setup, implementation, and ticket creation.

DUO Auth for Windows Login Deployment

This document outlines the steps to create a dynamic group for DUO Authentication for Windows Login Deployment in ConnectWise RMM. It details the necessary custom fields and conditions required for the group setup.

DUO Auth for Windows Login Installed

This document provides a comprehensive guide on creating a dynamic group for agents where DUO Auth for Windows Login is installed. It includes details about the group creation process, dependencies, and criteria for the group.

DUO Auth Proxy - Install/Update Latest Version

This document provides a comprehensive guide on how to install or update the DUO Authentication Proxy application to the latest version. It includes sample runs, dependencies, task creation steps, and implementation guidance to ensure successful deployment.

DUO Auth Proxy Deployment

This document provides a comprehensive guide on setting up a dynamic group for the DUO Security Authentication Proxy deployment in ConnectWise RMM. It details the necessary custom fields, group creation steps, and criteria for agent inclusion based on specific conditions.

DUO Authentication for Windows Login InstallUpdateAudit

This document provides a comprehensive guide to automate the installation and update of DUO Authentication for Windows Login, including the necessary custom fields, device groups, and tasks for efficient deployment and auditing.

DUO Authentication Security Proxy InstallUpdateAudit

This document outlines the process for automating the installation and update of the DUO Authentication Security Proxy, including the necessary custom fields, dynamic groups, and tasks for effective management and auditing.

Endpoint - SentinelOne Deployment Result

This document details a custom field used to store the result of the SentinelOne deployment task within ConnectWise RMM. It includes dependencies, field details, and a screenshot for reference.

Exclude Huntress Deployment

This document explains how to create a custom field to exclude a machine from Huntress Deployment, specifically utilized by the ConnectWise RMM Device Group for deploying Huntress. It includes images and detailed instructions for setting up the custom field as a flag at the endpoint level.

Flag - SentinelOne Deployment Exclusion

This document provides details on setting a custom flag to exclude an endpoint from SentinelOne deployment. It includes information on dependencies, field names, and editable options to ensure proper configuration.

Huntress Agent Management

This document provides a comprehensive guide for deploying and managing the Huntress Agent on both Windows and macOS machines, including installation, uninstallation, and repair processes, along with associated content for effective monitoring and management.

Install Webroot SecureAnyWhere Autofix, EDF

This document provides a comprehensive guide on deploying Webroot to agents using the Webroot site keycode client-EDF. It includes sample runs, dependencies for obtaining the necessary Webroot information, detailed descriptions of the required EDFs, and the expected output of the script.

InstallUpdate - Teams Machine-Wide Installer

This document provides an implementation of the agnostic script for deploying Microsoft Teams. It includes a sample run and output details, focusing on the software installation process through an agnostic approach.

Missing Webroot

This document outlines an internal monitor that detects all computers whose associated client has the Enable Webroot Deployment EDF checked, while ensuring there are no associated location or computer exclusions. It includes dependencies and target operating systems.

Network Probe - Silent EXE URL Generator

This document details a script that is part of a GPO deployment process, capable of generating a silent installer URL. It can be executed standalone or as part of a larger deployment strategy. The script saves time by automating the installer generation process and requires specific dependencies to function correctly.

Network Probes

This document presents comprehensive information about Network Probes (Gen1 and Gen2), including details on subnet settings, scan configurations, and deployment options. It also provides recommendations for the best computer to use when a network probe is not present at a location.

Ninja RMM Deployment

This group contains the endpoints where the Ninja RMM deployment is enabled, the software "NinjaRMMAgent" is missing, and the custom field "Ninja Deployment Result" is blank.

NinjaRMM Deployment - [MAC]

This script deploys the NinjaRMMAgent to MAC OS, based on the article provided below: https://ninjarmm.zendesk.com/hc/en-us/articles/27524794230669-NinjaOne-Agent-Installation-Agent-Tokenization. It depends on the Authorization token, which will be kept in the company or site custom fields.

NinjaRMM Deployment - [Windows]

This script deploys the NinjaRMMAgent to Windows-supported OS. It depends on the Authorization token, which will be kept in the company or site custom fields.

Out of Date Cumulative Update (Post Reboot Verification)

This document outlines a task to validate whether the Cumulative Update installed by the Out of Date Cumulative Update (Autofix) task succeeded after a reboot. It includes sample runs, dependencies, variable definitions, task creation steps, and deployment instructions.

ProVal - Production - SonicWall NetExtender - Install/Update [Winget]

This document outlines the setup of an internal monitor for detecting the online Windows agent with SonicWall NetExtender installed, facilitating upgrades and excluding specific locations or agents as needed. It details dependencies and integration with other monitors for effective management.

SentinelOne Deployment

This document outlines the configuration of a dynamic group for deploying the SentinelOne agent across Windows, Linux, and Mac machines, including the necessary dependencies and criteria for group membership.

SentinelOne Deployment

This document provides a comprehensive guide for deploying the SentinelOne agent on Windows, Linux, and Mac machines, including associated custom fields, tasks, and monitoring setups.

Software Creation Guide

The document provides step-by-step instructions for creating an ImmyBot software based on a ProVal document.

Solution - Webroot Deployment and Audit EDF

This document outlines a solution for deploying Webroot and auditing keycode status for partners experiencing issues with the Webroot plugin. It includes associated scripts, monitors, and dataviews necessary for effective implementation and management of Webroot security.

Task Creation Guide

The document provides step-by-step instructions for creating an ImmyBot task based on a ProVal document.

Threatlocker Deployment

This document outlines the process for deploying the Threatlocker agent on both Windows and Mac operating systems. It includes necessary custom fields, device group creation, and task deployment steps to ensure successful implementation.

Threatlocker Deployment [NinjaOne]

This solution is designed to configure the automatic deployment of the Threatlocker Agent on Windows and Macintosh machines that are missing the agent, using the NinjaOne platform.

Update Orchestrator

This document outlines a solution for managing and deploying ProVal's Update Orchestrator to prevent unintended patching and rebooting of machines. It details the use of a custom task, device group, and monitor to ensure controlled updates.

Webroot

This document outlines the procedures for managing Webroot Software within ConnectWise Automate, including installation, configuration, and auditing processes. It covers system requirements, plugin installation, and automatic deployment strategies for both Windows and macOS systems.

Webroot Keycode Verification EDF

This document outlines the setup and dependencies for the Webroot Keycode Verification Monitor, which checks for online agents that have not run the specified script in the last 30 days, ensuring that Webroot is installed and deployment is enabled.