Note |
---|
Before you begin, Armor recommends that you pre-installation information, including firewall rules. To To learn more, see Armor Anywhere Agent 3.0 Pre-Installation. |
...
Step 1: Locate the Armor Anywhere Agent
- In the Armor the Armor Management Portal (AMP), in the left-side navigation, click click Infrastructure.
- Click Click Virtual Machines.
- Hover over the plus ( + ) icon, and then click the the Anywhere Agent iconAgent icon.
- If you don't have any agents listed, then click Add an Armor Agent.
- Copy your license key. You will need this information in a later step.
- Select your operating system (Linux or or Windows).
...
Armor recommends installing the Armor Agent with all Security Services. Documentation on installing the Armor Agent only can be found found below.
Step 2: Install the Armor Anywhere Agent
Run the command to install the Armor Anywhere Agent with all Security Services.
Code Block | ||
---|---|---|
| ||
sudo curl -sSL https://agent.armor.com/latest/armor_agent.sh | sudo bash /dev/stdin -l AAAA1-AAAA1-AAAA1-AAAA1-AAAA1 -r (region) -f |
Tip |
---|
You must replace
Currently, all users will leverage the region: |
Info |
---|
The Trend Recommendation Scan is not run upon installation, but is instead scheduled to run 10 minutes after installation and then every 7 days after that. |
...
Step 3: Review the status of the Armor Anywhere agent agent
Insert excerpt | ||||||
---|---|---|---|---|---|---|
|
Note |
---|
The State of each Armor Service will show show Pending for two-hours after installation. After two hours, the State should accurately reflect the health of the service. |
Note |
---|
To access troubleshooting documentation for each Armor Security Service, click on the name of the service in the sub-agent health table. |
...
AnchorInstalling the Armor Anywhere Agent Only Linux Installing the Armor Anywhere Agent Only Linux
Installing the the Armor Anywhere Agent Only
Installing the Armor Anywhere Agent Only Linux | |
Installing the Armor Anywhere Agent Only Linux |
If you need to install the Armor Agent and Armor Security Services one by one, Armor recommends following the specific order outlined below to utilize the benefits of Recommendation Scans.
Recommendation Scans provide a good starting point for establishing a list of rules that you should implement for FIM and IPS. During During a recommendation scan, the the Armor Agent scans Agent scans the operating system for installed applications, the the Windows registry, open open ports, and more. Recommendation Recommendation Scans provide the rules and policies that will be auto applied by FIM and IPS, so auto apply features for those services must be turned on. Similarly, there is nothing for FIM and IPS to auto apply unless a Recommendation Scan is run.
If you do not want to run Recommendation Scans, please review the full list of CLI commands available here.
Agent Only Step 1: Run the command to install the Armor Anywhere agent only.
Code Block | ||
---|---|---|
| ||
sudo curl -sSL https://agent.armor.com/latest/armor_agent.sh | sudo bash /dev/stdin -l AAAA1-AAAA1-AAAA1-AAAA1-AAAA1 -r (region) |
Tip |
---|
You must replace
Currently, all users will leverage the region: |
Agent Only Step 2: Install Install Armor Security Services
Note | |||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Step 1: Install Trend Sub-Agent:
Step 2: Turn Turn On File Integrity Monitoring in Monitoring in "Auto-Apply" Mode (This automatically applies FIM rules identified by Recommendation Scans. You must run a Recommendation Scan to identify the FIM rules that will be auto-applied.)
Step 3: Turn Turn On Intrusion Prevention Service in "Auto-Apply" Mode (This automatically applies IPS rules identified by Recommendation Scans. You must run a Recommendation Scan to identify the IPS rules that will be auto-applied.) Option 1: Detect Mode Mode
Option 2: Prevent Mode
Step 4: Install Malware Protection (Anti-Virus)
Step 5: Install Vulnerability Scanning*
*Vulnerability Scaning is a standalone service not included in the Trend Subagent Step 6: Install Logging*
*Logging is a standalone service not included in the Trend Subagent Step 7: Run a Recommendation Scan Scan (This runs the initial Recommendation Scan to apply the baseline rules for FIM and IPS. Recommendations cannot be applied unless FIM and IPS are turned on and running in auto-apply mode.)
Step 8: Turn Turn On Ongoing Recommendation Scans Scans (This automatically runs Recommendation Scans every 7 days. All FIM and IPS rule changes are automatically applied if you followed Steps 2 and 3.)
|
...
Agent Only Step 3: Same as Step 3 in the full installation outline above.
...
Troubleshooting
The Armor Agent uses the BiosUUID to identify the hardware that the agent is running on. This number is tied to your motherboard (in the case of a physical computer) but is also present in a Virtual Machine.
...
Turn on Armor Agent debug logging and and try to register again. If the registration fails again, search the log for for "Unable to get BiosUUID"
Code Block | ||
---|---|---|
| ||
time="2020-07-24T03:06:48-05:00" level=debug msg="Unable to get BiosUUID" time="2020-07-24T03:06:50-05:00" level=debug msg="Unable to get BiosUUID" |
...
Code Block | ||
---|---|---|
| ||
4C4C7544-0057-4C30-8046-C2C04F4C9132 |
The BIOS UUID is required is required by the Armor Agent, to ensure uniqueness ensure uniqueness of the device. The BIOS UUID must be readable by the by the operating system. If the BIOS UUID is not available to the operating system please check with your provider.
...