Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 53 Next »

Install EDR


Step 1: Install Armor Anywhere

To Install EDR on your device, users must first install the Armor Agent.


Step 2: Install EDR

Once installed, users can install EDR services using the CLI or Armor Toolbox.

Linux Command

/opt/armor/armor edr install

Windows Command

c:\.armor\opt\armor.exe edr install


MacOS


Uninstall EDR


Users can install EDR services using the CLI or Armor Toolbox. To uninstall EDR, users must first acquire an Uninstall Code from the Armor Management Portal.

To obtain a code:

  1. Navigate to the Infrastructure screen in AMP.

  2. Select the appropriate Virtual Machine.

  3. Click the Overview tab.
    Click EDR.

  4. Click the Get Uninstall Code button.


Linux Command

/opt/armor/armor edr uninstall uninstall-code={uninstall-code}

Windows Command

c:\.armor\opt\armor.exe edr uninstall uninstall-code={uninstall-code}


Other EDR CLI Commands


Operation

Description

help

Displays a list of available commands.

sync-agent-id

Sync CoreInstanceId to Carbon Black Endpoint Detection and Response.

show-agent-id

Display Carbon Black regestered Host ID.

diagnostics

Diagnostics EDR Service.

Fleet Management


Users looking to deploy EDR at scale can use the Armor Toolbox to schedule installation of EDR on multiple machines simultaneously. The Armor Toolbox is a self-service solution available to users in the AMP.

Users can learn more about scheduling installation tasks in the Armor Toolbox documentation.

Carbon Black User Roles


During EDR sign-up, a user is elected to be the Admin user for the Carbon Black account. That Admin user is configured as in the Carbon Black portal as Super Admin. The Super Admin user will have all privileges to perform within the Carbon Black portal. Users must be careful which actions are performed in the portal and be mindful of privileges that are granted to other users.


Permissions matrix table shows the permissions that are assigned to a particular role.



  • No labels