Please navigate to your device OS for ARR (Active Ready Response) agent installation instructions.
Required Parameters:
Please be certain to replace the *********** in the commands with the Instancename provided to you by your SonicWall Managed Services Engineer.
Please be certain to replace the %%%%%%%%% in the commands with the Regkey provided to you by your SonicWall Managed Services Engineer.
Installing Agent
Ensure to run PSConsole as Administrator if doing a manual install
Make sure your current AntiVirus policy does not block PSConsole usage or have Memory protection enabled without the proper Infocyte exclusions placed
[System.Net.ServicePointManager]::SecurityProtocol = [Enum]::ToObject([System.Net.SecurityProtocolType], 3072); (new-object Net.WebClient).DownloadString("https://raw.githubusercontent.com/Infocyte/PowershellTools/master/AgentDeployment/install_huntagent.ps1") | iex; installagent *********** %%%%%%%%% Method 2 - Installer
Download the installer from:
Run the installer using the following command in an elevated command prompt:
agent.windows.exe --url https://***********.infocyte.com --key %%%%%%%%% 32 Bit Installer
Download the installer from:
Run the installer using the following command in an elevated command prompt:
agent.windows32.exe --url https://***********.infocyte.com --key %%%%%%%%%
Method 3 - Group Policy
Windows Server 2012 R2 or greater
Domain Administrator account
Microsoft Windows endpoints
File to convert into a Batch file "install_agent.txt"
Instancename (provided by SonicWall Managed Services, Inc
Regkey (provided by SonicWall Managed Services, Inc)
Getting Ready:
Copy the following code into a text editor
@echo off
:: Install Hunt Agent
:: For use in a GPO Startup Script (Note: Logon script will not work as it operates with the user's non-admin permissions)
:: Best Reference for steps: https://www.petri.com/run-startup-script-batch-file-with-administrative-privileges
:: Set "instancename" to the instance name provided by Solutions Granted, Inc
:: Set "regkey" to your registration key provided by Solutions Granted, Inc
set instancename=myinstancename123
set regkey=myregkey123
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -nologo -win 1 -executionpolicy bypass -nop -command "[System.Net.ServicePointManager]::SecurityProtocol = [Enum]::ToObject([System.Net.SecurityProtocolType], 3072); (new-object Net.WebClient).DownloadString('https://raw.githubusercontent.com/Infocyte/PowershellTools/master/AgentDeployment/install_huntagent.ps1') | iex; installagent %instancename% %regkey%"
Change the myinstancename123 to the the instancename provided by SonicWall Managed Services, Inc
Change the myregkey123 to the regkey provided by SonicWall Managed Services, Inc
Save the file as “install_agent.bat”
If you use Notepad, you will want to make sure it doesn’t default to “install_agent.bat.txt”

Create the GPO:
Open Server Manager and go to Tools > Group Policy Management
In Group Policy Management Console select domain and click Group Policy Objects
Right-click Group Policy Objects and select New
For Name type "Install HUNT Agent" and click OK
Right-click the new GPO in the right pane and click Edit
In the Group Policy Management Editor window, click Computer Configuration, then Policies, then Scripts. Double-click Startup
On the Scripts tab of the Startup Properties box, click Show Files. Copy the "install_agent.bat" file created in the previous Getting Ready section of this article
Click Add
Click Browse and select the file "install_agent.bat"
Click OK
Find the Domain or OU that you wish to link to the newly created GPO
Right-click it and click Link an Existing GPO
Click OK
Your script should now run and install the ARR agent on all machines in the selected group.
Validating Install

Uninstall (Windows)
"C:\Program Files\Infocyte\Agent\agent.exe" --uninstall "C:\Program Files\Infocyte\Agent\agent.exe" /quiet --uninstall
Linux Support for Agent Installation:
file /sbin/init /sbin/init: symbolic link to /lib/systemd/systemd Installing Agent
64-Bit
chmod +x linux64.exe sudo ./linux64.exe --key %%%%%%%%% --url https://***********.infocyte.com 32-Bit
chmod +x linux32.exe sudo ./linux32.exe --key %%%%%%%%% --url https://***********.infocyte.com Validating Install
Uninstall (Linux)
sudo /usr/local/infocyte/agent/agent.exe --uninstall Manual Uninstall
systemctl stop HUNTAgent
systemctl disable HUNTAgent
rm /etc/systemd/system/HUNTAgent.service
systemctl daemon-reload
systemctl reset-failed
rm -rf "opt/ infocyte
MacOS Installation
Installing Agent
Open the terminal, navigate to the download folder (or location of downloaded file)
sudo chmod +x agent.macos.exe sudo ./agent.macos.exe --url https://***********.infocyte.com --key %%%%%%%%% Validating Install (All macOS)
ps -u root | grep agent 
Uninstall
sudo /usr/local/infocyte/agent/agent.exe --uninstall Manual Uninstall
systemctl stop HUNTAgent
systemctl disable HUNTAgent
rm /etc/systemd/system/HUNTAgent.service
systemctl daemon-reload
systemctl reset-failed
rm -rf "opt/ infocyte
Installing Agent
sudo cat rts.macos.exe > rts.macos-catalina.exe && sudo chmod +x rts.macos-catalina.exe sudo ./rts.macos-catalina.exe --url https://***********.infocyte.com --key %%%%%%%%% Validating Install (All macOS)
ps -u root | grep agent 
Uninstall
sudo /usr/local/infocyte/agent/agent.exe --uninstall Manual Uninstall
systemctl stop HUNTAgent
systemctl disable HUNTAgent
rm /etc/systemd/system/HUNTAgent.service
systemctl daemon-reload
systemctl reset-failed
rm -rf "opt/ infocyte
Installing Agent
sudo spctl --master-disable cd documents cat rts.macos.exe > rts.macos-catalina.exe 
chmod +x rts.macos-catalina.exe sudo ./rts.macos-catalina.exe --url https://***********.infocyte.com --key %%%%%%%%% sudo spctl --master-enable
BE CERTAIN TO RUN THE LAST COMMAND TO RE-ENABLE SYSTEM SECURITY
sudo spctl --master-enable Validating Install
You can use EITHER of the following methods to validate agent is installed and running on the device.
![]()
OR
ps -u root | grep agent 
Uninstall
sudo /usr/local/infocyte/agent/agent.exe --uninstall
Manual Uninstall
systemctl stop HUNTAgent
systemctl disable HUNTAgent
rm /etc/systemd/system/HUNTAgent.service
systemctl daemon-reload
systemctl reset-failed
rm -rf "opt/ infocyte Windows
1) C:\windows\temp\infocyte.exe
2) C:\Program Files\Infocyte\Agent
Linux
1) /tmp/infocyte.exe
2) /opt/infocyte/agent
While rare, some AV engines may require the Agent Application folder to be whitelisted in Agent based deployments of Infocyte. You can whitelist the following directories or use the hashes found under the download section to specify the specific files.
Windows:
C:\program files\infocyte\agent Linux:
/opt/infocyte/
Whitelisting by Hash
You can whitelist in your AV by hash as well assuming it supports this. Our hashes can always be found in the "/admin/downloads" page of your Infocyte console.
Endpoint to Cloud:


