Skip to main content

Instructor, no.

Incydr Professional, Enterprise, Horizon, and Gov F2, yes.

Incydr Basic, Advanced, and Gov F1, no.

HOME
GETTING STARTED
RELEASE NOTES
FAQs
APIs
SYSTEM STATUS
Code42 Support

Deployment script and command reference for the insider risk agent

Overview

When you create a deployment policy in the Code42 console, the process generates user-detection scripts and arguments for insider risk agent install commands. This article provides details about the scripts for Windows, Mac, and Linux devices. 

Use the correct scripts!
Use the scripts for the agents in your Code42 environment. If you use scripts that are not made for the agents in your Code42 environment, they will break your deployment.

This article only applies to the insider risk agent. 

For deployment scripts for the backup agent and legacy agent, see Deployment script and command reference for the backup and legacy agents.
Need help?
For assistance, contact your Customer Success Manager (CSM) to engage the Code42 Professional Services team. If you don't know who your CSM is, contact our Technical Support Engineers.

Considerations

This article assumes you understand the introduction to deployment provided by the article Deploy Code42 agents.

  • To use these deployment tools, you need to sign in to your Code42 console as a user with the Security Administrator role. 
  • In the Code42 federal environment, app installations must be deployed with a deployment policy to ensure the use of FIPS encryption in the Code42 agent. Users cannot download the installation package from the Code42 console or an email message.

Deployment is a secure process:

  • During installation, device-server communications are encrypted.
  • Devices can use a proxy to reach the Code42 cloud. See the PROXY_URL parameter.
  • Deployment can run silently, with no intervention from users at devices.

About user detection scripts

Code42 relies on usernames having an email format, for instance, firstname.lastname@example.com. A user detection script detects the usernames in another system, such as a directory service, and transforms them to a username format that Code42 can use. When you create a user detection script, you must customize it for the system where you need to detect usernames.

To make it easier to create a user detection script that's right for your situation, we provide example scripts for Windows and Mac systems. You can use these examples as a starting place when creating your own user detection script.

Windows

Mac

Linux

Related topics

  • Was this article helpful?