Deploy agents

Overview

This article describes multiple strategies for deploying agents to user devices. You can integrate your apps with SSO, for example, without user intervention. The article is intended for administrators using device management tools like SCCM for Windows or Jamf Pro for Mac. This article provides:

  • Introduction to agent deployment and description of how it works in general.
  • Links to help you with specific environments and specific deployment strategies.

For simplified instructions, see:

Considerations

  • To use these deployment tools, sign in to the Incydr console as a user with the Security Administrator role. 
  • In the federal environment, backup agents must be installed with a deployment policy to ensure the use of FIPS encryption in the agent. Users cannot download the installation package from the Incydr console or an email message.
  • Creating and using deployment policies requires familiarity with:
    • Creation and configuration of organizations in your environment.
    • The authentication methods that your organizations use to manage users.
    • The process you use to distribute and install applications to user devices (typically a device management tool like SCCM for Windows or Jamf for Mac)
  • If you install the backup agent on a device, you must also install the insider risk agent. For directions to install both agents, see Install the insider risk and backup agents. Installing only the backup agent on a device is not supported. 

  • Do not restore Incydr application files backed up from one device as a means to install the insider risk agent on a different device. Application files are unique to each device and cannot be transferred to a new device.

Need help?
For assistance, contact your Customer Success Manager (CSM) to engage the Incydr Professional Services team. If you don't know who your CSM is, contact our Technical Support Engineers.

Insider risk agent

Backup agent