Overview of the Deployment Steps
About this task
To successfully deploy the CPM client, perform the following procedures:
- Identify ineligible endpoints.
- Identify conflicting products.
- Remove conflicting products.
- Deploy CPM clients.
Identifying Ineligible Endpoints
About this task
The CPM client supports most operating systems and typically does not require system resources exceeding those required by the host operating system. However, there are some factors that can preclude otherwise eligible endpoints from receiving the CPM client. Perform the procedures that follow to identify which of your endpoints, if any, require modification before installing the client. Do this before removing any existing security products to ensure a continuation of your endpoint security.
Procedure
- From the console menu, click Endpoint Protection on the bottom left pane.
- From the upper left navigation pane, go to .
- From the list on the right pane, select Core Protection Module - Ineligible for Install -Insufficient Hardware Resources. The Fixlet® Description opens.
- Click the Applicable Computers tab. A list appears with the endpoints with insufficient hardware resources.
- Below Actions, click the hyperlink if you want to connect to the Support web page for more information.
- Repeat steps 1-3 for any Tasks that pertain to endpoint readiness (for example, the Core Protection Module - Ineligible for Install - Insufficient Software Resources task.
Identifying Conflicting Products
About this task
Before deploying the CPM client to your endpoints, you need to uninstall any programs that will conflict with the CPM functions. See Conflicting or Incompatible Programs for more information.
Procedure
- From the console menu, click Endpoint Protection on the bottom left pane.
- From the upper left navigation pane, go to .
- From the list on the right pane, select Core Protection Module - Ineligible for Install - Removal of Conflicting Products Required. The Fixlet Description opens.
- Click the Applicable Computers tab. A list of endpoints running conflicting software appears.
- Below Actions, click the hyperlink if you want to connect to the Support web page for more information.
Removing Conflicting Products
Procedure
Deploying CPM Clients to the Endpoints
About this task
Use the Core Protection Module Endpoint Deploy Task to deploy CPM to all computers you want to secure against viruses and spyware. The CPM client package is about 100MB, and each endpoint will be directed to download the file from the BigFix Server or Relay.
If you target your endpoints using properties rather than by computer (which is the recommended behavior) any endpoint that subsequently joins the network will automatically receive the CPM client.
Installation takes about ten minutes, and the CPM client can be installed with or without the target user’s consent. Installation does not typically require a restart; however, a DOS-style command console may open on the client as the install scripts run. In addition, the client will be briefly disconnected from the network.