Skip to content
SecPod  – Documentation
  • Docs Home
  • Categories
    • SanerNow CyberHygiene Platform
    • Products
    • Security Intelligence
    • Supported OSs and Platforms
    • How Tos
    • Release Notes
    • Knowledge Base
    • FAQs
  • Other Resources
  • About SecPod
  • Contact Support
  • Toggle website search
Search this website
Menu Close
  • Docs Home
  • Categories
    • SanerNow CyberHygiene Platform
    • Products
    • Security Intelligence
    • Supported OSs and Platforms
    • How Tos
    • Release Notes
    • Knowledge Base
    • FAQs
  • Other Resources
  • About SecPod
  • Contact Support
  • Toggle website search
  • Docs Home
  • Categories
    • SanerNow CyberHygiene Platform
    • Products
    • Security Intelligence
    • Supported OSs and Platforms
    • How Tos
    • Release Notes
    • Knowledge Base
    • FAQs
  • Other Resources
  • About SecPod
  • Contact Support

SanerNow CyberHygiene Platform

  • What’s New in SanerNow?
  • Getting Started with SanerNow
  • Pre-requisites for SanerNow Deployment
  • How does SanerNow’s deployment architecture work?
  • Platform Function Guides

Products

  • SanerNow AVM
    • Overview of SanerNow Advanced Vulnerability Management
  • Vulnerability Management
    • SanerNow Vulnerability Management User Guide
  • Patch Management
    • SanerNow Patch Management User Guide
  • Compliance Management
    • SanerNow Compliance Management User Guide
  • Asset Exposure
    • SanerNow Asset Exposure User Guide
  • Endpoint Management
    • SanerNow Endpoint Management User Guide
  • Posture Anomaly Management
    • Data Points IT teams can Fetch from SanerNow Continuous Posture Anomaly Management
    • Posture Anomaly Computation Rules
    • SanerNow Continuous Posture Anomaly Management Tool Product Guide
  • SanerNow Cyber Hygiene Score
    • SanerNow Cyber Hygiene Score User Guide
  • SanerNow Unified Dashboard
    • SanerNow Unified Dashboard User Guide

Release Notes

  • SanerNow Risk Prioritization Launch
  • Release Notes SanerNow 6.0
  • Release Notes SanerNow 5.3.1
  • Release Notes SanerNow 5.3
  • Release Notes SanerNow 5.2
  • Release Notes SanerNow 5.1
  • Release Notes SanerNow 5.0
  • Release Notes SanerNow 4.8.0.0
  • Release Notes SanerNow 4.7.0.0
  • Release Notes SanerNow 4.6.0.0
  • Release Notes SanerNow 4.5.0.0
  • Release Notes SanerNow 4.4.0.0
  • Release Notes SanerNow 4.3.0.0
  • Release Notes SanerNow 4.2.2.1
  • Release Notes SanerNow 4.2.2.0
  • Release Notes SanerNow 4.2.1.0
  • Release Notes SanerNow 4.2.0.0
  • Release Notes SanerNow 4.1.1.0
  • Release Notes SanerNow 4.0.0.5

FAQs

  • Technical FAQs

Security Intelligence

  • Overview of Security Content and Intelligence
  • Security Content Statistics
  • OVAL Definitions Platform Coverage
  • OVAL Definitions Class-wise Distribution
  • OVAL Definitions Family-wise Distribution
  • Application and OS Remediation Coverage
  • Compliance Benchmark Coverage
  • List of Vulnerability to Exploit/Malware Mapping covered in SanerNow
  • List of IoA (Indicators of Attack) covered in SanerNow

Supported OSs and Platforms

  • Supported Third-party Applications for Patching
  • Operating Systems and Platforms Supported

How Tos

  • General
    • How to set alerts in SanerNow?
    • How to view, download and filter the audit logs?
    • How to enable SSO authentication policy in SanerNow?
    • How to designate saner agent to perform network scan?
    • How to create new mail settings in SanerNow?
    • How to Co-Brand with your logo?
    • How to fetch the details of the mandatory fields from the Okta account?
    • How to create MFA policy for Okta?
    • How to fetch the details of the mandatory fields from the PingID account?
    • How to create MFA policy for PingID?
    • How to fetch the details of the mandatory fields from the PingOne account?
    • How to create MFA policy for PingOne?
    • How to download and install Saner agent in Mac?
    • How to download and install Saner agent in Linux?
    • How to download and install the Saner agent in Windows?
    • How to update the expiry date of an existing subscription?
    • How to manage users and their preferences using role-based access?
    • How to create a new user in SanerNow?
    • How to onboard a new organization?
    • How to uninstall the Saner agent through SecPod Saner deployer?
    • How to deploy the Saner agent through SecPod Saner deployer?
    • How to install a Saner agent through the command line?
    • How to uninstall the Saner agent through command line?
    • How to create a new account in SanerNow?
    • How to sign-up with SanerNow?
  • Vulnerability Management
    • How to remediate vulnerabilities from vulnerability management dashboard?
    • How to manage excluded vulnerabilities in SanerNow?
    • How to exclude vulnerabilities in SanerNow VM tool
    • How to automate and schedule vulnerability scans?
  • Patch Management
    • How to manage excluded patches in SanerNow?
    • How to exclude patches in SanerNow PM tool
    • How to automate patch management in SanerNow?
    • How to roll back patches in SanerNow?
    • How to fix firmware in SanerNow?
    • How to apply missing patches in SanerNow?
    • How to check the status of patching activity?
    • How to apply the most critical patches in SanerNow?
  • Compliance Management
    • How to run a compliance scan?
    • How to custom create a security policy?
    • How to align with PCI security compliance management?
    • How to align with NIST 800-171 security compliance management?
    • How to align with NIST 800-53 security compliance management?
    • How to align with HIPAA security compliance management?
  • Asset Exposure
    • How to run an asset scan?
    • How to manage asset licenses?
    • How to blacklist and whitelist applications in SanerNow?
  • Endpoint Management
    • How to collect all shared resources on Windows systems?
    • How to collect all security events from Windows Events Log?
    • How to check password policy set in Windows systems?
    • How to check faulty Anti-Virus (AV) status in Windows systems?
    • How to check status of DEP in Windows systems?
    • How to check for Anti-Virus (AV) status in Windows systems?
    • How to check account lockout policy on Windows systems?
    • How to check if Bit-locker protection is OFF in Windows systems?
    • How to collect all storage devices connected to Windows systems?
    • How to collect all keyboard and pointing devices connected to Windows systems?
    • How to list all Groups in Windows systems?
    • How to list all inactive users on Windows systems?
    • How to list all guest accounts in Windows systems?
    • How to list all Administrator accounts on Windows systems?
    • How to list last-logon details of users on Windows systems?
    • How to identify all users in Windows systems?
    • How to collect all services that are currently running in Windows systems?
    • How to manually import devices into SanerNow?
    • How to investigate total RAM or CPU threshold (greater than or equal to 80%) in Windows systems?
    • How to collect operating systems information in Windows?
    • How to investigate disks running out of space (<100 MB) in Windows systems?
    • How to collect and investigate disk information on Windows systems?
    • How to collect BIOS information such as serial number, version, manufacturer in Windows systems?
    • How to check the status of Windows Update Server (WSUS/SCCM)?
    • How to collect all software patches that are hidden in the Windows Update server?
    • How to collect all installed patches in Windows systems?
    • How to collect all the important missing patches in Windows systems?
    • How to collect mounted disk information on Linux systems?
    • How to check wireless signal quality in Linux systems?
    • How to check wireless security in Linux systems?
    • How to check all firewall policies on Linux systems?
    • How to collect DNS information on Linux systems?
    • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Linux systems?
    • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing in Linux?
    • How to check wireless signal quality in Windows systems?
    • How to check wireless security in Windows systems?
    • How to collect all open ports in Windows systems?
    • How to collect all network interfaces in Windows systems?
    • How to investigate DNS cache on Windows systems?
    • How to check all firewall policies on Windows systems?
    • How to collect DNS information on Windows systems?
    • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Windows systems?
    • How to collect all the applications with an unknown publisher in Mac systems?
    • How to collect environment variables set in all operating systems?
    • How to collect all families of operating systems such as Windows, Unix, and macOS?
    • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing Windows?
    • How to collect all software licenses in Mac systems?
    • How to collect all the applications with an unknown publisher in Windows systems?
    • How to collect a list of applications that are started when you boot your computer?
    • How to identify potentially unwanted programs such as torrent downloaders or unnecessary toolbars running on Windows systems?
    • How to collect all software licenses in Windows systems?
    • How to collect all the applications with an unknown publisher in Linux systems?
    • How to perform system tuning?
    • How to enable/disable devices in SanerNow?
    • How to block blacklisted applications in SanerNow?
    • How to delete and quarantine a file?
    • How to deploy software in SanerNow?
    • How to enable and disable firewall settings in SanerNow?
    • How to start and stop the processes in SanerNow?
  • Continuous Posture Anomaly Management
    • How to create new response in PA tool?
    • How to build your own detection and response in PA tool?
    • How to whitelist an entire PA ID?
    • How to configure Posture Anomaly tool for custom detection?
    • How to fix Anomalies from PA dashboard?
    • How to fix anomalies from PA Summary page?
    • How to fix anomalies detected in your account from All Anomalies Page?
    • How to delete PA scan preferences?
    • How to schedule PA Scans on Daily, Weekly, and Monthly basis?
    • How to launch Posture Anomaly scans?
  • Reports
    • How to schedule for the report back up?
    • How to create a custom report in SanerNow?
    • How to configure mail settings to email Report PDF?
  • Home
  • Docs
  • How Tos
  • General
  • How to deploy the Saner agent through SecPod Saner deployer?

How to deploy the Saner agent through SecPod Saner deployer?

  1.  Download the Saner agent from the Offline Deployer option in the Control Panel.
  2.  Deployment tool can be used for device discovery and saner agent installation. SecPod Saner deployer options are as shown in the image below:

Note: To deploy Saner agents on Windows, we need to run the deployer script from a Windows system, and to install on Linux/macOS systems we need to run the deployer from Linux/macOS operating systems respectively.

3. To discover devices in the network, run the following command and pass the CSV filename as a command-line argument to the deployer,

Options:

–discoveryTo Run device discovery
–network_rangeNetwork IP Range
–light_scanDoes only ICMP scan (Optional) (Default: full scan)
–dis_result_csv_file Discovered IPs/Hosts will be stored in this CSV file
–get_host_names           Save hostname instead of host IPs (Optional)           (Default: Won’t collect hostnames)
–run_envRunning OS: From where this tool is being run (Values: Windows|Linux|Darwin)

> python.exe run.py –discovery options

> python.exe run.py –discovery –network_range=192.168.1.1/24 –dis_result_csv_file=hosts.csv –run_env=Windows

4. To deploy the Saner agent on Windows, run the following commands.

–deploy_saner                 To deploy Saner agent
–hostNetwork IP Range OR CSV file (Format: “ip address”,”username”,”password”) (credentials: optional, if passed from command-line)
–delete_host_csvTo delete/keep host CSV file, NOTE: We advise to delete this file, if credentials are present (Values: true|false)
–userUsername
–passPassword (passwords should be in double Quotes eg: –pass=”password”)
–first_scan_disableTo disable agent first scan just after the agent installation (Optional) (Default: First scan will be enabled)
–agent_activation_disableTo disable agent activation just after the agent installation (Optional) (Default: Agent activation will be enabled)
–agent_removeInclude to remove saner agent from endpoint (Optional) (Default: Agent will not be removed)
–uninstall_pass                Required if Saner agent uninstallation require password (Optional)
–ms_eulaAccept Microsoft eula to run psexec tool (Values: yes|no) (Optional)
–run_envRunning OS: From where this tool is being run (Values: Windows|Linux|Darwin)(Optional)(Default: Tries to find out automatically)
–proxy_ipProxy Server IP (Optional)
–proxy_portProxy Server Port (Optional)
–proxy_userProxy Username (Optional)
–proxy_passProxy Password (Optional)

> python.exe run.py –deploy_saner –host=192.168.2.1-100 –user=”Administrator” –pass=”password” –ms_eula=yes –run_env=Windows

5. To deploy the saner agent on Linux/macOS, run the following command

> python run.py –deploy_saner –host=hosts.csv –user=”root” –pass=”password” –delete_host_csv=false –agent_activation_disable –first_scan_disable

6. If a proxy is enabled, pass proxy details to the deployer script as shown below,

–proxy_ip=192.168.1.1 –proxy_port=80 –proxy_user=”proxy_user” –proxy_pass=”proxy_pass”

> python run.py –deploy_saner –host=192.168.1.100 –user=”root” –pass=”password” –proxy_ip=192.168.1.1 –proxy_port=80 –proxy_user=”proxy_user” –proxy_pass=”proxy_pass”

7. Other deployer tool options,

> python run.py –deploy_saner –host=hosts.csv –delete_host_csv=true –run_env=Linux –first_scan_disable

> python run.py –deploy_saner –host=hosts.csv –delete_host_csv=true –user=test_user –pass=”test_pass” –run_env=Linux –agent_activation_disable –first_scan_disable

> python run.py –deploy_saner –host=192.168.2.1-100 –user=domain\test_user –pass=”test_pass” –proxy_ip=192.168.1.1 –proxy_port=80 –proxy_user=”proxy_user” –proxy_pass=”proxy_pass” –ms_eula=yes –run_env=Windows

What are your Feelings
Share This Article :
  • Twitter
  • LinkedIn
Updated on October 10, 2022
Copyright 2023 - SecPod. All Rights Reserved. Privacy Policy.