Agent Installation: Download Installer

A guide for installing the ZeroLock™ Agent using the provided download installer.

      The ZeroLock™ Agent (ZA) can be installed three (3) ways:

      1. COPY/PASTE – curl or wget 
      2. DOWNLOAD – Self-Extracting bash or tar Installer (instructions below)
      3. CONTAINER – Docker or AWS ECS

      Agent Deployment Options_v2.1.3-1

      This document focuses on the two (2) options available with the download method: Self-Extracting bash script or TGZ package with tar installer.   These options mirror each other with the difference being the shell command used.


      Advanced Settings

      Regardless of the installation method, the following settings must be done.  These settings are for the Collector that the endpoint will be connecting to.  The Collector is the ZeroLock™ Management Console (ZMC) service that collects endpoint connection and threat information.  It also authenticates and communicates with the ZeroLock™ Agents.

      These settings should only have to be done once per authorized user when configuring the ZMC, as the values rarely change after that point.

      Navigate to Deploy on the left side menu which opens the screen below.
      Deploy Download v2.0.3 

      1. Click on Advanced Settings.
      2. On the screen that appears, select the Agent Version to deploy. The default is the latest release.  
      3. The Endpoint Profile may remain as default unless you wish to use another profile from the drop-down list.  
      4.  If desired, additional Endpoint Groups may be added by selecting from the drop-down list. 
      5.  Enter the collector IP address(s) or the FQN for one or more collector server(s). 
      6. Click the Save as Default button to save the information.
        Advanced Settings Numbered v2.0.3-1

      Self-Extracting

      Once back on the Deploy home screen, under Download, select the Self-Extracting tab then click Install-ZeroLock-<version number>.sh (Insert the version number of the ZA) to download the installer file, then copy it to the target endpoint(s).

      Deploy Download v2.0.3-2

      Using the Copy Install Instructions button for complete installation instructions.  In a terminal session, cd to the location of the installer file (Download folder) and execute the following command to install.

      bash install-zerolock-<version number>.sh.
      Bash Command Install 2.1.1-1

      Note: Instructions on uninstalling a ZeroLock™ Agent may be found on the ValiCyber Support  site or by following this link – Uninstalling a ZeroLock Agent .

       


      TAR Installer

      Once the Advanced Settings are complete and you are back on the Deploy home screen, under Download, select TAR Installer then click ZeroLock-Installer-<version number>.tgz (Insert the version number of the ZA) to download the installer file, then copy it to the target endpoint(s).

      Download TAR Installer

      Using the Copy Install Instructions button for complete installation instructions.  In a terminal session, cd to the location of the installer file (Download folder) and execute the following commands to install.

      tar xzf zerolock_installer-<version number>.tgz && cd zerolock_installer &&
      bash./install_zerolock.sh

      command in terminal


      Validating Agent Installation

      To validate the installation process, select the Endpoints tab on the main menu. The new endpoint will be listed; the green dot in the status column indicates a successfully installed agent on the endpoint system.

      Installed Endpoint 2.1.1


      View ZeroLock™ Agent Logs

      Locate the ZeroLock™ Agent logs.

      cd /opt/zerolock/zerolock-tyr      To go to the Tyr directory.

      /opt/zerolock/zerolock-tyr$ ls -la   To list the contents of the directory.    


       To see the ZeroLock™ Agent log in detail, open a terminal session to the new Endpoint.  

      cat Tyr.log   To read the log


      Air-Gapped Environments

      An air-gapped computer or network is physically segregated and incapable of connecting wirelessly or physically with other network devices outside its own network.  Air-gaps protect critical computer systems or data from potential attacks ranging from malware and ransomware to keyloggers or other attacks from malicious actors.

      For instructions on installing the ZeroLock Agent on an air-gapped system please see the article Agent Installation to an Air-gapped Environment.  


      For more information, please see the Vali Cyber Support page.