LogoLogo
Log In
  • Introduction
  • Registration
  • Pre-Requirements & Initialization of the Platform
    • Agent Installations
      • Windows Installation
      • Linux Installation
      • macOS Installation
      • Deploying Agent From Microsoft Intune
    • Access and Exlusion Requirements
      • Agent-Based Demo Deployment
      • Agent-Based Production Deployment
      • Agent-Based On-Premises Deployment
      • Trendmicro Exlusions
    • Troubleshooting
  • Getting Started
    • Platform Overview
    • Agent Based Deployment
      • 1. Activating Policies
      • 2. Configure Policies in the Group
      • 3. Agent Deployment
        • Windows: Downloading and Deploying The Windows Agent
        • Linux: Downloading and Deploying The Linux Agent
        • macOS: Downloading and Deploying The macOSAgent
      • 4. Enabling Classification Rules
      • 5. Review The Results & White Listing
      • 6. Reviewing and Enabling Sigma Rules
      • 7. Generating Reports
      • 8. Notification Settings
      • 9. YARA Analysis & THOR
      • 10. Configuring YARA Rules
      • 11. Remediation Management
      • 12. Results of The Analysis
    • Using the Main Dashboard and Grids
    • Classification Rules
    • Configuring Modules
      • Threat Hunting
        • Enabling Windows Autoruns & Process Analysis
        • Enabling Weak SNMP Discovery
        • Enabling Linux Analysis
        • Job Management
        • Customizing Classification Rules
        • Enabling Windows Event Log Analysis
        • Enabling Windows Sysmon Analysis
        • Enabling Windows Thor Analysis
        • Enabling Windows Security Benchmark Analysis
        • Enabling In-Depth Analysis
      • Windows Hardening
      • Remediation & Response Management
      • Notification Management
      • Vulnerability Management
      • Network Discovery
      • Windows Patch Management
      • IP Scanning
      • Software Management
      • Managing Shadow-IT
      • Microsoft Windows Defender Health Analysis
    • Configuring Sysmon
      • Sysmon Deployment
      • Managing Sysmon Rules
      • Troubleshooting Sysmon Rules
    • Important Settings
      • Organization Settings
    • Utilizing the Platform Effectively and Interpreting the Artifact Analysis Results
    • How To Manage False Positives and Optimizing the System
    • Using AI Modules
      • AI Manuel Enrichment
      • AI Auto Enrichment
      • Automating AI Enrichment
      • AI Auto Exclusions
      • AI Feedback Questions
      • AI Auto Exclusion & Enrichment for Sysmon
      • AI Activity Logs
    • GRC Management
      • Creating an Assessment & Updating Evidences
    • Integrations
      • Office 365 Azure Registration
      • Windows Security Center Azure Registration
      • Azure Active Directory Integration
      • Active Directory Integration
      • CrowdStrike Integration
      • Palo Alto - Cortex Integration
      • Palo Alto HyperVisor Integration
      • OpenVAS Integration
      • Tenable Nessus
      • Gophish Integration
    • How to Use CyberCyte Platform Effectively?
    • Enabling External Exposure Analysis
  • Administration Guide
    • Most Used
      • Threat Overview
      • Analysis & Investigation
      • Shadow IT
      • My Assignments
      • Installation Management
      • Policy Management
      • Windows Hardening Results
      • Device Management
    • Dashboards
      • Threat Overview
      • Asset Overview
      • User Overview
      • Shadow IT
      • Analysis
    • Threat Hunting
      • Notable Events
      • Analysis & Investigation
      • Visualization
      • Hunting Settings
      • E-Mail/Teams Settings
    • Threat Response
      • Response Management
      • Incident /Case Management
      • ToDo
      • Remediation & Response Settings
      • Incident /Case Management
      • Incident/Case Management Settings
      • AI Activity
      • Interactive Sessions
    • Security Assurance
      • Hardening & Configuration Management
      • Vulnerability Management
      • Windows Remediation
      • Linux Remediation
      • Software Management
      • Windows Patch Management
      • Windows Remediation & Response Settings
      • Hardening & Configuration Management Settings
    • Asset Management
      • Endpoint Management
      • Group Management
      • Settings
    • Rules & Policies
      • Artifact Classification
      • Policy Management
      • SIGMA/YARA Rules
      • Artifact Collection Parameters
    • GRC
      • Assessment Management
      • Risk and Oppurtunity Management
      • Incident/Case Management
      • Assets
      • Document Management
      • Evidences
      • ToDo & Project Management
      • Parameters
      • Settings
      • Incident/Case Management Settings
    • Settings & Reporting
      • Agents Settings
      • Deployment Settings
      • Notification Settings
      • Integration Settings
      • AI Settings
      • Credential Settings
      • Organization Settings
      • Reporting
      • Users & Groups
    • Help
      • Ask AI
      • Configuration Wizard
      • Help Guide
      • Search
      • Version & Exception Overviews
      • Troubleshoot
    • How To Manage False Positives and Optimizing the System
  • Troubleshooting
    • Troubleshooting Multitenant Functionalities & Accessing Internal Applications
    • The Agent Troubleshooting
      • Troubleshooting the Windows Agent
      • Troubleshooting the Linux Agent
      • Troubleshooting the macOS Agent
    • Proxy Troubleshooting
      • Portal Server
      • Elastic Server
    • AI Automation Troubleshooting
      • Checking the AI Mode
      • Checking AI Audit Logs
      • Checking the AI Settings
    • Troubleshooting Synchronization Problems
  • Release Notes
    • v3.3.6
    • v3.3.5
    • v3.3.4
    • v3.3.3
    • v3.3.2
    • v3.3.1
    • v3.3
    • v3.2.1
    • v3.2
    • v3.1.4
    • v3.1.3
    • v3.1.2
    • v3.1.1
    • v3.1
    • v3.0.10
    • v3.0.8-9
    • v3.0.7
    • v3.0.6
    • v3.0.5
    • v3.0.4
    • v3.0.3
    • v3.0.2
    • v3.0.1
    • v3.0
    • v2.5.0 - v2.17.7
Powered by GitBook
On this page
  • How to Deploy a Package?
  • How to Deploy a Package on a Device(s)?
  • Where to See Package Jobs Logs?

Was this helpful?

  1. Getting Started
  2. Configuring Modules

Software Management

PreviousIP ScanningNextManaging Shadow-IT

Last updated 3 months ago

Was this helpful?

The CyberCyte portal provides built-in software management. The users can intall/upgrade/uninstall applications. Also, users can upload any package to CyberCyte portal with execution parameters, portal accepts .exe, .msi and .zip formats.

How to Deploy a Package?

  • Please navigate to "Security Assurance" -> "Software Management" -> click on the "+ Package".

  • Please edit the package configuration with filing these parameters:

Required Fields
Description

Name

The package name for displaying the package on the portal

Applicaiton Name

The actual applicaiton name for discoverin the app on the machine. The wildcard is supported.

Version

The actual application version for compare the exit app on the machine.

Process Name

The actuall applicaiton process name that can be observed on the task manager. The wildcard is supported.

File Name

The section for selecting and uploading the applicaiton.

Timeout

The timeout in seconds to execute install, upgrade or uninstall command.

Install Command Type

The option for installation command type, users can select command line arguments or powershell scripts.

Install Command

The installation commands/scripts.

Upgrade Command Type

The option for upgrade command type, users can select command line arguments or powershell scripts.

Upgrade Command

The upgrade commands/scripts.

Uninstall Command Type

The option for uninstall command type, users can select command line arguments or powershell scripts.

Uninstall Command

The uninstall commands/scripts.

  • Click on the "Save" button. The package will be start to upload, please wait for complation of the upload process. After the upload process is completed, the package is ready for deployment.

How to Deploy a Package on a Device(s)?

  • Please navigate to "Security Assurance" -> "Windows Applicaiton Jobs" -> click on the "+ Package Job".

  • Please edit the package job configuration with these parameters below:

Required Fields
Description

Name

The package job name

Package

The package that wanted to deploy on the device(s).

Assigned Host

The host/device list. The users can select specific hosts for deployment.

Assigned Groups

The group list. The users can select specific groups for deployment.

Enable Installation

The option for enabling the installation.

Enable Upgrade

The option for enabling the upgrade.

Enable Uninstall

The option for enabling the uninstallation.

Uninstall Before Upgrade

The option for enabling the uninstallation before upgrade process.

Retry Interval (Hours)

The interval for retrying the job execution.

Retry Attempts

The attempt count for job execution.

Run Once

The option for enabling the one or infinte job loop.

  • Click on the "Save" button. The agent will get the package job and execute the job for next iteration.

Where to See Package Jobs Logs?

  • Please navigate to "Security Assurance" -> "Windows Package Management Logs".

  • The logs are provided under this page. The users can observe the job results.