Host Scan Service Install
The NPS Host Scan Service is installed on the application server as part of Privilege Secure install. It can also be installed on additional servers. This provides the option to run host scans from different locations within an organization.
The NPS Host Scan Service installer is in the Extras folder of the ZIP file downloaded from the Netwrix Customer portal. See the Install Components & Methods topic for additional information.
Before you begin, the NPS Proxy Service must be registered with a corresponding application server on the server you will be installing the Host Scan Service prior to installation. See the Proxy Service Install topic for installation instructions.
Additionally, The Action Service must be installed on the same server that you plan to add the Host Scan service. This is because the Host Scan service relies on the Action Service Worker. See Action Service Install
Follow the steps to install the NPS Host Scan Service on another server.
Step 1 – Make sure that you have configured the Antivirus exclusions according to the following Netwrix knowledge base article: Exclusions for Antivirus (AV) & Endpoint Software
Step 2 – Move the NPS.HostScanService.msi installation package to the desktop of the remote server.
Step 3 – Open the NPS.HostScanService.msi and the Netwrix Privilege Secure Host Scan Service Setup wizard will open. Click Next.
Step 4 – Read the End User License Agreement and check the I accept the terms in the License Agreement checkbox.

Step 4 – Enter the destination folder for installation and click OK. (Default usually easiest)

Step 7 – Click Install to begin the installation. The setup wizard displays the installation progress.

Step 8 – When the installation is complete, click Close to exit the installer.
The Privilege Secure Host Scan Service is now installed on a remote server.
Register the Remote Host Scan Service with Privilege Secure
If the Host Scan Service is installed on a remote machine, it must be configured to register with the Privilege Secure server. This configuration is done by supplying the Privilege Secure server and credentials in a command line utility.
Follow the steps to configure the key exchange.
Step 1 – On the application server, run cmd as Administrator.
Step 2 – Type the following commands to export the encryption keys for the secondary:
Encryption Key Export
cd C:\Program Files\Stealthbits\PAM\KeyTools
.\SbPAM.RotateKey.exe export -n keys.exp
Step 3 – Take note of the password for the export file.
Step 4 – Copy the export file to "C:\Program Files\Stealthbits\PAM\KeyTools" on the remote server.
Step 5 – On the remote server, run cmd as Administrator.
Step 6 – Type the following commands to import the encryption keys:
Encryption Key Import
cd C:\Program Files\Stealthbits\PAM\KeyTools
.\SbPAM.RotateKey.exe import -n keys.exp
Step 7 – Enter the password you got from the exporting the keys in the applicaiotn server when prompted.
Step 8 – Delete the export file from both the primary and secondary servers.
Delete the "keys.exp" file from both servers and the temporary password wherever you may have saved it.
The key exchange is now configured.
Follow the steps to configure the Host Scan Service.
Step 1 – Open a command prompt as an administrator.
Step 2 – Change the directory path to the location of the Privilege Secure Host Scan Service. The default path is:
C:\Program Files\Stealthbits\PAM\HostScanService\
Step 3 – Run the following command to automatically register the achost scan service. Enter the Admin password when prompted:
- The
[PrivilegeSecureServer]parameter is the Host Name, IP, FQDN or URL - The default
[Port]parameter is 6500 - The [admin] should be an NPS administrator in "DOMAIN\username" format
NPS.HostScanService.msi –register -u admin [PrivilegeSecureServer:Port]
- For installations without a trusted https certificate on the Privilege Secure server, the “-I” parameter must be added:
NPS.HostScanService.msi –register -u admin -I [PrivilegeSecureServer:Port]
- The command prompt will show if the configuration was successful.
Step 4 – Exit the command prompt.
The remote Host Scan Service is now registered with Privilege Secure.