Skip to main content

Agent Silent Install Option

You can use command line options to install the Agent silently. These options can be leveraged to deploy the Agent via custom batch files, login scripts, or for integrating with third-party software distribution solutions that an organization may already have in their environment.

MSI Compliant Command-Line Options

The WiX installer application for Agent runs under control of Windows installer component (MSI). Therefore, standard MSI command-line options can be used with the “threatprevention-agent-7.4.0.xxx.exe” install.

Available command-line options can be found in the Microsoft Standard Installer Command-Line Options article.

Two of the more useful options are:

  • Silent installation option – /q
  • Logging option – /log "file_for_logging.log"

All Properties for the Agent Installer

The following table details all properties that can be specified to the Agent installer via the command line.

Property NameDescriptionDefault Value
CUSTOM_CAIf this property is set to True, then the custom-managed certificate mode is enabled. This mode uses certificates that are signed by the customer's external certificate authority. In this mode, the installer will not generate certificates and will not start the Agent Service at the end of the installation.FALSE
EMCERTIFICATEEnterprise Manager Certificate ThumbprintThis value can be found in the Agents Interface by clicking the Agent Enrollment Secret icon to open the Enrollment Secret Configuration Window. This value is not used for high security mode.
ENROLLMENTSECRET Required for enrolling new AgentAgent Enrollment SecretThis value can be found in the Agents Interface by clicking the Agent Enrollment Secret icon to open the Enrollment Secret Configuration Window. This is a required field if using auto security mode. It is not used for high security mode.
SAFEMODEStart Agent Service in safe modeFALSE
STARTAGENTSERVICEStart Agent Service on successful installationFALSE
ADDFWRULESCreate firewall rules for the Agent ServiceTRUE
INSTALLFOLDERAgent installation path…\Program Files \Netwrix\Netwrix Threat Prevention\SIWindowsAgent
PORTNUMBEREnterprise Manager port value3741
ENTMGR_IPADDRESS RequiredEnterprise Manager IP address127.0.0.1
FILE_MONITOR_INSTALLWindows File System featureFALSE
AD_MONITOR_INSTALLWindows Active Directory Events featureFALSE
EXCHANGE_MONITOR_INSTALLExchange Server Monitoring featureFALSE
DNSLOOKUPS‘dnsLookups’ in the SIWindowsAgent.exe fileTRUE
CONFIGPARAMSKey value pairs used in SIWindowsAgent.exe.config Example Value: Key=value&SDEventFormat=PROTOBUF
LOCALPWNEDDBHaveIBeenPwned (HIBP) hash Database mode for Agent or Enterprise ManagerFALSE

Command Line Configuration Examples

The following examples show some standard scenarios for Agent installations.

NOTE: Parameters with TRUE or FALSE are case sensitive. In the examples, EMCERTIFICATE and ENROLLMENTSECRET have been generated and are unique to each install. These need to be retrieved from the Administration Console.

Installing a new Agent to monitor Active Directory and File Events Example

“SI Agent.exe” /q ENTMGR_IPADDRESS=10.0.21.1 FILE_MONITOR_INSTALL=TRUE AD_MONITOR_INSTALL=TRUE EMCERTIFICATE=261730F6D0E6400ECB3E4A09DD38B10C8BCA494F ENROLLMENTSECRET=E2401994866965EB

Upgrading an Agent Installation Example

“SI Agent.exe” /q ENTMGR_IPADDRESS=10.0.21.1 FILE_MONITOR_INSTALL=TRUE AD_MONITOR_INSTALL=TRUE