2.1 Implementation Checklist

Use the following checklist to plan and install the agent:

Assess your environment to determine the hardware configuration. Ensure that the computers on which you install Security Agent for UNIX meet the specified requirements. For more information, see System Requirements for Security Agent for UNIX.

Install the security product you want to use with the Agent. If you are using Sentinel, install the Agent Manager Connector as well.

Depending on your Agent deployment requirements, determine whether you need to install UAM. For more information, see Table 1-1, UAM functionality for Sentinel.

Review the deployment considerations to understand how you can install, upgrade, and manage agents. For more information, see Deployment Considerations.

Install the Agent on the computer you want to monitor.

Ensure that the audit service is running on the Agent without any interruption. For more information see, Validating Agent Services Installation.

(Conditional) For Sentinel, deploy Sentinel rules using UAM on the endpoint that helps you to route the parsed event data according to the rules you define. For information about how to deploy rules, see Deploying Rule Sets.