2.4 Deployment Considerations

This section provides an overview of the most important considerations for installing or upgrading Security Agent for UNIX.

For varied Security Agent for Unix deployment configurations, refer Table 2-2 for recommended agent management tools and procedures.

Table 2-1 Install or Upgrade for Individual Products and Product Combinations

Agents and Deployment Configuration

Tool Required for New Installation or Upgrade

Sentinel

UAM