This section provides an overview of the most important considerations for installing or upgrading Security Agent for UNIX.
For varied Security Agent for Unix deployment configurations, refer Table 2-2 for recommended agent management tools and procedures.
Table 2-1 Install or Upgrade for Individual Products and Product Combinations
Agents and Deployment Configuration |
Tool Required for New Installation or Upgrade |
---|---|
Sentinel |
UAM |