Skip to content
SecPod  – Documentation
  • Docs Home
  • Categories
    • SanerNow CyberHygiene Platform
    • Products
    • Security Intelligence
    • Supported OSs and Platforms
    • How Tos
    • Release Notes
    • Knowledge Base
    • FAQs
  • Other Resources
  • About SecPod
  • Contact Support
Search this website
Menu Close
  • Docs Home
  • Categories
    • SanerNow CyberHygiene Platform
    • Products
    • Security Intelligence
    • Supported OSs and Platforms
    • How Tos
    • Release Notes
    • Knowledge Base
    • FAQs
  • Other Resources
  • About SecPod
  • Contact Support
  • Docs Home
  • Categories
    • SanerNow CyberHygiene Platform
    • Products
    • Security Intelligence
    • Supported OSs and Platforms
    • How Tos
    • Release Notes
    • Knowledge Base
    • FAQs
  • Other Resources
  • About SecPod
  • Contact Support

SanerNow CyberHygiene Platform

  • Platform Function Guides
  • Getting Started with SanerNow
  • How does SanerNow’s deployment architecture work?
  • Pre-requisites for SanerNow Deployment

Products

SanerNow AVM
  • What’s New in SanerNow?
  • Product User Guides
  • Overview of SanerNow Advanced Vulnerability Management
Vulnerability Management
  • SanerNow Vulnerability Management User Guide
Patch Management
  • SanerNow Patch Management User Guide
Compliance Management
  • SanerNow Compliance Management User Guide
Asset Exposure
  • SanerNow Asset Exposure User Guide
Endpoint Management
  • SanerNow Endpoint Management User Guide
Posture Anomaly
  • SanerNow Continuous Posture Anomaly Management Tool Product Guide

Security Intelligence

  • List of IoA (Indicators of Attack) covered in SanerNow
  • List of Vulnerability to Exploit/Malware Mapping covered in SanerNow
  • Compliance Benchmark Coverage
  • Application and OS Remediation Coverage
  • OVAL Definitions Family-wise Distribution
  • OVAL Definitions Class-wise Distribution
  • OVAL Definitions Platform Coverage
  • Security Content Statistics
  • Overview of Security Content and Intelligence

Supported OSs and Platforms

  • Supported Third-party Applications for Patching
  • Operating Systems and Platforms Supported

How Tos

General
  • How to download and install Saner agent in Mac?
  • How to download and install Saner agent in Linux?
  • How to download and install the Saner agent in Windows?
  • How to update the expiry date of an existing subscription?
  • How to manage users and their preferences using role-based access?
  • How to create a new user in SanerNow?
  • How to onboard a new organization?
  • How to uninstall the Saner agent through SecPod Saner deployer?
  • How to deploy the Saner agent through SecPod Saner deployer?
  • How to install a Saner agent through the command line?
  • How to uninstall the Saner agent through command line?
  • How to create a new account in SanerNow?
  • How to sign-up with SanerNow?
Vulnerability Management
  • How to remediate vulnerabilities from vulnerability management dashboard?
  • How to manage excluded vulnerabilities in SanerNow?
  • How to exclude vulnerabilities in SanerNow?
  • How to automate and schedule vulnerability scans?
Patch Management
  • How to manage excluded patches in SanerNow?
  • How to exclude patches in SanerNow?
  • How to automate patch management in SanerNow?
  • How to roll back patches in SanerNow?
  • How to fix firmware in SanerNow?
  • How to apply missing patches in SanerNow?
  • How to check the status of patching activity?
  • How to apply the most critical patches in SanerNow?
Compliance Management
  • How to run a compliance scan?
  • How to custom create a security policy?
  • How to align with PCI security compliance management?
  • How to align with NIST 800-171 security compliance management?
  • How to align with NIST 800-53 security compliance management?
  • How to align with HIPAA security compliance management?
Asset Exposure
  • How to run an asset scan?
  • How to manage asset licenses?
  • How to blacklist and whitelist applications in SanerNow?
Endpoint Management
  • How to investigate total RAM or CPU threshold (greater than or equal to 80%) in Windows systems?
  • How to collect operating systems information in Windows?
  • How to investigate disks running out of space (<100 MB) in Windows systems?
  • How to collect and investigate disk information on Windows systems?
  • How to collect BIOS information such as serial number, version, manufacturer in Windows systems?
  • How to check the status of Windows Update Server (WSUS/SCCM)?
  • How to collect all software patches that are hidden in the Windows Update server?
  • How to collect all installed patches in Windows systems?
  • How to collect all the important missing patches in Windows systems?
  • How to collect mounted disk information on Linux systems?
  • How to check wireless signal quality in Linux systems?
  • How to check wireless security in Linux systems?
  • How to check all firewall policies on Linux systems?
  • How to collect DNS information on Linux systems?
  • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Linux systems?
  • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing in Linux?
  • How to check wireless signal quality in Windows systems?
  • How to check wireless security in Windows systems?
  • How to collect all open ports in Windows systems?
  • How to collect all network interfaces in Windows systems?
  • How to investigate DNS cache on Windows systems?
  • How to check all firewall policies on Windows systems?
  • How to collect DNS information on Windows systems?
  • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Windows systems?
  • How to collect all the applications with an unknown publisher in Mac systems?
  • How to collect environment variables set in all operating systems?
  • How to collect all families of operating systems such as Windows, Unix, and macOS?
  • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing Windows?
  • How to collect all software licenses in Mac systems?
  • How to collect all the applications with an unknown publisher in Windows systems?
  • How to collect a list of applications that are started when you boot your computer?
  • How to identify potentially unwanted programs such as torrent downloaders or unnecessary toolbars running on Windows systems?
  • How to collect all software licenses in Windows systems?
  • How to collect all the applications with an unknown publisher in Linux systems?
  • How to perform system tuning?
  • How to enable/disable devices in SanerNow?
  • How to block blacklisted applications in SanerNow?
  • How to delete and quarantine a file?
  • How to deploy software in SanerNow?
  • How to enable and disable firewall settings in SanerNow?
  • How to start and stop the processes in SanerNow?
Reports
  • How to schedule for the report back up?
  • How to create a custom report in SanerNow?
  • How to configure mail settings to email Report PDF?

Release Notes

  • Release Notes SanerNow 5.3
  • Release Notes SanerNow 5.2
  • Release Notes SanerNow 5.1
  • Release Notes SanerNow 5.0
  • Release Notes SanerNow 4.8.0.0
  • Release Notes SanerNow 4.7.0.0
  • Release Notes SanerNow 4.6.0.0
  • Release Notes SanerNow 4.5.0.0
  • Release Notes SanerNow 4.4.0.0
  • Release Notes SanerNow 4.3.0.0
  • Release Notes SanerNow 4.2.2.1
  • Release Notes SanerNow 4.2.2.0
  • Release Notes SanerNow 4.2.1.0
  • Release Notes SanerNow 4.2.0.0
  • Release Notes SanerNow 4.1.1.0
  • Release Notes SanerNow 4.0.0.5

FAQs

  • Technical FAQs
  • Home
  • Docs
  • How Tos
  • General
  • How to deploy the Saner agent through SecPod Saner deployer?

How to deploy the Saner agent through SecPod Saner deployer?

  1.  Download the Saner agent from the Offline Deployer option in the Control Panel.
  2.  Deployment tool can be used for device discovery and saner agent installation. SecPod Saner deployer options are as shown in the image below:

Note: To deploy Saner agents on Windows, we need to run the deployer script from a Windows system, and to install on Linux/macOS systems we need to run the deployer from Linux/macOS operating systems respectively.

3. To discover devices in the network, run the following command and pass the CSV filename as a command-line argument to the deployer,

Options:

–discoveryTo Run device discovery
–network_rangeNetwork IP Range
–light_scanDoes only ICMP scan (Optional) (Default: full scan)
–dis_result_csv_file Discovered IPs/Hosts will be stored in this CSV file
–get_host_names           Save hostname instead of host IPs (Optional)           (Default: Won’t collect hostnames)
–run_envRunning OS: From where this tool is being run (Values: Windows|Linux|Darwin)

> python.exe run.py –discovery options

> python.exe run.py –discovery –network_range=192.168.1.1/24 –dis_result_csv_file=hosts.csv –run_env=Windows

4. To deploy the Saner agent on Windows, run the following commands.

–deploy_saner                 To deploy Saner agent
–hostNetwork IP Range OR CSV file (Format: “ip address”,”username”,”password”) (credentials: optional, if passed from command-line)
–delete_host_csvTo delete/keep host CSV file, NOTE: We advise to delete this file, if credentials are present (Values: true|false)
–userUsername
–passPassword (passwords should be in double Quotes eg: –pass=”password”)
–first_scan_disableTo disable agent first scan just after the agent installation (Optional) (Default: First scan will be enabled)
–agent_activation_disableTo disable agent activation just after the agent installation (Optional) (Default: Agent activation will be enabled)
–agent_removeInclude to remove saner agent from endpoint (Optional) (Default: Agent will not be removed)
–uninstall_pass                Required if Saner agent uninstallation require password (Optional)
–ms_eulaAccept Microsoft eula to run psexec tool (Values: yes|no) (Optional)
–run_envRunning OS: From where this tool is being run (Values: Windows|Linux|Darwin)(Optional)(Default: Tries to find out automatically)
–proxy_ipProxy Server IP (Optional)
–proxy_portProxy Server Port (Optional)
–proxy_userProxy Username (Optional)
–proxy_passProxy Password (Optional)

> python.exe run.py –deploy_saner –host=192.168.2.1-100 –user=”Administrator” –pass=”password” –ms_eula=yes –run_env=Windows

5. To deploy the saner agent on Linux/macOS, run the following command

> python run.py –deploy_saner –host=hosts.csv –user=”root” –pass=”password” –delete_host_csv=false –agent_activation_disable –first_scan_disable

6. If a proxy is enabled, pass proxy details to the deployer script as shown below,

–proxy_ip=192.168.1.1 –proxy_port=80 –proxy_user=”proxy_user” –proxy_pass=”proxy_pass”

> python run.py –deploy_saner –host=192.168.1.100 –user=”root” –pass=”password” –proxy_ip=192.168.1.1 –proxy_port=80 –proxy_user=”proxy_user” –proxy_pass=”proxy_pass”

7. Other deployer tool options,

> python run.py –deploy_saner –host=hosts.csv –delete_host_csv=true –run_env=Linux –first_scan_disable

> python run.py –deploy_saner –host=hosts.csv –delete_host_csv=true –user=test_user –pass=”test_pass” –run_env=Linux –agent_activation_disable –first_scan_disable

> python run.py –deploy_saner –host=192.168.2.1-100 –user=domain\test_user –pass=”test_pass” –proxy_ip=192.168.1.1 –proxy_port=80 –proxy_user=”proxy_user” –proxy_pass=”proxy_pass” –ms_eula=yes –run_env=Windows

What are your Feelings
Share This Article :
  • Twitter
  • LinkedIn
Updated on October 10, 2022
How to uninstall the Saner agent through SecPod Saner deployer?How to install a Saner agent through the command line?
Copyright 2023 - SecPod. All Rights Reserved. Privacy Policy.