Skip to content
SecPod  – Documentation
  • Docs Home
  • Categories
    • SanerNow CyberHygiene Platform
    • Products
    • Security Intelligence
    • Supported OSs and Platforms
    • How Tos
    • Release Notes
    • Knowledge Base
    • FAQs
  • Other Resources
  • About SecPod
  • Contact Support
Search this website
Menu Close
  • Docs Home
  • Categories
    • SanerNow CyberHygiene Platform
    • Products
    • Security Intelligence
    • Supported OSs and Platforms
    • How Tos
    • Release Notes
    • Knowledge Base
    • FAQs
  • Other Resources
  • About SecPod
  • Contact Support
  • Docs Home
  • Categories
    • SanerNow CyberHygiene Platform
    • Products
    • Security Intelligence
    • Supported OSs and Platforms
    • How Tos
    • Release Notes
    • Knowledge Base
    • FAQs
  • Other Resources
  • About SecPod
  • Contact Support

SanerNow CyberHygiene Platform

  • Platform Function Guides
  • Getting Started with SanerNow
  • How does SanerNow’s deployment architecture work?
  • Pre-requisites for SanerNow Deployment

Products

SanerNow AVM
  • What’s New in SanerNow?
  • Product User Guides
  • Overview of SanerNow Advanced Vulnerability Management
Vulnerability Management
  • SanerNow Vulnerability Management User Guide
Patch Management
  • SanerNow Patch Management User Guide
Compliance Management
  • SanerNow Compliance Management User Guide
Asset Exposure
  • SanerNow Asset Exposure User Guide
Endpoint Management
  • SanerNow Endpoint Management User Guide
Posture Anomaly
  • SanerNow Continuous Posture Anomaly Management Tool Product Guide

Security Intelligence

  • List of IoA (Indicators of Attack) covered in SanerNow
  • List of Vulnerability to Exploit/Malware Mapping covered in SanerNow
  • Compliance Benchmark Coverage
  • Application and OS Remediation Coverage
  • OVAL Definitions Family-wise Distribution
  • OVAL Definitions Class-wise Distribution
  • OVAL Definitions Platform Coverage
  • Security Content Statistics
  • Overview of Security Content and Intelligence

Supported OSs and Platforms

  • Supported Third-party Applications for Patching
  • Operating Systems and Platforms Supported

How Tos

General
  • How to download and install Saner agent in Mac?
  • How to download and install Saner agent in Linux?
  • How to download and install the Saner agent in Windows?
  • How to update the expiry date of an existing subscription?
  • How to manage users and their preferences using role-based access?
  • How to create a new user in SanerNow?
  • How to onboard a new organization?
  • How to uninstall the Saner agent through SecPod Saner deployer?
  • How to deploy the Saner agent through SecPod Saner deployer?
  • How to install a Saner agent through the command line?
  • How to uninstall the Saner agent through command line?
  • How to create a new account in SanerNow?
  • How to sign-up with SanerNow?
Vulnerability Management
  • How to remediate vulnerabilities from vulnerability management dashboard?
  • How to manage excluded vulnerabilities in SanerNow?
  • How to exclude vulnerabilities in SanerNow?
  • How to automate and schedule vulnerability scans?
Patch Management
  • How to manage excluded patches in SanerNow?
  • How to exclude patches in SanerNow?
  • How to automate patch management in SanerNow?
  • How to roll back patches in SanerNow?
  • How to fix firmware in SanerNow?
  • How to apply missing patches in SanerNow?
  • How to check the status of patching activity?
  • How to apply the most critical patches in SanerNow?
Compliance Management
  • How to run a compliance scan?
  • How to custom create a security policy?
  • How to align with PCI security compliance management?
  • How to align with NIST 800-171 security compliance management?
  • How to align with NIST 800-53 security compliance management?
  • How to align with HIPAA security compliance management?
Asset Exposure
  • How to run an asset scan?
  • How to manage asset licenses?
  • How to blacklist and whitelist applications in SanerNow?
Endpoint Management
  • How to investigate total RAM or CPU threshold (greater than or equal to 80%) in Windows systems?
  • How to collect operating systems information in Windows?
  • How to investigate disks running out of space (<100 MB) in Windows systems?
  • How to collect and investigate disk information on Windows systems?
  • How to collect BIOS information such as serial number, version, manufacturer in Windows systems?
  • How to check the status of Windows Update Server (WSUS/SCCM)?
  • How to collect all software patches that are hidden in the Windows Update server?
  • How to collect all installed patches in Windows systems?
  • How to collect all the important missing patches in Windows systems?
  • How to collect mounted disk information on Linux systems?
  • How to check wireless signal quality in Linux systems?
  • How to check wireless security in Linux systems?
  • How to check all firewall policies on Linux systems?
  • How to collect DNS information on Linux systems?
  • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Linux systems?
  • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing in Linux?
  • How to check wireless signal quality in Windows systems?
  • How to check wireless security in Windows systems?
  • How to collect all open ports in Windows systems?
  • How to collect all network interfaces in Windows systems?
  • How to investigate DNS cache on Windows systems?
  • How to check all firewall policies on Windows systems?
  • How to collect DNS information on Windows systems?
  • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Windows systems?
  • How to collect all the applications with an unknown publisher in Mac systems?
  • How to collect environment variables set in all operating systems?
  • How to collect all families of operating systems such as Windows, Unix, and macOS?
  • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing Windows?
  • How to collect all software licenses in Mac systems?
  • How to collect all the applications with an unknown publisher in Windows systems?
  • How to collect a list of applications that are started when you boot your computer?
  • How to identify potentially unwanted programs such as torrent downloaders or unnecessary toolbars running on Windows systems?
  • How to collect all software licenses in Windows systems?
  • How to collect all the applications with an unknown publisher in Linux systems?
  • How to perform system tuning?
  • How to enable/disable devices in SanerNow?
  • How to block blacklisted applications in SanerNow?
  • How to delete and quarantine a file?
  • How to deploy software in SanerNow?
  • How to enable and disable firewall settings in SanerNow?
  • How to start and stop the processes in SanerNow?
Reports
  • How to schedule for the report back up?
  • How to create a custom report in SanerNow?
  • How to configure mail settings to email Report PDF?

Release Notes

  • Release Notes SanerNow 5.3
  • Release Notes SanerNow 5.2
  • Release Notes SanerNow 5.1
  • Release Notes SanerNow 5.0
  • Release Notes SanerNow 4.8.0.0
  • Release Notes SanerNow 4.7.0.0
  • Release Notes SanerNow 4.6.0.0
  • Release Notes SanerNow 4.5.0.0
  • Release Notes SanerNow 4.4.0.0
  • Release Notes SanerNow 4.3.0.0
  • Release Notes SanerNow 4.2.2.1
  • Release Notes SanerNow 4.2.2.0
  • Release Notes SanerNow 4.2.1.0
  • Release Notes SanerNow 4.2.0.0
  • Release Notes SanerNow 4.1.1.0
  • Release Notes SanerNow 4.0.0.5

FAQs

  • Technical FAQs
  • Home
  • Docs
  • How Tos
  • General
  • How to install a Saner agent through the command line?

How to install a Saner agent through the command line?

Step 1: Download the agent from Viser.

Step 2: Execute the following commands based on the operating system.

  • Windows Systems:

Extract the zip file downloaded from the Viser.

C:\> cd <zip file extracted path>

C:\ SanerNow_DemoAccount > SanerNow-Windows-noui-5.2.exe /S /ACTIVATION_TOKEN=spsaneractivation.conf

/S -> indicates silent installation option

/ACTIVATION_TOKEN -> to specify the path of the conf file, this is a mandatory option.

  • MacOS Systems:

unzip SanerNow_DemoAccount_OSX_x64_5.2.zip

cd SanerNow_DemoAccount

/bin/launchctl setenv ACTIVATION_TOKEN “<Path of spsaneractivation.conf>” (This step is not required if the spsaneractivation.conf and the SpSaner-minimal-x64.pkg files are in same location)

installer -pkg SpSaner-minimal-x64.pkg -target /

  • Linux Systems (DPKG, RPM, APK):

unzip SanerNow_DemoAccount_<linux flavour>_<arch>_5.2.zip

cd SanerNow_DemoAccount

chmod +x SpSaner-minimal-x64.bin

./SpSaner-minimal-x64.bin -c ‘spsaneractivation.conf’

  • Package installation on Linux Devices

DPKG Systems (Debian, Ubuntu, Linux Mint):

Note: To convert the bin file to a .deb or .rpm file run the bin file by passing the conf file using the -c option and -r to specify the path where the package must be created.

unzip SanerNow_DemoAccount_<linux flavour>_<arch>_5.2.zip

cd SanerNow_DemoAccount

chmod +x SpSaner-minimal-x64.bin

./SanerNow-Ubuntu-x64-noui-5.2.bin -c spsaneractivation.conf -r <path to create the package installer>

cd <path of the package installer>

sudo dpkg -i SpSaner-minimal-<arch>.deb

RPM Systems (Redhat, Fedora, CentOS, Oracle Linux, Amazon Linux, AMI, Amazon Linux 2, Alma Linux, Rocky Linux):

unzip SanerNow_DemoAccount_<linux flavour>_<arch>_5.2.zip

cd SanerNow_DemoAccount

chmod +x SpSaner-minimal-x64.bin

./SanerNow-Ubuntu-x64-noui-5.2.bin -c spsaneractivation.conf -r <path to create the package installer>

cd <path of the package installer>

sudo rpm -ivh SpSaner-minimal-<arch>.rpm

ALPINE Systems:

unzip SanerNow_DemoAccount_<linux flavour>_<arch>_5.2.zip

cd SanerNow_DemoAccount

chmod +x SpSaner-minimal-x64.bin

./SanerNow-Ubuntu-x64-noui-5.2.bin -c spsaneractivation.conf -r <path to create the package installer>

cd <path of the package installer>

sudo apk add SpSaner-minimal-<arch>.rpm –allow-untrusted

  • To add proxy parameters in Windows, add the following options as provided in the example below.

C:\> SpSaner-minimal-x86.exe /S /ACTIVATION_TOKEN=<path of spsaneractivation.conf> /AUTODETECTPROXY=false /PROXYENABLE=true /PROXYURL=”ProxyServer” /PROXYPORT=”ProxyPort” /PROXYAUTHENABLE=true /PROXYUNAME=”ProxyUserName” /PROXYPASSWORD=”ProxyUserPass”

  • Other command line options for silent mode in windows:

/INSTDIR=<install-directory> – Add the path inside double quotes if it contains spaces.

/SANER_FIRST_SCAN=<TRUE|FALSE> – Use is it to enable/disable FIRST SCAN, where FALSE represents disable. By default, scan is enabled.

/SANER_ACTIVATE_OFF=<TRUE> – Mention TRUE if activation is not required after install.

/AUTODETECTPROXY=<true|false> – Detects the system proxy settings and uses them. If this is set, other proxy options from command line are not read.

/PROXYENABLE=<true|false> – If set to ‘true’, ‘PROXYURL’ and ‘PROXYPORT’ MUST be specified.

/PROXYURL=<proxy-url> – Mention the proxy server URL

/PROXYPORT=<proxy-port>

/PROXYAUTHENABLE=<true|false> – If set ‘true’, ‘PROXYUNAME’ and ‘PROXYPASSWORD’ parameters MUST be specified.

/PROXYUNAME=<user-name>

/PROXYPASSWORD=<password>

/D=<install-directory> – Alternative option for specifying install path. If you use this, it MUST be used as the last option on the command line.

***Please note all options and values are case sensitive***

Note: In the case of Linux-based and Mac operating systems, proxy parameters are taken from default system settings.

What are your Feelings
Share This Article :
  • Twitter
  • LinkedIn
Updated on October 10, 2022
How to deploy the Saner agent through SecPod Saner deployer?How to uninstall the Saner agent through command line?
Copyright 2023 - SecPod. All Rights Reserved. Privacy Policy.