-
Installing RocketCyber agent for Linux
Requirements The RocketCyber linux agent supports the following versions and higher: ubuntu 18 / centos 7 / Red Hat / AWS linux 2 Agent must be installed with sudo privileges, which the default install script provides. Installation 1. Navigate to the deployment view from within one of the customer accounts. Agent must be…
-
Configure RocketCyber Agent for VDI Environments
Overview The RocketCyber agent identifies devices through a fingerprint mechanism where it will collect various attributes about a device such as hostname, MAC address, hardware serial numbers etc and create a unique fingerprint hash to identify the device across install and uninstalls of an agent. This technique is…
-
RocketCyber Secure Protocol / TLS Requirements
Beginning July 31, 2021 the RocketCyber Cloud requires clients connecting to utilize the TLS 1.2 or higher security protocol. Most modern browsers and operating systems have this capability built in and can auto negotiate. There are a few cases on Microsoft Windows where TLS 1.2 is either not enabled or not the default…
-
Ports and Endpoints Required for RocketCyber Agent
The RocketCyber Agent communicates to the RocketCyber Cloud via the following destinations. If the network environment limits access to the internet, please allow the following destinations and ports via firewalls or proxies for proper agent functionality. For RocketCyber US Instance DescriptionPORTHostnameMain agent…
-
How To Uninstall RocketCyber Agent
The RocketCyber Agent can be uninstalled from a system using the following methods. Powershell - Windows Attached to this article is a Powershell script which can be used to automate the uninstall of the RocketCyber Agent. **The attachment is called rocketagent_uninstall.ps1 Command Line Uninstall - Windows If you prefer…
-
Installing RocketCyber Agent for macOS
Requirements RocketCyber agent for macOS supports macOS 10.14 and 10.15. Agent must be installed with sudo privileges, which the default install script provides. Installation 1. Navigate to the deployment view from within one of the customer accounts. 2. Click on the macOS tab 3. Click the Select & Copy button to copy the…
-
Event Log Monitoring for macOS
Learn about and configure event log monitoring for Mac Overview The RocketCyber Suspicious Event Log Monitor app is designed to collect desired log data from the Unified Event Log found in modern versions of macOS. Configuration 1. From the dashboard in the MSP, Customer, or a Device context, click the Configure button on…
-
Deploy RocketAgent using GPO Scheduled Tasks
This guide will walk through using the Microsoft Group Policy Objects and Scheduled Tasks to deploy the RocketCyber Agent. A few notes about the deployment script: * The console generates a PowerShell script per customer that automatically includes the information required to deploy the agent, specifically the license key…
-
Deploying RocketCyber using SolarWinds RMM
This guide will walk through using the Solarwinds RMM to deploy the RocketCyber Agent. First, a few notes about the deployment script: * The console generates a PowerShell script per customer that automatically includes the information required to deploy the agent, specifically the license key and the URL. The script first…
-
Deploying RocketCyber using Ninja RMM
This guide will walk through using the Ninja RMM to deploy the RocketCyber Agent. First, a few notes about the deployment script: * The console generates a PowerShell script per customer that automatically includes the information required to deploy the agent, specifically the license key and the URL. The script first…