The Communicator’s Corner: Secret Agent, Man

(Title inspired by a favorite song by Johnny Rivers that was a hit just a few years ago.)

Secret Agent

Did you know that Shavlik Protect provides all of this functionality using both agentless and agent-based technologies?

In my last few blog posts, I have talked about three prominent features in Shavlik Protect that go beyond the core patch management capabilities. The threat management, power management, and ITScripts features in Shavlik Protect make it much more than a utility used once a month at patch time. Rather, it is a multi-use, unified IT management platform that provides incredible value to your organization every single day.

Now that that secret is out of the bag, I thought I’d let you in on another. Did you know that Shavlik Protect provides all of this functionality using both agentless and agent-based technologies? It’s true! Most everyone is familiar with Shavlik Protect’s agentless capabilities – it is, after all, part of what helps you get up and running with the product in 30 minutes or less. But agents? That seems to be an untold story.

Here’s the scoop: Although performing actions on your target machines from a central console has many advantages, certain types of users or systems can pose problems for agentless solutions. For example, machines that must reside in a de-militarized zone (DMZ), roaming users, and disconnected or inactive machines can all prove problematic. In these cases an agent-based solution is often the best answer.

Implementing agents in Shavlik Protect is a relatively easy, two-step process. You first configure one or more agent policies on the console. Then, you install the agents on your target machines either by pushing them from the Shavlik Protect console or by manually installing them on individual machines. Once they are up and running, the agents will report all activity to the console so you can track their actions.

Depending on how they are configured when installed on a machine, an agent can:

  • Scan for and deploy missing patches
  • Scan for asset information
  • Provide real-time monitoring and protection against known and unknown threats
  • Scan for and remediate existing threats such as spyware, viruses, Trojans, and rootkits
  • Shut down or restart the agent machine on specific days and times
  • Listen to the console or the cloud for policy updates
  • Report the results to the local console

Not bad, huh? Here are a few options if you are interested in learning more.