Views:
This section provides a summary of the different installation methods to perform a fresh installation of the Security Agent. All installation methods require local administrator rights on the target endpoints.
If you are installing Security Agents and want to enable IPv6 support, read the guidelines in Security Agent Installation and IPv6 Support.

Installation Methods

Installation Method/ Operating System Support
Deployment Considerations
WAN Deployment
Centrally Managed
Requires User Intervention
Requires IT Resource
Mass deployment
Bandwidth Consumed
Internal Web Page
Supported on all operating systems
Yes
Yes
Yes
No
No
Low, if scheduled
Email Notification
Supported on all operating systems
Yes
Yes
Yes
No
No
High, if installations start at the same time
Remote Install
Supported on all operating systems
No
Yes
No
Yes
Yes
Low, if scheduled
Login Script Setup
Supported on all operating systems
No
Yes
No
Yes
Yes
High, if installations start at the same time
Client Packager
Supported on all operating systems
Yes
No
Yes
Yes
No
Low, if scheduled
Trend Micro Vulnerability Scanner (TMVS)
Supported on all operating systems except Windows 10
No
Yes
No
Yes
Yes
Low, if scheduled
For single-site deployment and in organizations where IT policies are strictly enforced, IT administrators can choose to deploy using Remote Install or Login Script Setup.
In organizations where IT policies are less strictly enforced, Trend Micro recommends installing Security Agents using the Internal Web Page. Using this method, however, requires that end users who will install the Security Agent to have administrator privileges.
Remote Install is efficient for networks with Active Directory. If your network does not use Active Directory, use the Internal Web Page.