The Push Installation Process - McAfee TSA00M005PAA - Total Protection Service Installation Manual

Installation guide
Hide thumbs Also See for TSA00M005PAA - Total Protection Service:
Table of Contents

Advertisement

Installing Total Protection Service

The push installation process

Parameter
/Email=x@y.com
/Uninstall
/SetRelayServerEnable=1
/Reinstall
/Groupid=[group number]
/P=b
/P=c
/P=f
/P=v
Examples
VSSETUP.EXE /vfbc /CK=abcd /Email=joe@example.com /Groupid=3
Virus and spyware protection, firewall protection, browser protection, and content filtering are
installed. The company key is
purposes, and this user is placed in an existing group represented by the number
Computer Profiles report to find the correct numeric groupid.
VSSETUP.EXE /CK=abcd /Email=joe@example.com
Only virus and spyware protection is installed. The company key is abcd and the user's email
address is
joe@example.com
The push installation process
Push means deploying remotely to one or more computers in a network. This method uses the
Push Install utility to deploy the client software directly from your service provider's website to
client computers on your network. Push installation does not require third-party deployment
software or interaction with users.
To perform a push installation:
Designate an administrative computer , where you will install the Push Install utility and
1
initiate the push.
McAfee Total Protection Service Installation Guide
Description
Identifies the user's email address in administrative reports.
NOTE:
Despite its name, the email variable does not need to be an email
address. Do not use a string containing non-standard characters, because
they might be displayed incorrectly in reports.
Uninstalls Total Protection Service.
Sets a computer with a connection to the Internet as a relay server. If the
computer is not used as a relay server, set to 0.
Reinstalls Total Protection Service, leaving the previous values for company
key, email address, and machine ID intact.
Places the computer into any group you have created. You can find the
number associated with a group by checking the Computer Profiles report
or by generating a customized URL. The group ID is at the end of the URL
G=xx
in the format
.
NOTE:
If you designate a group that does not exist, users are placed in
the Default Group.
Selects the types of protection to install:
b
— browser protection
c
— content filtering
f
— firewall protection
v
— virus and spyware protection
/P
NOTE:
If you omit the
installed.
, the user's email address is
abcd
for reporting purposes.
parameter, only virus and spyware protection is
for reporting
joe@example.com
. Check the
3
21

Advertisement

Table of Contents
loading

This manual is also suitable for:

Total protection service

Table of Contents