If you do not sign the waptagent.exe installer with a commercial Code Signing certificate or a Code Signing certificate issued by the Certificate Authority of your Organization after having generated it, web browsers will show a warning message when downloading the installer.
To remove the warning message, you MUST sign the .exe with a Code Signing certificate that can be verified by a CA bundle stored in the host’s certificate store.
The configurations are set on the WAPT Console.
If there are no configuration you would deploy, you can set manually the WAPT Repository URL and the WAPT Server URL, but no certificate will be deployed.
Install the WAPT Agent by clicking on Install.
Wait for the installation of the WAPT Agent to finish, then click on Finish to exit.
The installation of the WAPT Agent is finished.
The registration of the host with the WAPT Server is done automatically.
Click on Open to confirm the importation of the the WAPT Deployment utility binary.
Hint
It is necessary to provide the checksum of the waptagent.exe as an argument to the the WAPT Deployment utility GPO.
This will prevent the remote host from executing an erroneous / corrupted waptagent binary.
Parameters and waptagent.exe checksum to use for the the WAPT Deployment utility GPO are available on the WAPT Server by visiting https://srvwapt.mydomain.lan.
When waptdeploy.exe queries the WAPT Server to obtain the WAPT Agent URL, the download repository is chosen according to the rules defined for remote repositories.
The benefit of this method is that you only need one GPO to deploy WAPT onto your entire fleet of computers!
It is necessary to provide the checksum of the waptagent.exe as argument to the WAPT Deployment utility.
This will prevent the remote host from executing an erroneous / corrupted waptagent binary.
Parameters and the waptagent.exe checksum to use for the the WAPT Deployment utility GPO are available on the WAPT Server by visiting https://srvwapt.mydomain.lan.
In the Settings tab, only check Run task as soon as possible after a scheduled start is missed.
Hint
To verify that the GPO is working, you can run the gpupdate /force command and verify that the scheduled task is present on the computer by launching Task Scheduler as a Local Administrator.
Download and install the WAPT Agent (note: the hash string may change, to get the latest, point your browser on the url https://wapt.tranquil.it/wapt/releases/wapt-2.5/).
Choose the version depending on your processor architecture (intel or m1):
# for mac m1
curl-otis-waptagent-2.5.2.15207-ed70d8c7-macos-all-arm64.pkghttp://wapt.tranquil.it/wapt/releases/wapt-2.5.2.15207-ed70d8c7/tis-waptagent-2.5.2.15207-ed70d8c7-macos-all-arm64.pkg
# for mac intel
curl-otis-waptagent-2.5.2.15207-ed70d8c7-macos-all-x86_64.pkghttp://wapt.tranquil.it/wapt/releases/wapt-2.5.2.15207-ed70d8c7/tis-waptagent-2.5.2.15207-ed70d8c7-macos-all-x86_64.pkg
sudoinstaller-target/-pkgtis-waptagent*.pkg
1.2.1. Installing the WAPT Agent configuration file¶
Before installing the WAPT Agent configuration file, you have to create a initial config for you agent in your WAPT Console.
Warning
The WAPT Agent configuration wizard is only available on WAPT Entreprise Edition.
To configure Linux WAPT Agent, please refer to the manual WAPT Agent configuration method.
When done, copy the command with the Copy installation command.
There are some features that are not currently available on Linux and macOS:
installing updates on shutdown (WAPT Exit);
any Windows specific feature.
1.2.1.2. Particularities with domain functionality¶
On Linux:
Testing was carried out with sssd with an Active Directory domain and kerberos authentication.
To integrate a host in the Active Directory domain, you can choose to follow this documentation.
In order for Active Directory groups to function properly, you MUST verify that the id hostname$ command returns the list of groups the host is a member of.
Attention
We have noticed that the kerberos LDAP query does not work if the reverse DNS record is not configured correctly for the domain controllers.
These records MUST therefore be created if they do not exist.
1.3. Manual method to configure the WAPT Agent running on Linux / macOS¶
If you already have configured your WAPT Server to use correct Nginx SSL/TLS certificates, you MUST copy the certificate in your WAPT Linux or macOS Agent.
The certificate should be located on your Windows host in C:\ProgramFiles(x86)\wapt\ssl\server\.
Copy your certificate(s) in /opt/wapt/ssl/server/ using WinSCP or rsync if you are deploying on Linux or macOS.
Then, modify in the /opt/wapt/wapt-get.ini configuration file the path to your certificate.
The next window must be carefully reviewed, as it defines the baseline configuration for all your WAPT agents on Windows.
Ensure that the embedded certificates and desired parameters for your entire infrastructure are correctly configured before proceeding.
It is recommended to start with a basic configuration for the agent and use configuration packages to define specific behaviors for different machines (distinguishing between workstation and server updates, etc.).
You have now updated your WAPT agent for Windows.
Ensure that the waptupgrade package is available on the machines or assigned to an Organizational Unit (OU) that includes them.
While you generate the WAPT Agent, package named waptupgrade is created.
This package is a standard WAPT package designed to upgrade the WAPT Agents on remote hosts.
Hint
For now, waptupgrade only works for Windows.
Waptupgrade does not upgrade the WAPT Agent if the WAPT Server version and the WAPT Agent version are the same.
Upgrading the WAPT Agents using the waptupgrade package is a two step process:
First the package copies the waptsetup.exe file on the client computer and creates a scheduled task that will run waptsetup.exe with predefined installation flags two minutes after the creation of the scheduled task.
At that point the package itself is installed and the inventory on the WAPT Server shows the package installation as OK, with the correct version installed, but the inventory will still show the old version as the WAPT Agent is not yet updated.
After two minutes, the scheduled task starts and runs waptsetup.exe with a predefined configuration created in the WAPT Console.
This new method keeps the waptsetup.exe signed by Tranquil IT, but the WAPT Agent configuration will come from the WAPT Server.
waptsetup.exe shutdowns the local WAPT service, upgrades WAPT locally, and then restarts the WAPT service.
The scheduled task is then automatically removed and the WAPT Agent starts sending back its inventory to the WAPT Server.
From then on, the inventory on the WAPT Server will show the new version of the WAPT Agent.