If you do not sign the waptagent.exe installer with a commercial Code Signing certificate or a Code Signing certificate issued by the Certificate Authority of your Organization after having generated it, web browsers will show a warning message when downloading the installer.
To remove the warning message, you MUST sign the .exe with a Code Signing certificate that can be verified by a CA bundle stored in the host’s certificate store.
The configurations are set on the WAPT Console.
If there are no configuration you would deploy, you can set manually the WAPT Repository URL and the WAPT Server URL, but no certificate will be deployed.
Install the WAPT Agent by clicking on Install.
Wait for the installation of the WAPT Agent to finish, then click on Finish to exit.
The installation of the WAPT Agent is finished.
The registration of the host with the WAPT Server is done automatically.
Click on Open to confirm the importation of the the WAPT Deployment utility binary.
Hint
It is necessary to provide the checksum of the waptagent.exe as an argument to the the WAPT Deployment utility GPO.
This will prevent the remote host from executing an erroneous / corrupted waptagent binary.
Parameters and waptagent.exe checksum to use for the the WAPT Deployment utility GPO are available on the WAPT Server by visiting https://srvwapt.mydomain.lan.
When waptdeploy.exe queries the WAPT Server to obtain the WAPT Agent URL, the download repository is chosen according to the rules defined for remote repositories.
The benefit of this method is that you only need one GPO to deploy WAPT onto your entire fleet of computers!
It is necessary to provide the checksum of the waptagent.exe as argument to the WAPT Deployment utility.
This will prevent the remote host from executing an erroneous / corrupted waptagent binary.
Parameters and the waptagent.exe checksum to use for the the WAPT Deployment utility GPO are available on the WAPT Server by visiting https://srvwapt.mydomain.lan.
In the Settings tab, only check Run task as soon as possible after a scheduled start is missed.
Hint
To verify that the GPO is working, you can run the gpupdate /force command and verify that the scheduled task is present on the computer by launching Task Scheduler as a Local Administrator.
Download and install the WAPT Agent (note: the hash string may change, to get the latest, point your browser on the url https://wapt.tranquil.it/wapt/releases/wapt-2.5/).
Choose the version depending on your processor architecture (intel or m1):
# for mac m1
curl-otis-waptagent-2.5.2.15207-ed70d8c7-macos-all-arm64.pkghttp://wapt.tranquil.it/wapt/releases/wapt-2.5.2.15207-ed70d8c7/tis-waptagent-2.5.2.15207-ed70d8c7-macos-all-arm64.pkg
# for mac intel
curl-otis-waptagent-2.5.2.15207-ed70d8c7-macos-all-x86_64.pkghttp://wapt.tranquil.it/wapt/releases/wapt-2.5.2.15207-ed70d8c7/tis-waptagent-2.5.2.15207-ed70d8c7-macos-all-x86_64.pkg
sudoinstaller-target/-pkgtis-waptagent*.pkg
1.2.1. Installing the WAPT Agent configuration file¶
Before installing the WAPT Agent configuration file, you have to create a initial config for you agent in your WAPT Console.
Warning
The WAPT Agent configuration wizard is only available on WAPT Entreprise Edition.
To configure Linux WAPT Agent, please refer to the manual WAPT Agent configuration method.
When done, copy the command with the Copy installation command.
There are some features that are not currently available on Linux and macOS:
installing updates on shutdown (WAPT Exit);
any Windows specific feature.
1.2.1.2. Particularities with domain functionality¶
On Linux:
Testing was carried out with sssd with an Active Directory domain and kerberos authentication.
To integrate a host in the Active Directory domain, you can choose to follow this documentation.
In order for Active Directory groups to function properly, you MUST verify that the id hostname$ command returns the list of groups the host is a member of.
Attention
We have noticed that the kerberos LDAP query does not work if the reverse DNS record is not configured correctly for the domain controllers.
These records MUST therefore be created if they do not exist.
1.3. Manual method to configure the WAPT Agent running on Linux / macOS¶
If you already have configured your WAPT Server to use correct Nginx SSL/TLS certificates, you MUST copy the certificate in your WAPT Linux or macOS Agent.
The certificate should be located on your Windows host in C:\ProgramFiles(x86)\wapt\ssl\server\.
Copy your certificate(s) in /opt/wapt/ssl/server/ using WinSCP or rsync if you are deploying on Linux or macOS.
Then, modify in the /opt/wapt/wapt-get.ini configuration file the path to your certificate.