Deploying endpoint security software manually across a multitude of Windows and macOS devices can be tedious and error-prone. This automation simplifies and streamlines the process, ensuring every tagged device installs Huntress reliably while automatically alerting you to any failures.
Description
This automation is engineered to install Huntress on Windows and macOS with minimal effort. It utilizes a custom field in Level for the Huntress Tokens, allowing you to set a global token or override it for specific client device groups—providing the flexibility needed for varied environments. The process can be triggered manually or automatically when a device is tagged with “Huntress.”
In addition to facilitating the installation, the automation proactively creates an alert for any device where the Huntress installation fails. This immediate feedback enables IT professionals and MSPs to quickly investigate and resolve issues. For enhanced security oversight, it is recommended to pair this automation with a dedicated Security Monitor that continuously tracks Huntress’s performance across your network.
Preview
Use Cases
Bulk Deployment: Rapidly install Huntress on numerous Windows and macOS devices with a single tag.
Customized Security: Utilize a global or group-specific Huntress Token to tailor configurations for different environments.
Real-Time Alerting: Automatically generate alerts if a device fails to install Huntress, enabling swift troubleshooting.
Flexible Execution: Run the automation manually for testing or automatically via device tagging for routine deployments.
Enhanced Security Monitoring: Pair with a Security Monitor to ensure continuous oversight and proactive management of endpoint security.
Recommendations
Token Configuration: Ensure the Level custom field for Huntress has been properly set up with correct global and client-specific values.
Pre-Deployment Testing: Run the automation in a test environment to confirm it functions as expected before broad deployment.
Consistent Tagging Protocols: Establish clear guidelines for tagging devices with “Huntress” to maintain consistent deployment practices. We recommend automatically tagging endpoints based on desired state.
Monitor Integration: Combine this automation with a Security Monitor to receive real-time updates and address any installation issues promptly.
Regular Updates: Keep the automation script and Huntress installer up-to-date to align with the latest security features and patches.
FAQ
How is the Huntress installation triggered? The installation can be initiated manually or automatically when a device is tagged with “Huntress,” which triggers the deployment process on supported Windows and macOS devices.
What role does the Huntress Token play? The Huntress Token authenticates and configures the Huntress installation. It can be defined globally or overridden for specific client groups via Level’s custom field.
What happens if the installation fails? An alert is automatically generated for any device where the Huntress installation fails, allowing you to quickly investigate and resolve the issue.
Is this automation compatible with non-Windows devices? Yes, this automation is compatible with both Windows and macOS operating systems.
Why should I pair this automation with a Security Monitor? Pairing with a Security Monitor provides continuous oversight, ensuring prompt detection and resolution of any issues, and maintains robust endpoint security.
Included with this Automation:
Below is a list of what you can expect to find when importing this Automation.
Script details:
The following data and settings will be imported with your script.