The PCSM Agent LanDeploy feature is a method of deployment subject to certain pre requisites and it is, therefore, not recommended for larger networks. For networks with a domain controller, the PCSM Active Directory deployment method is the recommended method of installation in this instance. Requirements Remote access to the Admin$ share must be enabled to initiate […]
Articles Tagged: Panda
How to install/uninstall the Systems Management Linux agent (Panda)
How to install the PCSM Linux agent on Red Hat Ensure your username is part of the Red Hat sudoers list or any further commands you issue will fail. If you are not part of the sudoers list, log in as root with the password you set prior and run the following terminal command: echo ‘USERNAME ALL=(ALL) […]
How to reset the Systems Management agent ID in cloned machines (Panda)
Situation Companies tend to use system cloning: that is, they create an image of the system and install it on X computers. A unique agent identifier (ID) is generated every time PCSM is installed. So, if an image of a system with PCSM installed is created, the image will also include the agent identifier. Thus, […]
What is Systems Management? (Panda)
Systems Management is a hosted service for Remote Monitoring and Management (RMM) of multiple devices over a variety of networks – including the public internet. The basic principle is as follows: An agent is installed on every device including the administrator’s. The agent connects back to the hosted server and submits audit and performance information […]
Getting started with Systems Management (Panda)
This article provides a summary of the steps to take to start using Systems Management. Creating your Panda Account Systems Management delegate credential management to an identity provider (IDP), a centralized application responsible for managing user identity. This means that with a single Panda account, the network administrator will have secure and simple access to […]
How to Manage and Monitor Network Devices using SNMP with Systems Management (Panda)
Introduction There are times when you would like to manage and monitor certain devices or services but you cannot install an Agent on them to make them a fully Managed device. For example, you may want to know when the memory usage of a switch port goes over a certain threshold or if the battery […]
How can I upgrade Microsoft .NET Framework from Systems Management? (Panda)
Currently, the Systems Management agent requires .NET version 4.0.3 to be installed in order to run, as it is explained in the System Requirements support article. To help customers prepare for this requirement, Systems Management provides some extra features to help you identify the devices that do not meet these requirements and to then upgrade them. As […]
How to deploy agents over a network using the Systems Management Agent Active Directory deployment method (Panda)
Introduction Systems Management agents can be deployed in a number of ways, depending on how your devices are attached, or located. These deployment methods can include using an existing software deployment mechanism, manual installs (either by technicians or end-users), or using the LAN Deploy tool built into the agent itself. However, if you are planning […]
What is Panda Fusion 360 and Panda Fusion and what are their technical requirements? (Panda)
Panda Fusion 360 is a bundle of the following products: Panda Adaptive Defense 360 and Panda Systems Management whereas Panda Fusion is a bundle of Panda Endpoint Protection Plus and Panda Systems Management. These are the system requirements: Workstations and file servers Operating systems (workstations): Windows XP SP3, Windows Vista 32/64-bit, Windows 7 (32/64-bit), Windows 8/8.1 (32/64-bit) and Windows 10 (32/64-bit). Operating […]
Systems Management access requirements: ports and URLs (Panda)
The Systems Management (PCSM) dynamic load balancing technology means that no single IP address is ever assigned to the PCSM configuration. This greatly increases our platform resilience as we have no single point of failure. If you are configuring a firewall for Systems Management, access should be open, outbound to the following IP addresses: IP […]