đĻ Agent Installation & Setup
Deploy the CyberVault agent on your endpoints to enable real-time threat detection and compliance monitoring.
Prerequisites
Ensure your environment meets the following requirements before proceeding.
| Platform | Minimum Version | Architecture | Network Access |
|---|---|---|---|
| Linux (Debian/Ubuntu) | 20.04 LTS | x86_64, ARM64 | TCP/443 to SOC |
| Linux (RHEL/CentOS) | 8.0 | x86_64, ARM64 | TCP/443 to SOC |
| Windows | 10 / Server 2019 | x64, ARM64 | TCP/443 to SOC |
| macOS | 12.0 (Monterey) | x86_64, ARM64 | TCP/443 to SOC |
Installation Methods
Select your operating system to view the appropriate installation instructions.
Quick Install (Recommended)
For automated installation on supported Linux distributions:
curl -fsSL https://install.cybervault.ai | sudo bash -s -- --edition=enterprise
Package Manager Installation
For manual control over package updates:
Debian / Ubuntu
# Add the CyberVault repository wget -qO - https://repos.cybervault.ai/gpg.key | sudo gpg --dearmor -o /usr/share/keyrings/cybervault-archive-keyring.gpg echo "deb [signed-by=/usr/share/keyrings/cybervault-archive-keyring.gpg] https://repos.cybervault.ai/apt stable main" | sudo tee /etc/apt/sources.list.d/cybervault.list # Install the agent sudo apt update sudo apt install cybervault-agent
RHEL / CentOS / Rocky
# Add the CyberVault repository sudo yum-config-manager --add-repo https://repos.cybervault.ai/yum/cybervault.repo # Install the agent sudo yum install cybervault-agent
PowerShell Installation
Run the following commands in PowerShell as Administrator:
# Download the installer Invoke-WebRequest -Uri https://install.cybervault.ai/windows/latest.msi -OutFile cybervault-agent.msi # Install with silent flags msiexec /i cybervault-agent.msi /quiet /norestart LICENSE_KEY="YOUR_LICENSE_KEY"
Chocolatey Package
If you use Chocolatey as your package manager:
choco install cybervault-agent --version 2.4.1
Homebrew Installation
The easiest way to install on macOS is via Homebrew:
brew tap cybervault/agent brew install cybervault-agent
Manual PKG Installation
curl -O https://install.cybervault.ai/macos/latest.pkg sudo installer -pkg latest.pkg -target /
Initial Configuration
After installation, configure the agent with your license key and connect it to your SOC endpoint.
Set License Key
sudo cybervault config set --license-key "YOUR_LICENSE_KEY" # Verify license cybervault license status
Configure SOC Endpoint
By default, the agent connects to us-east-1.soc.cybervault.ai. To use a custom or on-premise endpoint:
sudo cybervault config set --soc-endpoint "https://soc.yourcompany.internal:8443" # Optional: Specify tenant ID for multi-tenant setups cybervault config set --tenant-id "YOUR_TENANT_ID"
Verification & Health Check
Confirm the agent is running and communicating with the CyberVault SOC.
$ sudo cybervault status đĄī¸ CyberVault Agent v2.4.1 ââââââââââââââââââââââââââââââââââââââââ Status: â Active License: Enterprise (Valid until 2026-01-01) SOC Endpoint: us-east-1.soc.cybervault.ai Connection: đ Connected (12ms latency) Kernel Module: â Loaded Monitoring: 4,281 processes tracked Threats: 0 detected ââââââââââââââââââââââââââââââââââââââââ $ sudo cybervault health â All systems operational âĸ Kernel integrity: Verified âĸ Agent service: Running âĸ Data pipeline: Flowing âĸ Policy engine: Active
Troubleshooting
Common Issues
-
Connection Refused: Verify firewall rules allow outbound TCP/443 to the SOC endpoint. Check proxy settings if applicable.
-
Kernel Module Failed: Ensure kernel headers are installed (
sudo apt install linux-headers-$(uname -r)) and reboot the system. -
Permission Denied: Run commands with
sudo. Ensure the user is in thesudoersgroup. -
High CPU Usage: The agent performs an initial baseline scan on first run. This should settle within 5 minutes. If persistent, run
cybervault logs --level debug.
Viewing Logs
Access detailed agent logs for debugging:
# View last 50 lines sudo cybervault logs --tail 50 # Stream live logs sudo cybervault logs --follow # Export logs for support cybervault support export --destination /tmp/cyber-dump.tar.gz
Next Steps
After successful installation:
-
Configure security policies tailored to your workload.
-
Set up alert rules and notification channels.
-
Review the SOC Dashboard to see your new endpoint.
-
Scale deployment using API automation or configuration management tools.