LogoLogo
LearnDocumentationSupportCommunity
Version 6.30
Version 6.30
  • Welcome
  • Nexthink V6
  • Overview
    • Software components
    • Collector
    • Finder
    • Engine
    • Portal
    • Nexthink Library
    • Digital Experience Score
  • Installation and configuration
    • Planning your installation
      • Overview of the installation process
      • Hardware requirements
      • Connectivity requirements
      • Software requirements
      • Reference architectures
    • Installing Portal and Engine Appliances
      • Installing the Appliance
      • Installing the Appliance on Azure
      • Installing the Appliance on AWS
      • Installing the Appliance on OTC
      • Managing Appliance accounts
      • Setting the names of the Portal
      • Setting the names of the Engines
      • Specifying your internal networks and domains
      • Federating your Appliances
      • STIG compliance in Web Console
      • Connecting the Portal to the Engines
      • Configuring session performance storage
      • Configuring device performance storage
      • Setting up a software license
      • Sending email notifications from the Appliance
      • Allocating resources for the Portal
    • Installing the Collector
      • Installing the Collector on Windows
      • Installing the Collector on macOS
      • Installing the Collector for a Proof of Value
      • Assigning Collectors to Engines
      • Assignment of roaming Collectors
      • Collector MSI parameters reference table
      • Nxtcfg - Collector configuration tool
      • Inspecting the connection status of the Collector
      • Querying the status of the TCP connection of the Collector
      • Reporting the URL of HTTP web requests
      • Auditing logon events
      • Viewing user interactions in virtualized and embedded environments
      • Engage notifications on macOS
      • Configuring Collector level anonymization
    • Collector remote connectivity
      • Redirecting and anonymizing Collector traffic
      • Redirecting the Collector TCP channel
      • Support for DirectAccess
      • Windows Collector proxy support
      • Mac Collector proxy support
    • Installing the Event Connector
      • Installing the Event Connector on Linux
    • Installing the Finder
      • Installing the Finder on Windows
      • Enabling Cross-Engine Finder features
      • Expanding the time frame of investigations in the Finder
      • Enabling Finder access to the Library
      • Finder proxy support
    • Updating from V6.x
      • Updating the Appliance
      • Content centralization when updating the Appliance
      • Updating the Collector
      • Viewing Collector deprecated fields
      • Updating the Finder
    • Security and user account management
      • Importing and replacing certificates
      • Hierarchizing your infrastructure
      • Adding users
      • Enabling SAML authentication of users
      • Just-In-Time provisioning of user accounts
      • Enabling Windows authentication of users
      • Multi-factor authentication for local accounts overview
      • Provisioning user accounts from Active Directory
      • Establishing a privacy policy
      • Disabling local accounts for interactive users
      • Setting the complexity and minimum length of passwords for local accounts
      • Protecting local accounts against brute force attacks
      • Preventing password saving in the Finder
      • Controlling session timeouts in the Portal
      • Security settings in the Appliance
      • Setting the Do Not Disturb periods between campaigns
    • Data retrieval and storage
      • Data retention
      • Increasing the maximum number of metrics
      • Establishing a data retention policy in the Engine
      • Storing Engine data in a secondary disk drive
      • Importing data from Microsoft Active Directory
      • Setting the locale in the Portal
      • Changing the Time Zone of the Portal
      • Time Zones and data collection
      • Changing the data collection time of the Portal
      • Nightly task schedules timetable
      • Changing the thresholds of High CPU warnings
      • Automatic restart of unresponsive Engine
    • Maintenance operations
      • Logging in to the CLI
      • Special operation modes for the Engine and the Portal
      • Changing the default ports in the Appliance
      • Centralized Management of Appliances and Engines
      • Monitoring the performance of the Appliance
      • Resizing partitions in Appliance
      • Configuring the system log
      • Examining the logs in the Portal
      • GDPR - Retrieving or anonymizing personal data
      • Finding out unlicensed devices
      • Removing devices
      • Installing third-party software in the Appliance
      • Installing VMware Tools in the Appliance
      • Operational data sent to Nexthink
      • Sending additional data to Support
    • Disaster recovery
      • Planning for disaster recovery
      • Web Console backup and restore
      • Engine backup and restore
      • Portal backup and restore
      • Rule-based assignment backup and restore
      • License backup and restore
      • PKI backup and restore
    • Branding
      • Branding the Portal
      • Branding of campaigns
  • User manual
    • Getting started
      • Logging in to the Finder
      • Logging in to the Portal
      • Enabling STIG in Webconsole
    • Querying the system
      • Searching the subject of interest
      • Executing an investigation
      • Creating an investigation
      • Editing the options of an investigation
      • Combining logical conditions in investigations
      • Navigating through the results of an investigation
      • Properties of users and devices
    • Visualizing system activity in the Finder
      • Getting a quick overview
      • Graphically observing the activity of users and devices
      • Observing service performance
      • Viewing network connections
      • Viewing web requests
      • Viewing executions
    • Monitoring IT custom metrics
      • Creating a metric
      • Examples of metrics
      • Session performance
      • Device performance
      • Following the evolution of a metric
      • Finding the visuals of a metric
    • Monitoring IT services
      • Analyzing service quality
      • Creating a service
      • Following the evolution of a service
      • Specifying URL paths of web-based services
    • Engaging with the end user
      • Getting feedback from the end users
      • Types of campaigns
      • Creating a campaign
      • Editing a campaign
      • Types of questions
      • Controlling the flow of questions
      • Translating a campaign
      • Triggering a campaign manually
      • Limiting the reception rate of campaigns
      • Scrutinizing the results of a campaign
      • Continuously measuring the satisfaction of employees
    • Rating devices and users with scores
      • Computing scores
      • Creating a score
      • Checking and comparing ratings
      • Computing potential savings
      • Score XML Reference
      • Documenting scores
    • Remotely acting on devices
      • Scenarios for remote actions
      • Creating a remote action
      • Executing remote actions
      • Triggering a remote action manually
      • Writing scripts for remote actions on Windows
      • Writing scripts for remote actions on Mac
      • Example of self-healing scenario
      • Example of self-help scenario
      • Application control and remote actions
    • Organizing objects with categories
      • Classifying objects of the same type
      • Creating categories and keywords
      • Tagging objects manually
      • Tagging objects automatically
      • Importing tags from text files
    • Getting notified by the system
      • Receiving Engage campaigns
      • Receiving email digests
      • Receiving alerts
      • Creating a service-based alert
      • Creating an investigation-based alert
    • Building web-based dashboards
      • Introducing dashboards in the Portal
      • Creating a dashboard
      • Examining metrics in depth
      • Documenting dashboards
      • Assessing license use
      • Computing dashboard data
      • Reusing dashboard content
    • Importing and exporting authored content
      • Methods for reusing authored content
      • Manually sharing Finder content
      • Importing a content pack
      • Conflict resolution
      • Exporting a content pack
  • Library packs
    • Compliance
      • Device Compliance
    • Configuration Manuals
      • Overview (Configuration Manuals)
      • Installing A New Version Of A Library Pack
    • Digital Employee Score (DEX score)
      • DEX Score Installation And Configuration
      • Detailed Library Pack Changelog
    • Device management
      • Reduce logon duration
      • Group Policy Management
      • Hardware Asset Renewal
      • Hardware Asset Renewal Advanced
      • Application Auto-Start Impact
    • Remote Employee Experience
      • Remote Worker Experience
      • Home Networking
      • Change Log And Upgrade Process
      • Remote Worker Vs Office Worker Device Category
      • Remote Worker Insights
      • DEX V2 Upgrade Of Remote Worker
    • Persona Insight
      • Persona Insight - Overview
      • Persona Insight - Library Pack
      • Persona Insight - Score Only Pack
      • Persona Insight - Without Campaign pack
      • Persona Insight - Getting Started and Upgrade Procedure
      • Persona Insight - Configuration Guide
      • Persona Insight - Troubleshooting - Multiple devices on multiple engines
      • Persona Insight - Reference Guide
      • Persona Insight - Example Pack
      • Persona Insight - Device Sizing
        • Persona Insight - Device Sizing Overview
        • Persona Insight - Device Sizing Configuration
      • Persona Insight - Application Sizing
        • Persona Insight - Application Sizing Overview
        • Persona Insight - Application Sizing Configuration
      • Legacy Persona documentation
        • Persona Insight - Library Pack (V.1.0.0.0)
        • Persona Insight - Base Pack
        • Persona Insight - Base Pack Advanced
        • Persona Insight - Customization Guide (V1.0.0.0)
        • Persona Insight - Configuration Guide (V1.0.0.0)
        • Persona Insight - Reference Guide (V1.0.0.0)
    • GSuite
      • GSuite: Health
      • GSuite: Services
      • GSuite: Sentiment
      • GSuite: Advanced Health
    • Support
      • Support: Level 1
    • Shadow IT
      • Shadow IT
    • Malware Protection
      • Malware Protection
    • Office 365 Health
      • Office 365 Health: Overview
      • Office 365 Health: Services
    • Office 365 OneDrive
      • OneDrive Summary
      • OneDrive Operations
      • OneDrive Advanced Health
      • OneDrive Migration
      • OneDrive Sentiment
      • OneDrive Management
      • OneDrive Advanced Operations
    • Office 365 Teams
      • Teams Overall Configuration
      • Teams - Migration
      • Teams - Health
      • Teams - Advanced Health
      • Teams - Adoption
    • Microsoft 365 Apps
      • Microsoft 365 Apps - Operate
    • Employee Self Service
      • Overview
      • Configuration
      • Usage
    • Onboarding Experience Management
      • OEM - Overview
      • OEM - Configuration
    • Office 365 Outlook
      • Outlook Troubleshooting
    • Virtualization
      • Virtualization: Operate
      • Virtualization: AVD - Advanced
      • Virtualization: Citrix Advanced
      • Virtualization: Project
      • Virtualization: Troubleshooting
        • Virtualization: Troubleshooting: Configuration
    • Windows
      • Win10: Configuration
      • Win10: Migration
      • Win10: Feature Update
      • Win10: Quality Update
      • Windows Defender Management
      • Administrators Management
    • Windows 11
      • Windows 11 - Readiness
      • Windows 11 - Migration Pilot
      • Windows 11 - Migration
      • Windows 11 - Operate
    • Webex
      • Webex Operate
    • Zoom
      • Zoom Operate
    • Remote Actions
      • Get Performance Monitor Data
      • Skype For Business
      • Restart Device
      • Upload Logs to S3 using PreSigned URLs
    • Software Asset Optimization
    • Collaboration Optimization
      • Collaboration Optimization - Solution Overview
      • Collaboration Optimization - Configuration
      • Collaboration Optimization - Usage / Troubleshooting
    • Systems Management
      • Manage Configuration Drift
      • MS ConfigMgr - Client Health
        • MS ConfigMgr - Client Health - Summary
        • MS ConfigMgr - Client Health - Configuration Guide
      • Intune
        • Intune - Health
          • Intune - Health - Summary
          • Intune - Health - Configuration Guide
    • Return to the office
      • Return to the office - Planning
      • Return to the office - Readiness
    • Green IT
      • Green IT - Overview
      • Green IT - Configuration Guide
    • Hybrid Working
      • Hybrid Working Experience
      • Hybrid Working Experience - Installation and upgrade procedure
  • Integrations
    • Nexthink ServiceNow Service Graph Connector
      • Overview
        • Roles and Permissions
        • Modules
      • Installation and Configuration Guide
        • Pre-requisites
          • Configure Identification Rules
          • Import and setup the CMDB categories in Finder
        • Setup
          • Configure the connection
          • Configure import properties
          • Configure additional engines
          • Set up scheduled import jobs
      • Data transformation and mapping by default
      • How to customize the behaviour of the Connector
      • FAQ
        • Why ServiceNow Service Graph Connector?
        • What about Nexthink CMDB Connector?
        • Why is the name the primary key for the devices?
      • Troubleshooting
        • IRE identification issues
          • [No Choice found in the sys_choice table for the target table](integrations/nexthink-servicenow-service-graph-connector/troubleshooting/ire-identification-issues/ no-choice-found-in-the-sys_choice-table-for-the-target-table.md)
          • Identification rules not created
          • Discovery_source choice not created
        • Timeout Errors
          • ECCResponseTimeoutException
          • HTTP 0 error
        • MID server issues
          • java.lang.NullPointerException
          • MID Server memory issues
          • Not trusted certificates in Quebec release
        • Configure credentials issues
          • [Not allowing update of property authentication_choice](integrations/nexthink-servicenow-service-graph-connector/troubleshooting/configure-credentials-issues/ not-allowing-update-of-property-authentication_choice.md)
          • Invalid username/password combo (HTTP 401/403)
        • Configure Engines Issues
          • [The client secret supplied for a confidential client is invalid](integrations/nexthink-servicenow-service-graph-connector/troubleshooting/configure-engines-issues/ the-client-secret-supplied-for-a-confidential-client-is-invalid.md)
        • No Cis imported and no errors found in the log
    • Nexthink ServiceNow Incident Management Connector (IMC)
      • Installation and configuration guide (IMC)
      • Troubleshooting Guide (IMC)
      • Domain separation installation (IMC)
    • Nexthink ServiceNow CMDB Connectors
      • Installation and Configuration Guide
      • Troubleshooting Guide
      • Field transformation and normalisation examples
    • Nexthink Event Connector
      • High level overview
      • Installation and Configuration Guide
      • Troubleshooting guide
      • RPM installation
      • Splunk specific documentation
        • Upgrading from Splunk Connector to Event Connector
        • Splunk add-on installation and usage
    • Nexthink Chatbot SDK
      • Introduction and concepts
      • Installation, configuration and update guide
        • Installation and configuration
        • Update to newer version
        • Uninstallation
        • Authentication
        • Topics configuration
        • Remote action configuration
        • Advanced configuration
        • Additional resources and references
      • Dimensioning guide
      • Troubleshooting
      • Technical solution description
      • Downloads and release notes
  • Glossary and references
    • Search and information display
      • Search in Finder
      • Keyboard shortcuts for column display selection
      • Campaign display compatibility
      • Real-time and consolidated service data
      • Service errors and warnings
      • Errors and warnings for devices and executions
      • Types of widgets
      • Widget compute state in charts
      • Errors in the execution of remote actions
      • Top results of Cross-Engine investigations
      • Engine data history
    • Tooltips in the user and device views
      • Alerts tooltips
      • Warnings tooltips
      • Errors tooltips
      • Activity tooltips
      • Services tooltips
    • Database information and organization
      • Maximum supported values
      • Local and shared content
      • Device Identification
      • Local IP address of devices
      • Timestamping of events
      • Boot and logon duration
      • Application startup duration
      • Application not responding events
      • Memory and CPU usage
      • Status of TCP connections
      • Status of UDP connections
      • Network and port scan conditions
      • Binary paths
      • Maximum number of Binaries
      • Package Executable Mapping
      • Metro apps
      • Investigation with packages
      • Portal aggregation and grouping
      • Focus time metric
    • Security
      • Access rights and permissions
      • Active Directory authentication
      • Canonical domain names for Windows authentication
      • System alerts
      • Audit trail
      • Appliance hardening
      • STIG hardening
      • FIPS 140-2 compliance
      • Security bulletins
        • Is Nexthink affected by Okta breach
        • Is Nexthink affected by SolarWinds breach
        • Nexthink and Log4j - Security bulletin
        • CVE-2022-22965 - Security Vulnerability Spring4shell - Spring Framework
        • Version 6.22.2.10: Security Vulnerability Maintenance Release
        • The Collector V6.27.X Release – Security Bulletin
    • References
      • Components of the Collector
      • Server support
      • Compatibility mode
    • Glossary
      • Activity
      • Alert
      • Application
      • Binary
      • Campaign
      • Category
      • Connection
      • Dashboard
      • Destination
      • Device
      • Domain
      • Entity
      • Event
      • Executable
      • Execution
      • Focus time
      • Hierarchy
      • Installation
      • Investigation
      • Keyword
      • Metric
      • Module
      • Object
      • Package
      • Platform
      • Port
      • Printer
      • Score
      • Service
      • Session
      • System boot
      • User
      • User logon
      • Web request
      • Widget
  • API and integrations
    • Integrating with Nexthink
      • Event Connector
      • Getting data through the NXQL API
      • Bidirectional integration with the Finder
      • Count metrics API
      • Software metering API
      • Services API
      • List Engines API
      • GetSID API
      • Triggering campaigns via their API
      • Triggering remote actions via their API
      • Audit trail API
      • Integrating investigation-based alerts
      • Downloads
    • NXQL API
      • Introducing the NXQL API
      • NXQL Tutorial
      • NXQL language definition
      • NXQL Data Model
    • Integrations
      • Excel integration with NXQL
      • Power BI
      • Azure Data Lake Storage Gen2
      • Splunk Event Connector
    • ServiceNow
      • CMDB Connector
      • Incident Management Connector
      • Event Management

© Nexthink

  • Privacy policy
  • Responsible Disclosure Policy
On this page
  • Overview
  • Prerequisites
  • Deploying the Collector using the Nexthink Collector Installer
  • Deploying the Collector through SCCM
  • Deploying the Collector through GPO
  • Installing the Collector on a single device
  • Deploying the Collector within a Windows reference image
  • Interaction of the Collector with other software

Was this helpful?

  1. Installation and configuration
  2. Installing the Collector

Installing the Collector on Windows

Last updated 7 months ago

Was this helpful?

Overview

You must install the Collector in all the Windows devices from which you want to get end-user analytics. Depending on the number of devices and their geographical location in your corporate network, the installation of the Collector may be a technically challenging task.

For small setups or particular cases, you may opt for installing the Collector individually on each device. For medium to large setups, the installation of the Collector usually requires the use of automated deployment tools in practice.

To keep your Collectors up-to-date, either rely on the same deployment tools that you used for their installation or on the

Prerequisites

The operations described in this article should only be performed by a Nexthink Engineer or a Nexthink Certified Partner.

If you need help or assistance, please contact your Nexthink Certified Partner.

You need:

  • One or more Windows devices on which to install the Collector.

  • The Nexthink Collector Installer (recommended) or the Collector MSI packages.

  • The of the primary Appliance. These are essential to enable the complementary TCP connection of the Collector with the Engine. if you need to install the Collector as part of a POC, before having installed the definitive primary Appliance.

  • Optional: A third-party automated deployment tool. Instructions on how to install the Collector through SCCM 2007, SCCM 2012, and GPO (Active Directory) are provided.

Download the Nexthink Collector Installer and the Collector MSI packages:

  1. Navigate to the website.

  2. Under Latest downloads, download the Collector package for Windows.

  3. Optional: Download the pertaining SHA-256 hash file to verify your Collector package.

  4. Extract the contents of the downloaded collector-24.6.30.x.zip file.

  5. Find the Nexthink Collector Installer in the .\collector-24.6.30.x\Installer\Collector folder. This is the recommended tool for generating an executable that embeds the Collector MSIs and the custom configuration options in a single bundle to deploy the Collector easily. The following versions are provided:

    • NEXThink_Collector_Installer_Silent.exe (recommended), to generate silent Collector installers. When deploying the Collector on a device, a silent installer renders the installation procedure unnoticeable to the end user of the device.

    • NEXThink_Collector_Installer.exe (for debugging), to generate installers that open a command-line window.

  6. Find the NEXThink_Collector.msi MSI file in the .\collector-24.6.30.x\x64\signed folder.

Download the Customer Key and default Root Certificate from the primary Appliance:

  1. Log in to the Web Console of the primary Appliance as admin.

  2. Select the Appliance tab at the top of the Web Console.

  3. Click Collector management in the left-hand side menu.

  4. Under Collector default certificates at the bottom of the page, click the buttons DOWNLOAD CUSTOMER KEY and DOWNLOAD DEFAULT ROOT CERTIFICATE to download, respectively, the text files holding the Customer Key and the default Root Certificate of the primary Appliance (the latter is required only if you did not replace the certificate for the TCP communication channel of the Appliances with the Collector).

You need to know:

  • TCP port number for the connection of the Collector with the Appliances (default 443).

  • Optional: UDP port number where the Engine is listening for the Collector (default 999, but prefer TCP-only).

Deploying the Collector using the Nexthink Collector Installer

The Nexthink Collector Installer is a tool that helps you deploy the Collector by producing a standalone executable file that holds the MSI files of both the 32-bit and 64-bit versions of the Collector. Therefore, you can use the same executable to install the Collector on any device that runs a supported version of Windows.

To generate the executable, use the graphical interface of the Nexthink Collector Installer to set the installing options of the Collector:

  1. Double-click the appropriate Nexthink Collector Installer executable file for generating either:

    • A silent installer: Nexthink_Collector_Installer_Silent.exe (recommended).

    • An installer that opens a command-line window: Nexthink_Collector_Installer.exe.

    In either case, the following dialog shows up:

  2. Specify the configuration settings of the Appliance that will receive Collector information under Nexthink Appliance settings. If the rule-based collector assignment is turned on, use the settings of the Portal; otherwise, use the settings of the Engine:

    • Address: DNS name or IP address of the Appliance (it must match the External DNS name of the Portal or the Engine).

    • Data over TCP: Tick the option to convey end-user data through the TCP channel of the Collector (default), instead of the UDP channel.

    • Ports (TCP): Port number on which either the Portal or the Engine listens to the TCP channel of the Collectors.

    • Ports (UDP): Port number on which the Engine listens to the UDP channel of the Collectors. Only enabled if Data over TCP is not checked.

    • DNS: Tick the option Prefer IPv6 if you want the Collector to favor the use of IPv6 over IPv4 to communicate with the Appliances when the name of the Appliances resolve to both IPv6 and IPv4 addresses.

  3. Set the General settings. Optionally tick the box for any additional setting. In particular:

    1. Check the option Report print jobs and printers to enable print monitoring. Starting from V6.18, reporting print information is disabled by default.

    2. Check the option Use the assignment service if you activated the rule-based assignment of Collectors.

    3. Select the activation of the Engage features depending on the target operating system:

      • Enable except on servers: the Collector launches campaigns only on devices that do not run a server OS.

      • Enable on all devices: the Collector launches campaigns on devices with any type of operating system.

      • Disable: the Collector ignores campaigns.

    4. Select the Script execution policy for remote actions that the Collector will run on the device:

      • Signed by a trusted publisher or by Nexthink (default): the Collector runs on the device only those remote actions with a PowerShell script that is signed either by Nexthink or by a company whose certificate is listed in the Trusted Publishers certificate store.

      • Signed by a trusted publisher: the Collector runs on the device only those remote actions with a PowerShell script that is signed by a company whose certificate is listed in the Trusted Publishers certificate store.

      • Disabled: the Collector runs no remote action on the device.

      • Unrestricted: the Collector runs any remote action on the device, regardless of the digital signature of its script.

    5. Optional: Type in an integer number (0 to 2147483647) as Collector tag to identify the group of Collectors generated with the installer. The Collector tag is visible in the Finder and is useful for defining the entities to build up hierarchies.

    6. Optional: For more flexibility in the identification of Collectors, type in a label (max 2048 characters) as Collector string tag to identify the group of Collectors generated with the installer. The Collector string tag is visible in the Finder and is useful for defining the entities to build up hierarchies.

    7. Choose the files that protect the non-traffic information (TCP connection) of the Collector to the Engine:

      • Customer Key: Click Browse to select the file that holds the Customer Key of the primary Appliance.

    8. Finally, specify a couple of directories:

      • Ouptut directory: Click Browse to select the folder where to create the executable files for installing and uninstalling the Collector.

      • (Optional) Logs directory: Type in the network place where the Collectors deployed with this method will write their installation logs.

    1. Tick Automatic proxy to provide a proxy auto-configuration (PAC) file for the automatic configuration of the proxy settings.

      • PAC address: type in the URL of the PAC file.

    2. Tick Manual proxy to manually provide the proxy settings.

      • Proxy address: Type in the fully qualified domain name (FQDN) or IP address of the proxy.

      • Proxy port: Type in the port number where the proxy is listening.

  4. Click Create, three files are generated:

    • NEXThink_Collector[engine_address].exe: Executable file to install the Collector.

    • NEXThink_Collector_Uninstaller[engine_address].exe: Executable file to uninstall the Collector.

    • NEXThink_Collector[engine_address].exe.txt: Text file with the list of the settings used to create the executable installer.

  5. Click OK to close the dialog.

Nexthink Collector Installer error codes

The installer executable returns one of the following values:

  • 0: Success; reboot is not required.

  • -1: Success; reboot is required.

  • 3: Failure; Collector installation has started but msiexec failed.

The uninstaller executable returns one of the following values:

  • 0: Success; reboot is not required.

  • -1: Success; reboot is required.

  • 1: Success; Collector was not found (nothing was uninstalled).

  • 3: Failure; Collector uninstallation has started but msiexec failed.

Remember that rebooting is usually not required when installing the V6 Collector. The installer requires you to reboot a device only if you are upgrading from the V5 Collector or when the target device interferes with the installation process.

Deploying the Collector through SCCM

In this section, learn how to deploy the Collector over groups of end-user devices using Microsoft System Center Configuration Manager. The instructions assume that you are a systems administrator with a basic understanding of the Windows operating system and deploying enterprise software, and that you are familiar with SCCM. The present documentation covers the deployment of the Collector with SCCM 2012 and SCCM 2007. For other versions of SCCM, the procedure may be slightly different. Please refer to the section on deploying software packages in the user manual of your specific version to deploy the Collector.

Deploying the Collector through SCCM 2012

Create a collection of devices:

  1. Click the Windows Start button, go to the Microsoft System Center 2012 program group, and run the Configuration Manager console.

  2. In the Assets and Compliance workspace on the left-hand side of the main panel, righ-click Device Collections and select Create Device Collection.

  3. On the General page of the Create Device Collection Wizard, specify the following fields:

    • Name: Type in a unique name for the collection.

    • Optional Comment: Type in a meaningful comment, for example Deployment for the Nexthink Collector.

    • Optional Limiting collection: Click Browse to select a collection that puts a limit on the members of the current collection or select All systems in order not to limit the current collection.

Create a boundary and add it to a boundary group:

  1. In the Configuration Manager console, go to the Administration workspace.

  2. Right-click Boundaries and select Create Boundary.

  3. Define the boundary by setting additional restrictions on the target devices in which to push the software installation, for example, by IP address range.

  4. Right-click Boundary Groups and select Create Boundary Group.

  5. Type in a name for the group.

  6. Add the previously created boundary to this group.

  7. Optional: Verify that you added the correct number of devices to the group by looking at the value in the column Member Count.

Create the application to install:

  1. In the Configuration Manager console, go to Software Library workspace.

  2. Right-click Applications and select Create Application.

  3. Choose the option "Manually specify the application information".

  4. Specify the location and name of the application (in this case, the name should be Nexthink_Collector_Installer_Silent.exe). The new application is added to the list of available applications.

Now the new Application should appear in the list. When you click it, there is a Deployments tab at the bottom of the window. Later this tabs will show a list of deployments of this application to different device groups.

Distribute and deploy the Application:

  1. In the list of Applications, right-click the previously created Collector application and select Distribute Content. The distribution wizard opens.

    1. Confirm the correct executable file of the installer (Nexthink_Collector_Installer_Silent.exe).

    2. As Content Destination, select Distribution Point.

    3. Specify the shared folder that holds the installer.

  2. Optional: Survey the distribution process from the Configuration Manager console.

    1. In the main panel, navigate to Monitoring > Distribution Status > Content Status.

    2. Click the application that you have just distributed. If you see Success and a green colored graph below, you can now deploy the application.

  3. Back in the Software Library workspace, navigate to Applications.

  4. Right-click the Collector application and select Deploy.

    1. Select the collection of devices that you created earlier.

      • If you cannot see your collection in the list, switch from "User Collections" to "Device Collections".

    2. Check that the distribution point is correct and click Next.

    3. Set Action to Install and Purpose to Required and click Next.

    4. Set the Schedule to an appropriate moment for starting the deployment, such as As soon as possible, and click Next.

    5. Tick Software installation and click Next.

    6. Accept the default options for the rest of the wizard.

  5. Optional: Check the status of your deployment in the Deployments tab at the bottom of the window.

To verify the deployment on a client device:

  1. Log in to the client device and wait for the pop-up notification about installation of new software.

To speed up this process a little bit, you can manually force the software deployment evaluation cycle in the SCCM client:

  1. Open the Control Panel.

  2. Navigate to Configuration Manager and click the Actions tab.

    1. Choose Machine Policy Retrieval & Evaluation Cycle and click Run Now.

    2. Choose Application Deployment Evaluation Cycle and click Run Now

To debug the deployment process and see its log files, check the following:

  • On the server machine, open the SCCM utility to view log files: C:\Program Files\Microsoft Configuration Manager\tools\cmtrace.exe

  • The server logs are stored in: C:\Program Files\Microsoft Configuration Manager\Logs\

  • On the client machine, the logs are stored in one of the following paths:

    • C:\Windows\CCM\

    • C:\Windows\ccmsetup\

    • C:\Windows\ccmcache\

If your deployment is not successful, check the following troubleshooting points:

  • In the Configuration Manager console, navigate to Administration > Site Configuration > Servers and Site System Roles and choose your server. In the table below, right-click Distribution point and select Properties. In the Boundary Groups tab, verify that boundary group that you previously created is listed in the Boundary Groups list. If not, add it to the list.

  • In the Configuration Manager console, navigate to Software Library > Applications. Right-click the Collector application and select Properties. Verify the following points:

    • In the Distribution Settings tab, make sure that the option Distribute the content for this package to preferred distribution points is ticked.

    • In the Content Locations tab, make sure that your distribution point (the path to your shared folder) is in the table. If not, add it, and click Redistribute.

  • If the remote installation fails with error code 0x87d00324 (displayed in Software Center on the client machine), the installation itself was in fact successful and the Collector should be running. It is the mechanism for detecting the installation of the application which failed. In this case, check the detection criteria:

    1. In Software Library, right-click the deployed Collector application and select Properties.

    2. In the tab Deployment Types, double-click the installer script in the list Detection Method.

    3. Check if the detection method is configured correctly. Since you are using the Collector installer executable, the detection should be done by registry key.

Deploying the Collector through SCCM 2007

Create a collection of devices:

  1. Click the Windows Start button, go to All Programs, select Microsoft System Center, select Configuration Manager 2007 and then select ConfigMgr Console.

  2. In the Configuration Manager Console, navigate to System Center Configuration Manager / Site Database / Computer Management.

  3. Right-click Collections, and then click New Collection.

  4. On the General dialog box of the New Collection Wizard, enter a name for the collection.

  5. Click Next and click the computer icon, which opens the Create Direct Membership Rule Wizard. Click Next.

  6. On the Search for Resources dialog box:

    1. Click the Resource class drop-down menu and select System Resource.

    2. Click the Attribute name drop-down menu and select Name.

    3. In the Value field enter %, and then click Next.

  7. On the Collection Limiting dialog box, click the Browse... button, select All Windows Workstation or Professional Systems, and then click Next.

  8. On the Select Resources dialog box, select the check box for each of the targeted computer resources.

  9. Click Next, and then on the Finished dialog box, click Finish.

  10. On the Membership Rules dialog box of the New Collection Wizard, click Next.

  11. On the Advertisements dialog box, for now, do not assign an advertisement because it is not yet created.

  12. Click Next. On the Security dialog box, accept the defaults, click Next, and then click Close.

Create a package source directory:

  1. Click on the Start button, go to All Programs, select Microsoft System Center, select Configuration Manager 2007 and then select ConfigMgr Console.

  2. Navigate to System Center Configuration Manager / Site Database / Computer Management / Software Distribution.

  3. Right-click Packages, point to New, and then click Package.

  4. On the General dialog box of the New Package Wizard, enter the:

    • Name

    • Version

    • Manufacturer

    • Language

  5. Click Next and do the the following:

    1. Select This package contains source files.

    2. Click the Set button and then enter the path for the location of the source files in the Source directory field.

  6. Click Next and accept the default settings on all of the following dialog boxes: Data Access, Distribution Settings, Reporting, and Security.

  7. On the Wizard Completed dialog box, click Close.

To use a server as a distribution point for providing packages to distribute packages to your client computers, first designate a site system as a distribution point. To select a distribution point for the newly created package:

  1. Right-click Distribution Points, click New Distribution Points, click Next, and then click the check box for the distribution point.

  2. Click Next. Upon completion of the New Distribution Points Wizard, click Close.

Create a program with setup and install parameters:

  1. Right-click Programs, point to New, and then click Program.

  2. On the General dialog box:

    1. Enter a name for the package in the Name field.

    2. In the Command line field, browse and select the executable file that you have previously generated with the Nexthink Collector Installer.

    3. In the Run field, click the drop-down menu and select Hidden.

    4. In the After running field, verify the default of No action required is selected.

  3. Click Next and accept the defaults on the Requirements dialog box.

  4. On the Environment dialog box:

    1. Click the Program can run drop-down box and select Whether or not a user is logged on. This will enable Run with administrative rights for the Run mode.

    2. Leave the default for Drive mode to Runs with UNC name.

  5. Click Next.

  6. On the Advanced dialog box, select the check box for Suppress program notifications, and then click Next.

  7. To view the Summary dialog box, click Next.

  8. To finish the process of creating the new program, click Next, which will then display the Wizard Completed dialog box.

  9. To exit from the New Program Wizard, click Close.

Verify that the package was installed on the distribution point, by:

  • Navigating to System Center Configuration Manager, Site Database, Computer Management, Software Distribution, Packages, Collector package name, Package Status, Package Status.

  • Checking the status changing from Install Pending to Installed.

Create the advertisement:

  1. Right-click Advertisements, point to New, and then click Advertisement.

  2. On the General dialog box of the New Advertisement Wizard:

    1. Enter a name for the advertisement in Name field.

    2. Click the Browse button for the Package field, and click on the package you want to advertise and then click OK.

    3. Click the Browse button for the Collection field, click on the collection.

  3. Click OK, and then click Next.

  4. On the Schedule dialog box, enter the date and time in the Advertisement start time fields for when the advertisement will begin, and then click the asterisk button for Mandatory Assignments.

  5. On the Assignment Schedule dialog box, click the Schedule button and enter the same date and time that you previously entered in the Advertisement start time fields on the Schedule dialog box.

  6. To return to the Schedule dialog box, click OK.

  7. Accept the default values on the Distribution Points, Interaction, Security, and Summary dialog boxes.

  8. Upon successful completion of the New Advertisement Wizard, click Close on the Wizard Completed dialog box.

On the client, wait for the next Machine Policy Retrieval & Evaluation Cycle.

Test your results:

  1. Go to a target PC that is member of the Collections you have created to deploy.

  2. Click Start, Run and type eventvwr.msc to show the event viewer message.

  3. In the left pane of the Event Viewer, select Application, you will see some source events MsiInstaller logged as a Success Audit event.

  4. If you get any error, see the error log generated in C:\Windows\Temp\Msi.log.

Optionally, remove the package:

  1. Open the Systems Management Server console and expand the Package that contains the Collector.

  2. Open the Program Properties dialog box

  3. On the General tab, in the Command line field, browse and select the Collector file.

The package will be removed silently at the next Machine Policy Retrieval & Evaluation Cycle from the end-user device.

Deploying the Collector through GPO

In this section, learn how to deploy the Collector over large groups of end-user devices using a standard Windows technology such as Active Directory Group Policy. The instructions assume that you are a system administrator with a basic understanding of the Windows operating system and the deployment of enterprise software.

Create a distribution point:

  1. Log in to the server as an Administrator user.

  2. Create a shared network folder.

  3. Set permissions on this folder in order to allow access to the distribution package.

  4. Copy the MSI of the Collector to the shared folder.

  5. Generate transform files (MST) for controlling the options passed to the MSI for installation. Use the Orca utility from Microsoft to generate the MST, for instance.

  6. Copy the generated MST to the shared folder.

Create a Group Policy Object:

  1. Click on the Start button, go to All Programs, select Administrative Tools and then select Active Directory Users and Computers.

  2. Right-click your domain name in the console tree, select New and click Organizational Unit.

  3. In the New Object dialog box, type a descriptive name for the new organizational unit, and then click OK.

  4. In the right panel, select Computers and click on the computer that you want add to your Organizational Unit.

  5. Drag and Drop these computers in the name of the Organizational Unit created. In the right panel, select Nexthink_Collector_Deploy, you will see all the computers tied to your Organizational Unit.

  6. Click on the Start button, go to All Programs, select Administrative Tools and then select Group Policy Management.

  7. Right-click your domain name in the console tree and select Create a GPO in this domain, and Link it here....

  8. In the New GPO dialog box, type a descriptive name for the new policy, and then click OK.

Assign an MSI package:

  1. Click on the Start button, go to All Programs, select Administrative Tools and then select Group Policy Management.

  2. Right-click your GPO name and select Edit....

  3. On this Group Management Editor, expand Computer Policies, Software Settings and Software Installation, select New and then click Package....

  4. In the Open dialog box, browse to the distribution point you created for the Nexthink Collector during the distribution point.

  5. Select the MSI file containing the Collector installer you want to deploy, and then click Open.

  6. In the Deploy Software dialog box, select Advanced, and then click OK.

  7. In the Properties dialog box for the package you created.

    1. Click the Deployment tab, and then select Uninstall this application when it falls out of the scope of management.

    2. Click Advanced on the Deployment tab, choose Ignore language when deploying this package, uncheck the option Make this 32-bit X86 application available to Win64 machines, and then click OK.

    3. On the Modifications tab, specify any modification transforms you want to apply when the package is installed by clicking Add and then opening each transform from its network location.

    4. On the Security tab, verify the name(s) of any computer(s) to which you are assigning software.

    5. Click OK to close the Properties dialog box.

  8. In the Group Policy dialog box, expand Computer Configuration, Administrative Templates, and Windows Components.

    1. In the Windows Components folder, select Windows Installer.

    2. Select Always install with elevated privileges.

      1. Select Properties.

      2. In the Always install with elevated privileges Properties dialog box, click the Setting tab, select Enabled, and then click OK.

  9. In the Windows Installer panel of the Group Policy dialog box, right-click Logging, and then select Properties.

    1. In the Logging Properties dialog box, on the Setting tab, select Enabled.

    2. Then, in the Logging text box, type iweaprcv.

    3. Click OK to close the Logging Properties dialog box.

  10. In the Group Policy dialog box, click File, and then click Exit.

Note: The GPO must be propagated to the Active Directory Global Catalog and then to the individual computers. For this reason, allow 5-10 minutes before restarting the computers to which you are assigning the Nexthink Collector, or plan to restart the client computers twice before the system policies are synchronized.

Test your results:

  1. Go to a the target PC that is member of the OU you tied the policy to.

  2. Click Start, Run and type gpupdate /force.

  3. A logoff or a restart message will appear: type Y and Enter.

  4. When you restart, you should see the message Installing Nexthink Collector... for about a minute depending on the speed of your network and pc.

  5. Click Start, Run and type eventvwr.msc to show the event viewer message. In the left pane, select Application, you will see some source events MsiInstaller logged as a Success Audit event.

  6. If you have some errors, go to C:Windows/Temp/Msi.log and see the error log generated.

Sometimes you may need to redeploy a package (for example when doing an upgrade). To redeploy a package:

  1. Click the Start button, go to Programs, select Administrative Tools and then select Group Policy Management.

  2. Right-click your domain name in the console tree and select the Properties context menu.

  3. Go to the Group Policy tab, select the object you used to deploy the package and click Edit.

  4. Expand the Software Settings element (per-user or per-machine) which contains the deployed package.

  5. Expand the Software Installation element which contains the deployed package.

  6. Right-click the package in the right pane of the Group Policy window.

  7. Select the All Tasks menu and click Redeploy application.

  8. Click the Yes button for reinstalling the application wherever it is installed

  9. Close the Group Policy Management Editor, click OK and exit the Group Policy Management.

Note that the GPO must be propagated to the Active Directory Global Catalog and then to the individual computers. For this reason, allow 5-10 minutes before restarting the computers to which you are assigning the Collector, or plan to restart the client computers twice before the system policies are synchronized.

Optional, remove a package:

  1. Click on the Start button, go to Programs, select Administrative Tools and then select Group Policy Management.

  2. Right-click your domain name in the console tree and select the Properties context menu.

  3. Go to the Group Policy tab, select the object you used to deploy the package and click Edit.

  4. Expand the Software Settings element (per-user or per-machine) which contains the deployed package.

  5. Expand the Software Installation element which contains the deployed package.

  6. Right-click the package in the right pane of the Group Policy window.

  7. Select the All Tasks menu and click Remove.

  8. Select from the following options:

    • Immediately uninstall the software from users and computers.

    • Allow users to continue to use the software but prevent new installations.

  9. Click the OK button to continue.

  10. Close the Group Policy Management Editor, click OK and exit the Group Policy Management.

Note that the GPO must be propagated to the Active Directory Global Catalog and then to the individual computers. For this reason, allow 5-10 minutes before restarting the computers to which you are assigning the Collector, or plan to restart the client computers twice before the system policies are synchronized.

Installing the Collector on a single device

Use the Collector MSI package to install the Collector either in interactive mode or in silent (also known as unattended) mode. In the latter case, no user interaction is required once the installation process is started.

This method of installing the Collector individually in every device is very tedious for large setups. Therefore, we only recommend it for proofs of concept or testing purposes.

To install the Collector in interactive mode:

  1. Double-click the Nexthink Collector MSI file (NEXThink_Collector.msi) to start the installation program.

  2. After reading the welcome message, click Next.

  3. Fill out the form of installation settings:

    • Appliance TCP Port: Type in the port number on which either the Portal or the Engine listens to the TCP channel of the Collector. Default is 443, but alternatively you can select a custom TCP port that does not require root permissions (that is, a port number above 1024). Starting from V6.24, the UDP channel is no longer proposed for this installation method.

    • Customer Key: Copy to this field the contents of the Customer Key file previously downloaded from the primary Appliance. For instance:

      1. Open the Customer Key file in the Notepad.

      2. Press Ctrl+A to select all the text.

      3. Press Ctrl+C to copy the text.

      4. Back in the Customer Key field, press Ctrl+V to paste the copied key.

    • Root CA: Copy to this field the contents of the Root Certificate file previously downloaded from the primary Appliance. Use the same method described for copying the Customer Key.

  4. Click Next.

  5. The installer is now ready; click Install to begin the actual installation.

  6. Click Finish to close the installation once it has completed.

Starting from V6, the Collector does not require rebooting the device after installation or upgrade. Once the MSI has successfully installed the Collector, you are requested to reboot the device only if you are upgrading from V5 or if you were running a Collector component during installation.

Command-line silent installation

To install the Collector in silent mode: Use msiexec.exe on the command line to install the Collector in silent mode. The executable program msiexec.exe comes pre-installed with every Microsoft Windows operating system. Custom parameters are provided directly on the command-line and they are not saved from one installation to another. Therefore, this is not the recommended method to install the Collector, since commands are prone to typos. For a single installation, prefer the graphical installation method instead. For larger deployments with automated tools, we recommend to use MSI Transforms.

The mandatory parameters are:

  • DRV_PORT: port number on which the Engine listens to the UDP channel of the Collector.

  • CRD_PORT: port number on which the Appliance (Portal or Engine) listens to the TCP channel of the Collector.

  • CRD_KEY: the Customer Key downloaded from the primary Appliance.

Example of an unattended installation:

  1. Run the following command in the command line:

msiexec.exe /qn /i Nexthink_Collector.msi DRV_IP=192.168.84 DRV_PORT=999 CRD_PORT=8443 CRD_KEY= REBOOT=ReallySuppress
  1. Wait for the installation process to complete.

The MSI now installs by default on any kind of Windows device, be it a laptop, a desktop, or a server.

Deploying the Collector within a Windows reference image

When including the Collector in a Windows reference image remove the UID that the Collector may have generated to identify the device.

To ensure the removal of the device UID:

  1. Log in to the Windows device with the Collector as a user with administrative rights.

  2. Press the Windows button on your keyboard.

  3. Type in cmd to make the Command Prompt application show up as a result of the search.

  4. Right-click the Command Prompt icon to open a context menu.

  5. Select Run as administrator from the menu.

  6. Run the following command to stop the Collector:

nxtcfg.exe /stop
  1. Run the following command to remove the UID of the device:

reg delete "HKLM\SYSTEM\CurrentControlSet\Services\Nexthink Coordinator\params" /v uid
  1. To the question Delete the registry value uid (Yes/No)?, answer by typing in yes.

The system will respond with either a confirmation that the operation was successful or with an error message if the Collector did not generate the UID yet.

Interaction of the Collector with other software

To get valuable information from a device, part of the Collector needs to run in privileged mode as a kernel driver. Contrary to user applications, the programs that run in privileged mode can access the memory and the hardware of the device directly. Typically, these are the programs that control the peripherals in your device; such as the mouse, the keyboard, the hard disks or the network card. Other special programs, like antivirus software, may also need to run in privileged mode, at least partially. Errors in programs that run in privileged mode are not protected by the process isolation provided by the operating system and, therefore, they may result in system failure. Moreover, since all of these programs share the same memory space, a misbehavior of one of them can destabilize all the others.

The Collector has been carefully designed and thoroughly tested to avoid any kind of program errors. It has also been engineered following the best practices for the development of kernel drivers, behaving as a good citizen with respect to the other drivers that are loaded into the system. Still, in some very rare cases, an elusive programming error may defeat our rigorous testing process or a misbehaving third-party driver can trigger a fault in the Collector. In these unfortunate situations, the Collector may become unstable and possibly lead to a system failure in the device of the end-user.

CrashGuard Protection

To protect you against driver misbehavior, keep your Windows drivers up to date. Older versions of Windows drivers often contain more bugs that can lead to instabilities. If a third-party driver consistently destabilizes the Collector, the CrashGuard protection of the Collector helps you prevent your device from crashing again and again.

The CrashGuard mechanism increases a counter each time a session is abruptly terminated. An abrupt termination of a session is either a system crash (blue screen) or a hard reset or power off. If a subsequent session is terminated correctly, the counter is reset to zero. Otherwise, the counter is increased again. When the counter reaches a given number of consecutive abruptly terminated sessions, the Collector cancels the loading of its drivers at system startup. Of course, the CrashGuard protection is only effective if it is really the Collector or its interaction with misbehaving software that is causing the system to crash.

On the other hand, if some end-users have acquired the bad habit of shutting their devices down unsafely, they may inadvertently induce the CrashGuard protection mechanism to wrongly deactivate the loading of the Collector by always ending up their sessions abruptly. To prevent these users from abusing the CrashGuard protection mechanism, optionally specify a CrashGuard protection time interval that starts being measured at system startup and after which the abrupt termination of a session does not increase the CrashGuard counter. This measure is effective if misbehaving users shut down their devices only after the protection time interval has elapsed; that is, if the protection time interval is shorter than their working day. The default value for the protection time interval is four hours.

Additionally, specify a reactivation time to load back a Collector that was previously deactivated by the CrashGuard protection. Take preventive measures during the period of deactivation to fix the issue that made the device crash so often. The Collector is loaded back again once the reactivation time has elapsed, on the next boot of the device.

DRV_CRASHGUARD

Maximum number of consecutive abruptly terminated sessions after which the Collector cancels the loading of its drivers. Default is five sessions.

DRV_CGPI

The time interval in minutes after system startup during which the CrashGuard protection mechanism reckons abrupt terminations as genuine crashes. Default is 240 min (4 hours).

DRV_REACTIVATION

The waiting time in hours from the moment that the loading of the Collector is deactivated because the CrashGuard counter reached its maximum specified count until the moment it is reactivated. Default is 168 hours (7 days).

In any case, if you suspect that there is a compatibility problem between any of the drivers loaded into the end-user devices of your company and the Collector, please contact Nexthink Support.


RELATED TASKS

RELATED REFERENCES

The DNS name or IP address of the Appliance that hosts the Engine or, if is turned on, of the Appliance that hosts the Portal. The name or IP address must match the or the , respectively.

Installation options which are not shown in the dialog take their default value. Check Install configuration tool to modify them later with the . In the case of an update, the values of the non-visible settings are preserved from the previous installation.

Check the option Web and Cloud Data if you have purchased the Web and Cloud product. Furthermore, click the button Settings to the right of this option to for which you want to store the full URL paths of web requests. That is, for every web request that falls under one of the specified domains, the Collector reports the full URL path to the Engine and not just the domain.

Root CA: Click Browse to select the file that holds the default Root Certificate of the primary Appliance. If you leave this field empty, the Collector assumes that you and falls back to using the Windows Trusted Root Certification Authorities Store for verifying the certificates presented by the Engine (the secondary) Appliance.

Optionally provide the under the Proxy configuration section:

other: Failure; the actual value corresponds to a .

other: Failure; the actual value corresponds to a .

The deployment of the Collector SCCM requires you to provide an executable file that is responsible for the actual installation of the Collector in your devices. To generate this executable, described above.

Appliance Name or IP address: Type in the DNS name or IP address of the Appliance (the Portal, if is turned on; the Engine, otherwise). Respectively, this setting must match either the or the .

If this field is left empty, the Collector assumes that you and uses the Windows Trusted Root Certificates Store to validate the TCP channel connection to the Appliances. Replacing certificates is required if communicating via the default TCP port 443.

DRV_IP: the IP address or DNS name of the Appliance that hosts either the Engine or, if is turned on, the Portal.

It must match the of the Engine or the of the Portal, respectively.

CRD_ROOT_CA: the Root Certificate downloaded from the primary Appliance. Leave empty if you and want the Collector to use the Windows Trusted Root Certificates Store for validating its TCP connection with the Engine (the secondary) Appliance.

For a comprehensive list of available options for the Nexthink Collector, see the .

See also: .

Specify the parameters that control the behavior of the CrashGuard as :

Modify the CrashGuard protection time interval with the on active devices after installation.

rule-based collector assignment
External DNS name of the Engine
External DNS name of the Portal
Collector Configuration Tool
open a dialog where you can list the domains
replaced the server certificates in the Engine
custom proxy settings of the Collector
Windows Internal error code
Windows Internal error code
rule-based collector assignment
External DNS name of the Portal
External DNS name of the Engine
replaced the server certificates in the Engine
rule-based collector assignment
External DNS name
External DNS name
replaced the certificates in the Engine
Collector MSI Parameters reference
Windows Installer (msiexec.exe) Command-Line options Reference
arguments to the MSI of the Collector
Collector configuration tool
Installing the Collector for a POC
Setting the names of the Engines
Federating your Appliances
Importing and replacing Certificates
Nxtcfg - Collector configuration tool
Create or delete a Group Policy object
SCCM 2007 POC Installation Guidelines
Collector software requirements
Updating the Collector
Collector MSI Parameters reference
Windows Collector proxy support
Microsoft Windows Server 2003/2008 Group Policy home page
System Center Configuration Manager
use the Nexthink Collector Installer
automated update proposed by Nexthink
Read this article
Nexthink V6 Release Notes
Customer Key and Root Certificate