- CPU:
Intel Core i3/i5 (6th gen or higher) or Core i7/i9 (6th gen or higher for
laptops)
- RAM:
8 GB or more
- Hard
Disk: SSD with 10 GB free space
- OS:
Windows 7 SP2, 8.1, 10, 11 (64-bit) Build version 22H2 or above
- CPU:
Intel Core i3/i5 (8th gen or higher) or Core i7/i9
- RAM:
8 GB DDR4 or higher
- Hard
Disk: SSD with 10 GB free space
- OS:
Windows 7 SP2, 8.1, 10 (64-bit), 11 (64-bit) Build version 22H2 or above
- Administrative
access needed.
- Antivirus
exceptions as per Annexure I.
- Recommended
to Block QUIC Protocol as per Annexure IV
- CPU:
Intel Core i3/i5 (6th gen or higher) or Core i7/i9
- RAM:
8 GB DDR3 or higher
- Hard
Disk: SSD with 10 GB free space
- OS:
Ubuntu 18.04, 20.04, 22.04 LTS; Boss 8.0
- CPU:
Intel Core i3/i5 (8th gen or higher) or Core i7/i9
- RAM:
8 GB DDR4 or higher
- Hard
Disk: SSD with 10 GB free space
- OS:
Ubuntu 18.04, 20.04, 22.04 LTS; Boss 8.0
- IPv6
support, ROOT privileges, Internet connectivity.
- Antivirus
exceptions as per Annexure II.
- CPU:
Intel Core i5 (6th gen or higher) or Apple M1/M2
- RAM:
8 GB or more
- Hard
Disk: SSD with 10 GB free space
- OS:
macOS Big Sur, Monterey, Ventura
- CPU:
Intel Core i3/i5 (8th gen or higher) or Apple M1/M2
- RAM:
8 GB DDR4 or higher
- Hard
Disk: SSD with 10 GB free space
- OS:
macOS Big Sur (11.x), Monterey (12.x), Ventura (13.x)
- IPv6
support, ROOT privileges, Internet connectivity.
- Antivirus
exceptions as per Annexure III.
- Minimum Configuration:
Intel Core i5/Xeon, 8 GB RAM, SSD with 25 GB space
- Recommended Configuration:
Intel Core i5/Xeon (3 GHz), 16 GB RAM, SSD with 25 GB space
- OS:
Windows Server 2012 R2, 2016, 2019
- Other:
Administrative access, Antivirus exceptions as per Annexure I.
- Minimum Configuration: Intel Xeon, 8 GB RAM, SSD with 25
GB space
- Recommended Configuration: Intel Xeon (3 GHz), 16 GB RAM,
SSD with 25 GB space
- OS: Ubuntu 18.04, 20.04; RHEL 7.x, 8.x
- Other: IPv6 support, ROOT privileges,
Internet connectivity, Antivirus exceptions as per Annexure II.
ANNEXURE
– I
Antivirus Exceptions for Windows Agent
Antivirus Exceptions to be added
for Windows OS
Folders to be Excluded:
- C:\Program Files\lpagntsys\service
(exclude subfolders)
- C:\Program Files\lpagntsys\sec (exclude
subfolders)
- C:\Program Files\lpagntsys\enc (exclude
subfolders)
- C:\Program Files\lpagntsys\svchk
- C:\Program Files\lpagntsys\uninstall
- C:\Program Files\lpagntsys\update
- C:\Program Files\lpagntsys\utility\lib
Executable Files to be Excluded:
- C:\Program
Files\lpagntsys\service\adxregistrator.exe
- C:\Program
Files\lpagntsys\service\insutil.exe
- C:\Program
Files\lpagntsys\service\lpBInt.exe
- C:\Program Files\lpagntsys\service\lpCP.exe
- C:\Program
Files\lpagntsys\service\lpdpin.exe
- C:\Program
Files\lpagntsys\service\lpInt.exe
- C:\Program
Files\lpagntsys\service\lpSvc.exe
- C:\Program
Files\lpagntsys\service\lpunins000.exe
- C:\Program Files\lpagntsys\enc\inDEnc.exe
- C:\Program
Files\lpagntsys\enc\indenc.ind.exe
- C:\Program Files\lpagntsys\svchk\lpSC.exe
- C:\Program
Files\lpagntsys\uninstall\unins000.exe
- C:\Program
Files\lpagntsys\update\lpUpdt.exe
- C:\Program
Files\lpagntsys\utility\lib\certutil.exe
Trusted Applications:
- C:\Program
Files\lpagntsys\service\insutil.exe
- C:\Program
Files\lpagntsys\service\lpBInt.exe
- C:\Program
Files\lpagntsys\service\lpCP.exe
- C:\Program
Files\lpagntsys\service\lpdpin.exe
- C:\Program
Files\lpagntsys\service\lpInt.exe
- C:\Program
Files\lpagntsys\service\lpSvc.exe
- C:\Program
Files\lpagntsys\service\lpunins000.exe
- C:\Program Files\lpagntsys\enc\inDEnc.exe
- C:\Program
Files\lpagntsys\enc\indenc.ind.exe
- C:\Program Files\lpagntsys\svchk\lpSC.exe
- C:\Program Files\lpagntsys\uninstall\unins000.exe
- C:\Program
Files\lpagntsys\update\lpUpdt.exe
- C:\Program
Files\lpagntsys\utility\lib\certutil.exe
This list
provides clear and concise entries for adding exceptions to your antivirus
software, ensuring these specific files and folders are not scanned or blocked.
Adjust paths as necessary to match your actual installation locations.
ANNEXURE – II
Antivirus Exceptions for Linux Agent
Add the following folders to the exclusion list:
- /var/log/inDefendBusinessClientEndLogger/
- /var/lib/.lpagnt/
- /var/lib/.lpagnt/.logs/
- /var/lib/.lpagnt/.services/
Add the following processes to the exclusion list:
- /var/lib/.lpagnt/.services/lpsvc
- /var/lib/.lpagnt/.services/lpsc
- /var/lib/.lpagnt/.services/lpspg
- /var/lib/.lpagnt/.services/lpupdtr
- /var/lib/.lpagnt/.services/lpint
In rare scenarios with antivirus capable of web
protection, turn off Web Threat Protection and Mail Threat Protection.
ANNEXURE – III
Antivirus Exceptions for Mac OS Agent
Add the following folders to the exclusion list:
- /var/log/inDefendBusinessClientEndLogger/
- /var/lib/.lpagnt/
- /var/lib/.lpagnt/.logs/
- /var/lib/.lpagnt/.services/
Add the following processes to the exclusion list:
- /var/lib/.lpagnt/.services/lpsvc
- /var/lib/.lpagnt/.services/lplogger
- /var/lib/.lpagnt/.services/lpspg
- /var/lib/.lpagnt/.services/lpupdtr
- /var/lib/.lpagnt/.services/lpint
Turn off Web & Mail Protection.
ANNEXURE – IV
Disable QUIC Protocol through Windows Firewall / Third Party Firewalls
To disable QUIC Protocol through windows firewall, we need
to create an outbound rule in windows firewall as given below: (Similar rule
should be created on third party firewalls)
Create Outbound Rule in Windows Firewall via Command
Prompt:
1.Open cmd with run as administrator.
2.Run command
netsh
advfirewall firewall add rule name= "QUIC_BLOCK" dir=out action=block
protocol=UDP remoteport=80,443
3.Verify the rule in Windows Firewall->Advanced
Settings->Windows Firewall with Advanced Security->Outbound Rules
NOTE: please check the steps with vendor support for
disabling QUIC Protocols on third party Firewalls