MSI arguments
Several arguments can be used when using the .MSI installer
Launch the .MSI installer to see all available arguments with an explanation and examples.
To install or remove ESA components without a Domain Admin user, use NO_DOMAIN_ADMIN_MODE=1. Then check the installation logs for further instructions marked as "Manual configuration needed".
Examples when deploying ESA components via ESET PROTECT
Partial list of ESA .MSI arguments
To specify ESA components to be installed, the ADDLOCAL argument is used. Possible values include the following:
•Win_Credential_Provider - Windows Login
•Radius_Server - RADIUS Server for VPN Protection
•Credential_Provider - Remote Desktop
•Web_Exchange - Microsoft Exchange Server
•Web_SharePoint - Microsoft SharePoint Server
•Web_RemoteDesktop - Remote Desktop Web Access
•Web_Dynamics - Microsoft Dynamics CRM
•Web_RemoteAccess - Remote Web Access
•ADFS3 - AD FS 3 or later
•Identity_Provider_Connector - Identity Provider Connector
To install more features, separate them by comma, for example:
ADDLOCAL="Credential_Provider,Win_Credential_Provider"
Specify the deployment type using the ESA_COMPUTER_CONFIG_INTEGRATION_MODE argument with value number 2. Then configure also the following arguments:
•ESA_COMPUTER_CONFIG_AUTHENTICATION_SERVER_ADDRESS - IP address of Authentication Server to be used in invitations.
•ESA_COMPUTER_CONFIG_AUTHENTICATION_SERVER_ACCESS - invitation code.
•TRUSTED_CERT_HASH - hash of trusted Certificate to be added to certificate store.
To set a custom RADIUS port, use ESA_CONFIG_RADIUS_PORT.
Example - Install Windows Login and Remote Desktop
ADDLOCAL="Win_Credential_Provider,Credential_Provider" ESA_COMPUTER_CONFIG_INTEGRATION_MODE=2 ESA_COMPUTER_CONFIG_AUTHENTICATION_SERVER_ADDRESS=192.168.0.15:8001 ESA_COMPUTER_CONFIG_AUTHENTICATION_SERVER_ACCESS=DKNO-XESE-WXUA-QNXW-JAEI TRUSTED_CERT_HASH=2CD61594DDE3E63E6BEBB9BF3DC95B85550FD5D8 |