To deploy a Threat Simulator agent, follow the steps specific to your desired cloud platform, as indicated in the corresponding deployment tutorial, and using the custom deployment links and scripts available in the Deployment Tutorials page within the Threat Simulator UI.
After a few minutes, the Deployment Tutorials page is refreshed and the Topology window opens instead, with the deployed agent and the Dark Cloud.
As soon as the agent is deployed, a path scan is triggered that checks the services used by the assessments. Following this scan, a path appears in the Topology window, connecting the Dark Cloud and the agent.
Threat Simulator supports the following agent types:
- Network agents - Support all assessment types, except for endpoint and email assessments. See the following topics for details on how to deploy a network agent
depending on the platform type:
- Endpoint agents - Support the endpoint and email assessment type. See Deploy an Endpoint Threat Simulator agent, Deploy a Threat Simulator Agent on MacOS and Deploy an Endpoint Threat Simulator agent using command line for details on how to deploy an endpoint agent.
- SIEM agents - See [Configure SIEM] for details on the deployment and configuration of this agent type.