CyberSmart Active Protect Installation Methods

CyberSmart Active Protect Installation Methods

There are several ways to deploy Cybersmart Active Protect. Still, individual enrollment is preferred for businesses not using Microsoft Group Policy Objects or other Mobile device Management (MDM) or Remote Monitoring and Management (RMM) applications. This refers to companies with user-managed devices and bring-your-own devices (BYOD).Individuale

Individual Enrollment


Individual enrollment allows the administrators to send end users and install links via email. The end user then follows the instructions to install the software.   To invite users to install CyberSmart Active Protect through individual enrollment, add the new user and select Desktop as the Active Protect version. Then, a link will be sent automatically to the user's email to facilitate the installation.

If you need to resend Active Protect, please go to the relevant user's device page, click Resend Active Protect, and select Desktop as the Active Protect version. 


Bulk/Centralised Deployment


This deployment method uses the same installer for all users within the organisation. The installer can be downloaded directly from the Dashboard. You can choose any centralised tool of your choice to automate this deployment such as Group Policy Objects (GPO), RMM or MDM tools. 

For RMM tools - set Silent Install Switches & Silent Uninstall Switches to  --NoUI


Powershell Script


To install via PowerShell use the script here.

Usage via CMD through PowerShell as Admin

powershell -ExecutionPolicy ByPass -File "CyberSmartActiveProtectInstaller.ps1" "<activationToken>"

Usage via PowerShell directly as Admin

Firstly run this command in PowerShell:

Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope Process -Force

Then run this: 

CyberSmartActiveProtectInstaller.ps1 "https://cs-prod-windows-distribution.cybersmart.co.uk/build/ActivationToken""

To get the activation token, simply follow the below instructions.

  1. Login to the CyberSmart Dashboard and click on “Deploy Windows” on the main devices page.
  2. Right-click on the “Download” button and copy the link after /build/.

    • Related Articles

    • How to fix Failing CyberSmart Active Protect Security Controls

      There are four easy-to-follow steps to correct failing security control checks in Active Protect. Open CyberSmart Active Protect on your device For macOS devices, click on the CyberSmart Icon in the menu For Windows, click on the system tray on the ...
    • Checking User Device Status - CyberSmart Active Protect

      Ensure that every device in your organisation is secure is essential for peace of mind. CyberSmart Device Status checks the security of every user in your business, giving you the peace of mind that they are secure from cyber-attacks. The purpose of ...
    • BitDefender GravityZone System Requirements

      To protect networks with Bitdefender, customers must install the GravityZone security agents on network endpoints. For this purpose, customers need a Control Center user with administrator privileges over the services needed to be installed and over ...
    • What are GravityZone Bitdefender Security tools

      GravityZone provides Windows, Linux, and macOS physical and virtual machine protection with Bitdefender Endpoint Security Tools. On Windows and Linux, the security agent provides a flexible scanning system, making it ideal for mixed environments ...
    • GravityZone Product Features

      Features by product Features GravityZone Cloud Security for MSP GravityZone Small Business Security GravityZone Business Security GravityZone Advanced Business Security GravityZone Business Security Premium GravityZone Business Security Enterprise ...