What you should know about Factories and Agents

Infection methods

A device can be infected via:

Infection strategy components

Components needed for correct infection include:

Installation vectors

Installation vectors are selected when compiling and define the installation method, physical or remote, for an agent. When compiling, available installation vectors may vary according to the device's operating system.

Several installation vectors can be used for the same agent.

NOTE: injection rules are used for injection on HTTP connections. See "Network Injector management".

Agents

An agent is the result of compiling a factory with one or more installation vectors. An agent is ready to be installed on a device.

Basic configuration defines the type of data to be acquired while advanced configuration lets you dynamically and independently activate or deactivate modules.

For available module types in the basic and advanced configurations see "Module list".

For more information on agents see "What you should know about agents".

Data acquisition modules

Modules trigger some activities on the target device, mainly data acquisition. They are enabled and set in the basic configuration (only some) or in advanced configuration.

Available module types also depend on the device type.

For the complete list see "Module list".