Temp Deployment page
AAVH: https://my.splashtop.com/team_deployment/download/HZRWHKP533JK
https://my.splashtop.com/team_deployment/download/TZS2LXRR3RSX
https://my.splashtop.com/team_deployment/download/A5XA3TLYRWSP
Colonial (Woolbridge): https://my.splashtop.com/team_deployment/download/74RR472XPJPY
AJ4LY4HHRAW7 -BVS
Test - YA3KKX7L4Z3J
RL44S34SLZWY - VEH
Nonantum: https://my.splashtop.com/team_deployment/download/YTXJ2S2ZTKTS
https://api.vetevolve.com/clients/1c8cd43f-d1f2-4f66-95cf-07ca22760917/deploy/
curl -L -o tacticalagent-v2.9.1-darwin-arm64 'https://agents.tacticalrmm.com/api/v2/agents/?version=2.9.1&arch=arm64&token=b4bb05c5-f080-4e7f-9dac-0a108901212d&plat=darwin&api=api.vetevolve.com' && chmod +x tacticalagent-v2.9.1-darwin-arm64 && sudo ./tacticalagent-v2.9.1-darwin-arm64 -m install --api https://api.vetevolve.com --client-id 1 --site-id 4 --agent-type workstation --auth e943aecaa3925a566d5b5b022f7e5a683c0d13a976e30f55a28e33f66252ae02
# author: https://github.com/bradhawkins85
$innosetup = 'tacticalagent-v2.9.1-windows-amd64.exe'
$api = '"https://api.vetevolve.com"'
$clientid = '1'
$siteid = '4'
$agenttype = '"workstation"'
$power = 0
$rdp = 0
$ping = 0
$auth = '"479eb48042f36c9b88ddbd90501e45c24aa6fdb1fb4d228d24a12b80629ba136"'
$downloadlink = 'https://agents.tacticalrmm.com/api/v2/agents/?version=2.9.1&arch=amd64&token=b4bb05c5-f080-4e7f-9dac-0a108901212d&plat=windows&api=api.vetevolve.com'
$apilink = $downloadlink.split('/')
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
$serviceName = 'tacticalrmm'
If (Get-Service $serviceName -ErrorAction SilentlyContinue) {
write-host ('Tactical RMM Is Already Installed')
} Else {
$OutPath = $env:TMP
$output = $innosetup
$installArgs = @('-m install --api ', "$api", '--client-id', $clientid, '--site-id', $siteid, '--agent-type', "$agenttype", '--auth', "$auth")
if ($power) {
$installArgs += "--power"
}
if ($rdp) {
$installArgs += "--rdp"
}
if ($ping) {
$installArgs += "--ping"
}
Try
{
$DefenderStatus = Get-MpComputerStatus | select AntivirusEnabled
if ($DefenderStatus -match "True") {
Add-MpPreference -ExclusionPath 'C:\Program Files\TacticalAgent\*'
Add-MpPreference -ExclusionPath 'C:\Program Files\Mesh Agent\*'
Add-MpPreference -ExclusionPath 'C:\ProgramData\TacticalRMM\*'
}
}
Catch {
# pass
}
$X = 0
do {
Write-Output "Waiting for network"
Start-Sleep -s 5
$X += 1
} until(($connectresult = Test-NetConnection $apilink[2] -Port 443 | ? { $_.TcpTestSucceeded }) -or $X -eq 3)
if ($connectresult.TcpTestSucceeded -eq $true){
Try
{
Invoke-WebRequest -Uri $downloadlink -OutFile $OutPath\$output
Start-Process -FilePath $OutPath\$output -ArgumentList ('/VERYSILENT /SUPPRESSMSGBOXES') -Wait
write-host ('Extracting...')
Start-Sleep -s 5
Start-Process -FilePath "C:\Program Files\TacticalAgent\tacticalrmm.exe" -ArgumentList $installArgs -Wait
exit 0
}
Catch
{
$ErrorMessage = $_.Exception.Message
$FailedItem = $_.Exception.ItemName
Write-Error -Message "$ErrorMessage $FailedItem"
exit 1
}
Finally
{
Remove-Item -Path $OutPath\$output
}
} else {
Write-Output "Unable to connect to server"
}
}