Easy heading | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
...
Anchor | ||||
---|---|---|---|---|
|
...
Microsoft
...
Endpoints: Windows 7 (x32/x64) and newer
Servers: Windows Server 2008 and newer
Microsoft OS support matrix
...
OS | Detection | Remediation / Revert |
Windows 7 | V | X |
Windows 8 / 8.1 | V | X |
Windows 10 / 11 | V | V |
Windows Server 2008 / 2008 r2 | V | X |
Windows Server 2012 / 2012 r2 | V | X |
Windows Server 2016 / 2019 / 2022 | V | V |
Important Note: Remediation functionality is supported on older versions of Microsoft Windows and Servers as long as Powershell v5.1 and newer are installed.
Linux
Linux distribution matrix, supporting both detection, remediation and revert:
Distribution | Supported Versions | ARM64 Architecture |
---|---|---|
Alibaba Cloud Linux | 2 and newer | Not Supported |
Alma | 7 and newer | Not Supported |
Amazon Linux | 2 and 2023 | Not Supported |
CentOS | 7 and newer | Not Supported |
Debian | 10 and newer | Not Supported |
Red Hat Enterprise Linux (RHEL) | 7 and newer | Not Supported |
Rocky Linux | 9 and newer | Not Supported |
SUSE Linux Enterprise Server (SLES) | 12 and newer | Not Supported |
Ubuntu | 16 and newer | Not Supported |
...
macOS
macOS versions, supporting both detection, remediation and revert:
OS | Version | Architecture |
---|---|---|
macOS | 10.15 (Catalina) and newer | Intel Chipset and Apple Silicon |
Supported Network devices (coming soon):
...
OS | Version |
---|---|
Cisco IOS | IOS 12.x to 15.x |
Cisco IOS XE | 16.x and newer |
Cisco IOS XR Routers | IOS XR 5.x to 7.x |
Cisco NX-OS | 6.x to 9.x |
...
Anchor | ||||
---|---|---|---|---|
|
Anchor | ||||
---|---|---|---|---|
|
Ports to open:
...
GYTPOL Sensor to GYTPOL SaaS - port 443
Does the Endpoint or Server need to be a member of the domain?
No
Anchor | ||||
---|---|---|---|---|
|
...
Anchor | ||||
---|---|---|---|---|
|
To verify the successful installation of the Sensor, follow these steps:
Open Task Scheduler as an Administrator.
Check for the
gytpol
folder under the main Library.Expand the folder, and you should observe three tasks, as exemplified below:
...
Where will I see the scanned machine?
Navigate to the System Health located in the "Settings" section.
Select Windows OS
Info |
---|
The initial report should be sent within 10-15 minutes after the first full scan. However, it may take up to an hour for the device to fully appear across all screens. |
...
Where is the installation path?
C:\Program Files\WindowsPowerShell\Modules\gytpol
Where are the logs?
C:\Program Files\WindowsPowerShell\Modules\gytpol\log
Log retention policy
Every Windows Sensor is configured to retain up to 10 log files, with each file being 5MB in size. Once the 10-file limit is reached, the oldest log files are automatically deleted to make room for new ones, ensuring efficient log management.
This behavior can be observed in any installed Windows Sensor under the log directory C:\Program Files\WindowsPowerShell\Modules\gytpol\log
.
...
How to check the sensor version
Open Control Panel > Programs > Programs and Features to see the gytpolClient version in a list.
...
Anchor | ||||
---|---|---|---|---|
|
To uninstall the GYTPOL Sensor:
Open "Programs and Features"."
Locate "gytpolClient" in the list of installed programs.
Right-click on "gytpolClient" and select "Uninstall" or "Remove."
...
Anchor | ||||
---|---|---|---|---|
|
Anchor | ||||
---|---|---|---|---|
|
Ports to open:
...
GYTPOL Sensor to GYTPOL SaaS - port 443
Does the
...
device need to be a member of the domain?
No
Anchor | ||||
---|---|---|---|---|
|
Command to run:
Debian (Ubuntu):
Code Block language bash sudo dpkg -i <gytpol-Sensor-path>
RPM (RHEL, centOS, SUSE etc.):
Code Block language bash sudo rpm -ivh <gytpol-Sensor-path>
Anchor | ||||
---|---|---|---|---|
|
Where will I see the scanned machine?
Navigate to the System Health located in the "Settings" section.
Select Linux OS
...
How do I see and change the service status?
Code Block | ||
---|---|---|
| ||
systemctl stop/start/status gytpol-client |
Where is the installation path?
/opt/gytpol
Where are the logs?
/opt/gytpol/logs
Log retention policy
The Sensor is configured to retain logs for a period of 10 days. Each day may generate one or more log files, depending on the number of actions performed (e.g., scans, service logs, remediations). After 10 days, older log files are automatically deleted to maintain efficient log management.
This behavior can be observed in any installed Linux Sensor under the directory /opt/gytpol/log
.
Where are the configuration folder?
Sensor version check
To check the Linux sensor version, run the following commands:
Code Block | ||
---|---|---|
| ||
sudo /opt/gytpol/ |
...
gytlnx --version |
The output should show the version number:
...
Where are the configuration folder?
/opt/gytpol/config
config.json file example:
Code Block |
---|
{ "HttpVerifyCert": false, "HttpTimeout": 10000000000, "ServerAddress": "https://q1w2e3r4.execute-api.us-east-2.amazonaws.com/prod", "ArchivedFilePath": "archive", "ArchivedEncryptedReportName": "encrypted-report.json", "metricConfigPath": "configs/metrics.json", "cloudCfg": { "Region": "us-east-2", "AccessKeyID": "++AccessKeyID_String==", "SecretAccessKey": "++SecretAccessKey_String==", "ReportsBucket": { "scanner-report": "gytpol-CUSTOMER-us-analyzer-reports", "remediation-report": "gytpol-CUSTOMER-us-analyzer-reports", "log-report": "gytpol-CUSTOMER-us-analyzer-reports" } } } |
...
Uninstalling
Debian:
Code Block | ||
---|---|---|
| ||
sudo dpkg -remove gytpol-client |
Info |
---|
...
Use the |
...
“-purge” instead of |
...
“-remove” to also delete the logs, archive etc. |
RPM:
Code Block | ||
---|---|---|
| ||
sudo rpm -e gytpol-client |
Both rpm
and dpkg
commands listed above may remove certain configuration files associated with GytpolGYTPOL. Deleting files that may result in loss is at your own risk, so ensure that no critical data is being removed before proceeding.
...
Enter the following command to create a configuration file with your organization's proxy server details:Copy
Code Block | |
---|---|
| |
| |
cat << EOF > /opt/gytpol/environ HTTPS_PROXY=http://<internal-proxy-server>:port EOF |
...
Anchor | ||||
---|---|---|---|---|
|
Ports to open:
GYTPOL Sensor to GYTPOL server on-Prem - port 9093 GYTPOL Sensor to GYTPOL SaaS - port 443
Does the Endpoint need to be a member of the domain?
No
Anchor | ||||
---|---|---|---|---|
|
...
Identify and choose the right package according to the table below:
Platform | Architecture | Terminal output | Package file |
---|---|---|---|
macOS | Intel chipset | i386 | gytpol-client-<version>_amd64.pkg |
macOS | Apple silicon | arm | gytpol-client-<version>_arm64.pkg |
Command to run:
Code Block | ||
---|---|---|
| ||
sudo /usr/sbin/installer -pkg <pkg_path> -target / |
example:
Code Block | ||
---|---|---|
| ||
sudo /usr/sbin/installer -pkg ~/Downloads/gytpol-client-0.5.1.0-0_arm64.pkg -target / |
To check that the launch daemon is running run:sudo launchctl list | grep
Code Block | ||
---|---|---|
| ||
sudo launchctl list | grep com.gytpol.gytmac |
If the daemon is currently running, you can identify its process by checking the process ID (PID) on the left side of the output. The PID is typically highlighted in red for easy identification:
...
For further information run:
Code Block | ||
---|---|---|
| ||
sudo launchctl list com.gytpol.gytmac |
If you are using an Intel processor, ensure that you run the correct binary with the "_amd64" designation (e.g., gytpol-client-1.2.1.2-28_amd64.pkg
).
Info |
---|
...
While an amd64 binary can run on an arm64 processor, it is not recommended and is not officially supported. It is advisable to use the binary that corresponds to your processor architecture for optimal performance and compatibility. |
Your output should look like this:
...
Anchor | ||||
---|---|---|---|---|
|
Where will I see the scanned machine?
Navigate to the System Health located in the "Settings" section.
Select macOS
...
How do I see and change the service status?
Code Block | ||
---|---|---|
| ||
sudo launchctl stop/start/list com.gytpol.gytmac |
Where is the installation path?
/opt/gytpol
/config/config.json (you may need to create the ‘config’ folder and the config.json file). See the file example below.
Where is the installation path?
/opt/gytpol
Where are the logs?
/opt/gytpol/logs
Where are the logs?
/opt/gytpol/logs
Log retention policy
The Sensor is configured to retain logs for a period of 10 days. Each day may generate one or more log files, depending on the number of actions performed (e.g., scans, service logs, remediations). After 10 days, older log files are automatically deleted to maintain efficient log management.
This behavior can be observed in any installed macOS Sensor under the directory /opt/gytpol/log
.
Sensor version check
To check the macOS sensor version, run the following commands:
Code Block | ||
---|---|---|
| ||
cd /opt |
...
/gytmac
sudo ./gytmac-version |
The output should show the version number:
...
Where are the configuration folder?
“config.json ” for Sensor’s configuration to a dedicated server
...
This file contains Sensor’s configuration:
{
Code Block | ||
---|---|---|
| ||
{ "HttpVerifyCert" : false, |
...
"HttpTimeout" : 10000000000, |
...
"ServerAddress" : "_gytpol", |
...
"ArchiveFolderPath" : "archive" |
...
} |
Fields explanations:
HttpVerifyCert - Indicate whether to validate the server’s certificate when using HTTP requests.
HttpTimeout - Determine the timeout (in Nano Seconds) for HTTP requests.
ServerAddress - The address of the GYTPOL server.
ArchiveFolderPath - Folder (relative to /opt/gytpol
) in which reports are being saved to before sending them to the server. _Toc140072065 Anchor
Uninstalling
Stop the launch daemon.
sudo launchctl stop com.gytpol.gytmac
Unload the launch daemon from launchctl.
sudo launchctl unload -w /Library/LaunchDaemons/com.gytpol.gytmac.plist
Delete the lauanch daemon configuration plist file.
sudo rm -rf /Library/LaunchDaemons/com.gytpol.gytmac.plist
Remove folder (including all sub-directories & sub-files).
sudo rm -rf /opt/gytpol
Discard receipt data.
sudo pkgutil --forget com.gytpol.gytmac
Info |
---|
Deleting files that may lead to loss is at your own risk, please make sure that nothing important is being removed before deleting! It's always a good idea to take a backup of important data before making any changes to the system. |