Downloading and Installing the Secure Endpoint Agent

Downloading and Installing the Secure Endpoint Agent

The Secure Endpoint Agent is required for devices to communicate with the Secure Endpoint Console and receive management, visibility, and remediation capabilities.
This guide provides an overview of how to download, install, and verify the Secure Endpoint Agent on supported devices.

Before You Begin

Before downloading and installing the agent, ensure that:
  1. You have an active Secure Endpoint account with administrator permissions 
  2. The target device is running a supported operating system 
  3. You have local administrator rights on the device for manual installations 
  4. The device has internet connectivity to communicate with the Absolute Monitoring Center 
Supported platforms include:
  1. Windows 
  2. macOS 
  3. ChromeOS (via Chromebook extension) 
Some devices may already include Absolute Persistence technology embedded in firmware. On supported devices, the agent may automatically activate after the device connects to the internet. 

Download the Secure Endpoint Agent

To download the agent installer:

  1. Sign in to the Secure Endpoint Console. 
  2. Go to Settings > Agent Management
  3. Locate the current agent version. 
  4. Select Download Full Agent Installer
  5. Choose the appropriate installer package for your operating system. 
  6. Generate and download the package. 
Available installer formats may include:
  1. .msi for Windows 
  2. .pkg for macOS 
The console can also provide deployment scripts for enterprise deployment tools such as Microsoft Intune, Jamf, SCCM, or Group Policy. 

Install the Agent

Manual Installation

To manually install the Secure Endpoint Agent:
  1. Locate the downloaded installer package. 
  2. Run the installer with administrator privileges. 
  3. Follow the installation prompts, if applicable. 
In most cases, the installation completes silently with minimal user interaction.
After installation, the device automatically attempts to register with the Absolute platform. 

Enterprise Deployment

For large-scale deployments, Lenovo recommends using centralized software deployment tools such as:
  1. Microsoft Intune 
  2. Microsoft SCCM 
  3. Group Policy (GPO) 
  4. Jamf 
Deployment scripts and installation packages are available from the console to support automated rollout processes. 

Verify Agent Installation

After installation, devices typically appear in the Secure Endpoint Console within several minutes.
To verify successful activation:
  1. Go to Reports
  2. Open the Activation report. 
  3. Confirm that the device appears in the report. 
The Activation report displays:
Devices that have completed their first check-in 
Devices activated at the factory that have not yet checked in 
Lenovo recommends allowing up to 15 minutes for initial communication after installation. 

Recommended Post-Installation Steps

To help ensure that Persistence technology initializes correctly on supported devices, Lenovo recommends the following reboot sequence after installation:
  1. Restart the device immediately after installation. 
  2. Wait approximately 10–15 minutes. 
  3. Restart the device a second time. 
Notes
Persistence activation status may take additional time to update in the console.

    • Related Articles

    • Secure Endpoint Console System Requirements

      Before deploying or managing devices with the Secure Endpoint Console, please verify that your environment meets the minimum system requirements for supported platforms, browsers, and network connectivity. Meeting these requirements helps ensure ...
    • Downloading and Installing the Absolute Agent

      To ensure a successful installation of the Absolute agent, you will need an active Absolute account with administrator privileges, and you must have local administrator rights on that device if performing a manual installation. Finally, please verify ...
    • Managing Passwords in the Secure Endpoint Console

      The Secure Endpoint Console includes tools that help administrators manage account credentials and device-level security passwords. Resetting Your Console Password If you cannot access the Secure Endpoint Console because you forgot your password, you ...
    • Managing Users in the Secure Endpoint Console

      The Secure Endpoint Console allows administrators to add and manage users with different access levels and permissions. Understanding User Roles User roles determine which areas of the console a user can access and what actions they can perform. ...
    • Absolute Secure Endpoint — Frequently Asked Questions (FAQ)

      Q1: How do I reset my password? A: Use the "Forgot Password?" link on the Absolute login page. If this is unsuccessful, contact your organization's Account Administrator. Administrators who are locked out must contact Lenovo Support. Q2: How do I add ...