Deployment
Deploying the Keeper Agent to your endpoints

Overview
Deploying Endpoint Privilege Manager is very simple. The admin creates a custom deployment package associated to a collection of endpoints, and pushes the Keeper agent to those endpoints. When the agent starts up, it immediately registers itself with the Keeper tenant and starts collecting basic information about the endpoint, including the executables and local user accounts. By default, the Keeper agent goes into a "monitoring" mode, and no action is taken.
Requirements
macOS: Sequoia, Sonoma, Tahoe
Linux: RedHat 9.4+, Ubuntu 20.04+, Amazon Linux 2, Rocky Linux 9+, Debian 11, 12, SUSE 15sp 2+, AlmaLinux 9.4+
Windows: 11, Server 2022 and 2025 (Intel x64 Only)
Encryption
All communications between the Keeper Agent and the Keeper Admin Console are using end-to-end encryption with a zero knowledge architecture, which means that Keeper's servers and employees have no ability to decrypt any information about the endpoint. Only the Keeper Administrator who logs in to the Admin Console can decrypt the endpoint collections and associated metadata.
Deployment Package
From the Endpoint Privilege Manager > Deployments screen, select "New Deployment Package". The Keeper agent can be deployed to any Windows, macOS or Linux endpoint. The executable requires local admin privilege to install the agent. For automatic deployment through your remote management solution or group policy, push out the installer in silent mode using the provided command-line string.
Deployment Collections
When creating a deployment package, the assigned "Collection" name is referenced throughout the privilege manager when applying policies. The collection name typically refers to a group of users sharing a common platform or use case.

Agent Deployment
From the Admin Console UI, copy the installer zip file and download it to your machine. Unzip the file to extract the packages for each specific platform. Copy the deployment token for use in the installer command. A valid deployment token is required to register the Keeper Agent to your tenant.
Always verify the Keeper agent in your sandbox or non-production test environment before installing directly on production systems.
The below documentation covers installation and configuration of the Keeper agent:
Windows installation
Download and Unpack
Download the installer via the Keeper Admin Console UI or use the PowerShell commands:
Invoke-WebRequest -Uri "https://keepersecurity.com/pam/pedm/core/latest/KeeperPrivilegeManagerWindows.zip" -OutFile "KeeperPrivilegeManagerWindows.zip"
Expand-Archive -Path "KeeperPrivilegeManagerWindows.zip" -DestinationPath "."
Set-Location "windows"Tips:
Ensure that the Keeper Endpoint Privilege Manager service is running.
You may need to update your endpoint security product to allow Keeper Privilege Manager services to run.
The Keeper Client application will start up automatically on all new login sessions for users on the machine.
Troubleshooting on Windows
To restart the Endpoint Privilege Manager services, we recommend simply rebooting the machine. The service can also be restarted from Services.
The log files are located in:
C:\Program Files\Keeper Security\Endpoint Privilege Manager\Plugins\bin\KeeperLogger\Log>Uninstall on Windows
To uninstall the Windows agent:
msiexec /x KeeperPrivilegeManager-x-x-x.xxx.msi UNREGISTER_AGENT="true" /l*v out.txt /quietTo manually register an agent that has already been installed, the below can be invoked:
C:\Program Files\Keeper Security\Endpoint Privilege Manager\Plugins\bin\KeeperRegistration\KeeperRegistration --token="<token>"Linux Installation
Install the Agent
Ubuntu / Debian-based distributions:
sudo KEEPERREGCODE="<token>" dpkg -i keeper-privilege-manager_*.debRPM-based distributions (RHEL, Rocky Linux, AlmaLinux, CentOS, Oracle Linux, SUSE Enterprise Server, etc.):
sudo KEEPERREGCODE="<token>" rpm -ivh keeper-privilege-manager-*.rpmAmazon Linux 2:
sudo KEEPERREGCODE="<token>" yum install -y keeper-privilege-manager-*.rpmAmazon Linux 2023:
sudo KEEPERREGCODE="<token>" dnf install -y keeper-privilege-manager-*.rpmOptional: Install GNOME Agent UI
For customers using Linux systems running GNOME, the Keeper user interface is available as an extension.
Ensure GNOME Shell is installed on the endpoint:
sudo apt install -y gnome-shell-extension-prefs
or
keepersudo apt install -y gnome-shell-extension-prefs
(if Keeper is already installed)Open the GNOME Extensions app (gnome-extensions-app) or Extension Manager from the system menu and toggle all options "ON".
The Keeper EPM icon will then appear in the system tray or top bar, providing access to agent status and controls.

The full UI is available on Linux just like Windows and macOS devices.

Linux sudo usage
After installation, Keeper modifies the PAM module on the device to wrap sudo. Any usage of the sudo command is delegated to keepersudo.
See the Command Line Policy documentation for configuration and usage instructions.
Updating
To update the Agent that has already been registered:
curl -o KeeperPrivilegeManagerLinux.zip "https://keepersecurity.com/pam/pedm/core/latest/KeeperPrivilegeManagerLinux.zip"
unzip KeeperPrivilegeManagerLinux.zip
cd linux
keepersudo dpkg -i keeper-privilege-manager_*.debTo identify which version is running:
dpkg -l keeper-privilege-managerTroubleshooting on Linux
Error logs will be located in /var/log/syslog or /var/log/messages depending on the flavor of Linux.
To restart the services:
systemctl restart keeper-privilege-managerUninstall on Linux
Uninstalling the Keeper agent varies based on the platform and the install method used above.
Ubuntu / Debian-based distributions:
keepersudo apt remove -y keeper-privilege-managerTo remove and purge all configuration file:
keepersudo apt purge -y keeper-privilege-managerRPM-based distributions:
keepersudo rpm -e keeper-privilege-managerOn RHEL / Rocky / Alma / CentOS / Oracle Linux:
keepersudo yum remove -y keeper-privilege-manager
or:
keepersudo dnf remove -y keeper-privilege-managerTo manually register an agent that has already been installed, the below can be invoked:
/opt/keeper/sbin/Plugins/bin/KeeperRegistration/KeeperRegistration --token="<token>"macOS Installation
Download and Unpack
curl -o KeeperPrivilegeManagerMacOS.zip "https://keepersecurity.com/pam/pedm/core/latest/KeeperPrivilegeManagerMacOS.zip"
unzip KeeperPrivilegeManagerMacOS.zip
cd macos/
chmod +x install_endpoint_privilege_manager.shThe script will determine which package to install based off of keeper-privilege-manager version number and OS architecture type. It is safe to run with multiple package versions and architectures.
Full Disk Access
Important: The agent must be provided Full Disk Access permission for File Access and Command Line policies to function.
Go to: Settings → Privacy & Security → Full Disk Access to the KeeperPrivilegeManager application.
After full disk access is granted, you can restart the computer, or just reload the agent process by running:
sudo /Library/Keeper/sbin/Plugins/bin/KeeperPamConfig/KeeperPamConfigTo manually register an agent that has already been installed, the below can be invoked:
/Library/Keeper/sbin/Plugins/bin/KeeperRegistration/KeeperRegistration --token="<token>"Restarting the service
If a service restart is required on macOS, the following commands can be used:
launchctl unload /Library/LaunchDaemons/com.keeper.keeper-privilege-manager.plist
launchctl load /Library/LaunchDaemons/com.keeper.keeper-privilege-manager.plistUninstall on macOS
To uninstall the Keeper agent from macOS, run the attached script:
curl -o uninstall_macos.sh "https://raw.githubusercontent.com/Keeper-Security/KeeperPAM/refs/heads/main/pedm/uninstall_macos.sh"
chmod +x uninstall_macos.sh
keepersudo ./uninstall_macos.shNotes:
The Keeper Agent will launch for users upon a new login session. Therefore logout/login may be required.
The
sudopolicy controls are documented on the Command Line Policy page.Installation of packages (.pkg) and images (.dmg) requires that the user explicitly opens the request from the Keeper agent UI.
Discovery of Inventory Data
When the agent is installed and deployed to the endpoints, there are 3 types of discovery that is performed on the endpoint:
Basic Inventory: Operating system, version, type
Account Inventory: Local users and groups
File Inventory: All executables on the system
The Keeper Admin Console will receive the discovered inventory as encrypted telemetry data, containing information about the endpoint including:
Computer name and type
OS information (Windows, macOS, Linux) and version
Local user account information
Local group account information
Installed applications
The Deployment page displays the endpoint stats organized by collection.

The collection can be enabled or disabled from the dashboard. When a collection is disabled, the policy engine will no longer apply to those devices.

Individual endpoints can also be disabled, to prevent the agent from applying policies.

Automation with Commander
Keeper Commander supports deployment automation through our command-line interface, Service Mode REST API and Python SDK. Learn more about Endpoint Privilege Manager commands.
Agent Management
The pedm agent command provides management over individual agents running on the endpoint.
My Vault> pedm agent -h
pedm command [--options]
Command Description
---------- -------------------------
list List PEDM agents
edit Update PEDM agents
delete Delete PEDM agents
collection List PEDM agent resourcesDeployment
The pedm deployment command provides management over agent deployments.
My Vault> pedm deployment -h
pedm command [--options]
Command Description
--------- --------------------------------
list List PEDM deployments
add Add PEDM deployments
update Update PEDM deployment
delete Delete PEDM deployment
download Download PEDM deployment packageReports
The pedm report command provides event logs and event reports.
My Vault> pedm report -h
pedm command [--options]
Command Description
--------- -----------------------------
column Run column reports
event Run audit event reports
summary Run audit summary reportsNext Steps
Once you have deployed the agent, discovery kicks in and generates collections.
Last updated
Was this helpful?

