# AQUILA - EDR MSI Aquila Agent

# <span style="color: rgb(0, 0, 0);">Aquila Agent MSI (EDR) - Manual Installation</span>

<div id="bkmrk--1">  
</div>#### <span style="color: rgb(0, 0, 0);">Endpoint Detection and Response (EDR)</span>

<span style="color: rgb(0, 0, 0);">Endpoint Detection and Response (EDR), is a cybersecurity technology that focuses on detecting, investigating, and responding to suspicious activities and threats on endpoints, such as workstations, laptops, and servers. EDR solutions provide visibility into endpoint activities and help security teams identify and mitigate potential threats before they can cause significant harm.</span>


**Follow the number of steps to keep the AQUILA EDR installer.**

[![Image_Save_Installer.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-01/scaled-1680-/ByvCQvJLDxfKu0B0-xdyw23ko.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-01/ByvCQvJLDxfKu0B0-xdyw23ko.png)

[![Image_Keep_Installer.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-01/scaled-1680-/9rQimc4pAAC8H6yC-t2.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-01/9rQimc4pAAC8H6yC-t2.png)

##### **Please follow the instructions below and refer to the images below:**

**Step 1:** After downloading the AQUILA Agent Setup installer. Run the setup file to start the installation wizard.

[![Image_Install.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-01/scaled-1680-/ypIVWRpBvzd2eSPo-t3.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-01/ypIVWRpBvzd2eSPo-t3.png)

**Step 2:** If prompted with a User Account Control (UAC) dialog stating that the app is from an unknown publisher, click **‘Yes’** to allow the installer to make changes and proceed with the installation.

[![Image_User_Account_Control.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-01/scaled-1680-/8uJWOhbYPA1nkK4C-t4.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2026-01/8uJWOhbYPA1nkK4C-t4.png)

**Step 3:** Wait for a moment to install the Aquila Agent.

[![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-09/scaled-1680-/ZVdGl18Seh4bRdZQ-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-09/ZVdGl18Seh4bRdZQ-image.png)

**Step 4:** After the installation finished, the AQUILA Agent would now be displayed on the Desktop,

[![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-08/scaled-1680-/AMq60ycKzqggJhhj-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-08/AMq60ycKzqggJhhj-image.png)

**Step 5:** Right click or click Mouse 2 on the AQUILA Agent then run it as Administrator.

[![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-08/scaled-1680-/J0VjddCPKqLhpYSn-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-08/J0VjddCPKqLhpYSn-image.png)

**Step 6:** If prompted with a User Account Control (UAC) dialog stating that the app is from an unknown publisher, click **‘Yes’** to allow the installer to make changes and proceed with the installation.

[![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-09/scaled-1680-/raD6KMA4Nvl6CDgd-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-09/raD6KMA4Nvl6CDgd-image.png)

**Step 7:** Proceed with the installation. Click "**Install Agent**" to proceed. Please wait a few minutes for the installation process to complete. This will automatically initiate enrollment into the CyTech - AQUILA platform.

[![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-08/scaled-1680-/8Xr6s80WmC5k2Rfy-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-08/8Xr6s80WmC5k2Rfy-image.png)

<span style="color: rgb(0, 0, 0);">**Step 8:** After successful enrollment, an overview window will be displayed. Please note that it may take some time for the device to reflect an online status. Ensure the device remains connected to the network for the EDR policy to be properly applied.</span>

<span style="color: rgb(0, 0, 0);">[![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/ln4ghMC9isi5CerI-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/ln4ghMC9isi5CerI-image.png)</span>

<span style="color: rgb(0, 0, 0);">**Step 9:** The Agent Details panel allows you to verify the status and identity of your endpoint device.</span>

<span style="color: rgb(0, 0, 0);">[![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/n5Jyu4liWfqQERlk-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/n5Jyu4liWfqQERlk-image.png)</span>

<span style="color: rgb(0, 0, 0);">**Step 10:** You may also access AQUILA Agent Secure through the Windows taskbar's side dock panel.</span>

<span style="color: rgb(0, 0, 0);">[![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/JUUlbRcGAxMcwrI0-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/JUUlbRcGAxMcwrI0-image.png)</span>

<span style="color: rgb(0, 0, 0);">**Step 11:** The Overview page provides a centralized dashboard displaying all recent detections related to your endpoint devices. This real-time monitoring allows security teams to quickly identify potential threats, analyze attack vectors, and prioritize response efforts based on severity and impact. By consolidating detection data, the Overview page supports proactive threat hunting and continuous endpoint security management as part of a comprehensive cybersecurity monitoring strategy.</span>

<span style="color: rgb(0, 0, 0);">[![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/dU8R6czWUg0E8kGg-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/dU8R6czWUg0E8kGg-image.png)</span>

<p class="callout info"><span style="color: rgb(0, 0, 0);">For a more detailed report and in-depth analysis, navigate to **CyTech - AQUILA &gt; Cyber Monitoring &gt; Endpoint Detection and Response(EDR)**. This section provides comprehensive visibility into endpoint activity, detection timelines, threat classifications, and response actions to support advanced threat analysis and incident investigation.</span></p>

[![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/JTplpsqWMr83Ufbi-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/JTplpsqWMr83Ufbi-image.png)

[![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/jWMnSkzvcm89lb8x-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/jWMnSkzvcm89lb8x-image.png)

[![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/YIdIVQT0fcq3P8IZ-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/YIdIVQT0fcq3P8IZ-image.png)

<span style="color: rgb(0, 0, 0);"> *If you need further assistance, kindly contact our technical support at <span style="color: rgb(53, 152, 219);">**<support@cytechint.com>** </span>for prompt assistance and guidance.*</span>