Cloud Protector Setup
Workstation Setup
7 min
cloud protector (local proxy) should be installed on end user workstations where the user input devices, keyboard and mouse, are present currently, windows and macos platforms are supported please note that administrative privileges are required for the installation post installation you can confirm that the proxy is running by visiting http //localhost 3040 the following parameters are required for the setup the necessary values can be found on the https //admin keystrike com/setup/cloud protectors in the admin panel organization domain directs to your organization install token authorizes the installation process windows download keystrikecloudprotector msi , a microsoft installer, from the admin panel run the installer after downloading, you can run the installer directly by selecting it in your browser or double clicking it in file explorer enter the required parameters during installation install using msiexec to install the client with msiexec open a command prompt with administrator privileges run the following command msiexec /i \<path to msi> org="\<organization domain>" token="\<install token>" /qb the exact command, pre filled with the required parameters, can be copied from the admin panel https //learn microsoft com/en us/windows/win32/msi/command line options post install the cloud protector is run automatically as soon as the install completes see docid\ brpxi6xbwdkbzfmly4bwb for instructions on how to route relevant http/s traffic through the proxy the organization's installed cloud protectors will appear in the admin panel for troubleshooting, the windows client’s log files can be found at %programdata%\keystrike\logs the installation will create 3 files in the %programfiles%\keystrike folder keystrikecloudprotectorservice exe runs as a windows service, running in the context of the local system account (system), providing private key management and ensuring that a worker is running for every user keystrikecloudprotectorworker exe is run for each user's session, started by the keystrike service the worker runs as system and detects user input activity cloud protector config toml a config file this file requires no manual modification mac installed using keystrikecloudprotector pkg , a notarized pkg installer install with terminal to install the cloud protector with terminal start a terminal session, administrator privilages required at the terminal, run the install command echo "org=\<organization domain>" >> $home/ keystrike conf && echo "token=\<install token>" >> $home/ keystrike conf && sudo installer pkg \<path to pkg> target / run the command to add the certificate to the system keychain sudo security add trusted cert d p ssl p basic k /library/keychains/system keychain "/library/application support/keystrike/cloud protector/ca/certificate cer" the commands above can be copied from the setup page with needed parameters you will be prompted to allow a change to system certificate trust settings by authenticating you will also need to provide keystrike with accessibility permissions go to system settings > privacy & security > accessibility add the keystrike cloud protector app to the list and ensure that the toggle next to it is set to the on position post install the application is run automatically as soon as the install completes see docid\ brpxi6xbwdkbzfmly4bwb for instructions on how to route relevant http/s traffic through the proxy the organization's installed cloud protectors will appear in the admin panel for troubleshooting, the mac cloud protector's log files can be found in a restricted folder at /library/application support/keystrike/logs