# Installing the software

[Which agent do I need?](https://wiki.bamboozle.me/products/cyber-protect/installing-the-software/which-agent-do-i-need)

[System requirements for agents](https://www.acronis.com/en-us/support/documentation/CyberProtectionService/system-requirements-agents.html)

[Preparation](https://www.acronis.com/en-us/support/documentation/CyberProtectionService/preparation.html)

[Linux packages](https://www.acronis.com/en-us/support/documentation/CyberProtectionService/linux-packages.html)

[Proxy server settings](https://www.acronis.com/en-us/support/documentation/CyberProtectionService/proxy-server-settings.html)

[Installing protection agents](https://www.acronis.com/en-us/support/documentation/CyberProtectionService/installing-agents.html)

[Unattended installation or uninstallation](https://www.acronis.com/en-us/support/documentation/CyberProtectionService/unattended-installation-or-uninstallation.html)

[Registering workloads manually](https://www.acronis.com/en-us/support/documentation/CyberProtectionService/registering-workloads-manually.html)

[Autodiscovery of machines](https://www.acronis.com/en-us/support/documentation/CyberProtectionService/autodiscovery-of-machines.html)

[Deploying Agent for VMware (Virtual Appliance)](https://www.acronis.com/en-us/support/documentation/CyberProtectionService/deploying-agent-for-vmware-virtual-appliance-from-ovf-template.html)

[Deploying Agent for Scale Computing HC3 (Virtual Appliance)](https://www.acronis.com/en-us/support/documentation/CyberProtectionService/deploying-agent-for-scale-computing-hc3-virtual-appliance.html)

[Deploying Agent for Virtuozzo Hybrid Infrastructure (Virtual Appliance)](https://www.acronis.com/en-us/support/documentation/CyberProtectionService/deploying-agent-virtuozzo-hybrid-infrastructure-qcow2.html)

[Deploying Agent for oVirt (Virtual Appliance)](https://www.acronis.com/en-us/support/documentation/CyberProtectionService/deploying-agent-ovirt-virtual-appliance.html)

[Deploying Agent for Synology](https://www.acronis.com/en-us/support/documentation/CyberProtectionService/deploying-agent-synology.html)

[Deploying agents through Group Policy](https://www.acronis.com/en-us/support/documentation/CyberProtectionService/deploying-agents-through-group-policy.html)

[Accessing virtual appliances via the SSH protocol](https://www.acronis.com/en-us/support/documentation/CyberProtectionService/accessing-virtual-appliances-ssh-protocol.html)

[Updating agents](https://www.acronis.com/en-us/support/documentation/CyberProtectionService/updating-agents.html)

[Preventing unauthorized uninstallation or modification of agents](https://www.acronis.com/en-us/support/documentation/CyberProtectionService/preventing-unauthorized-uninstallation-agents.html)

[Uninstalling agents](https://www.acronis.com/en-us/support/documentation/CyberProtectionService/uninstalling-agents.html)

[Protection settings](https://www.acronis.com/en-us/support/documentation/CyberProtectionService/protection-settings.html)

[Changing the service quota of machines](https://www.acronis.com/en-us/support/documentation/CyberProtectionService/changing-quota-for-device.html)

[Cyber Protection services installed in your environment](https://www.acronis.com/en-us/support/documentation/CyberProtectionService/cyber-protection-services-installed-in-your-environment.html)
