Sending users a procedure explaining their download invitations


Article ID: 181865


Updated On:


Symantec Products




Sending users a procedure explaining their download invitations provides a method for you to allow your users to download and install the Cloud Endpoint Protection Agent themselves. Users are authorized for the download by the email address they enter during installation. The download invitation does not give them access to your account.

The invitation that is delivered to users provides only a link to the download and no explicit instructions. We encourage you to:

  • Inform the users receiving download invitations of the importance of your Endpoint Protection strategy.

  • Provide invited users with the proxy information necessary for a successful installation (if necessary).

  • Include this procedure to minimize the number of questions you receive about the installation.

To install on to your computer

  1. Open your email application and look for an email from Symantec Alerting Service with the subject line: Download. Download and open it.


    If you cannot find the email, check your email application's Spam folder.

  2. Click the link in the invitation email. The file download process begins.


    The antivirus products and firewall products that are installed on your computer must be removed from your computer before you install Symantec Endpoint Protection.

    See Removing existing antivirus and firewall products

  3. The dialog box gives you the option to Run or Save the file. Click Run.

  4. When the SymantecExtractor.exe file download is complete, you are asked for permission to Run the software. Click Run.

  5. The Installation box opens. It gives you the status of the installer and permits you to change the installation folder. Click Next.

  6. Configure your Proxy Settings if required. Click Next.

  7. When the Installation progress screen appears, click Install.

  8. When the Overall Progress is Complete, the Cloud Endpoint Protection Agent components are installed. Click Next.

  9. When the success screen appears, uncheck the Launch Website checkbox and click Finish.

  10. In most cases, your installation is automatically added to your organization's list of protected computers.