Get started in minutes
Login to your tenant, verify your license and agent key, deploy the agent, and start collecting operational insights across your Windows and Linux estate. This page explains what you need, what to do first, and how to verify everything is working.
Get started in three simple steps
VectraOps is built for operations teams who need fast visibility and safe remote actions across their Windows and Linux estate. Below is a clearer walkthrough of what to do and what “done” looks like.
Login and select the right tenant
Sign in and confirm you are working inside the correct Organization/Tenant. This tenant is the security boundary: all systems, alerts, tasks and reports remain scoped to that tenant.
If you manage multiple customers or business units, double-check the tenant context before enrolling agents.
Verify license and agent key
Confirm your subscription/license is active, then locate the tenant-scoped agent enrollment key (API key / token). Keep this key private and treat it like a password.
This key ensures agents register into the correct tenant and start sending inventory and telemetry.
Install the agent and validate check-in
Download and install the lightweight VectraOps agent on Windows and/or Linux. Agents connect outbound to the platform, so you typically don’t need inbound firewall changes.
After installation, verify the host shows online and that initial inventory/metrics appear. Then start enabling features.
What to do, in order
Use this as your “operator runbook” for the first deployment. The goal is to get a first host online, confirm data is flowing, and then scale to a larger rollout.
- The pilot host appears in inventory with correct OS/hostname and recent check-in.
- At least one health snapshot (CPU/mem/disk) is visible.
- You can trigger a safe test task (e.g., “refresh inventory” if available, or a non-disruptive task).
- One alert rule can be created and produces predictable results (no alert storm).
If a host doesn’t show up
Most onboarding issues are connectivity or enrollment related. Use the checks below before digging deeper.
What happens after onboarding?
Once agents are connected, you can expand into the workflows that matter most for daily operations. Start small, validate, then scale.
| Goal | What you do | What “good” looks like |
|---|---|---|
| Inventory accuracy Know what runs where |
Roll out agents to your core system groups. Validate naming conventions, tagging, and owner/tenant scoping. | Systems show consistent identifiers, recent check-ins, and stable hardware/network snapshots. |
| Health visibility Spot issues early |
Review baseline CPU/memory/disk behavior, then enable alert thresholds that match your environment. | Alerts are actionable and low-noise; you can quickly identify the “real” problem host. |
| Patch posture Reduce update gaps |
Track pending updates and reboot-required hosts. Use maintenance windows to batch remediation. | Clear lists for “pending updates” and “pending reboot” reduce patch cycle friction. |
| Controlled remediation Execute safe tasks |
Start with non-disruptive tasks, then expand to reboots/renames/uninstalls with approvals and auditing. | Tasks show reliable status and history; changes are traceable and tenant-scoped. |
Want a guided rollout? Use the docs for step-by-step instructions, or contact support for a tailored onboarding plan.