7.1

Table Of Contents
3 Download and save the Windows guest agent installation le to the C drive of your reference machine.
n
Windows guest agent les (32-bit.)
n
Windows guest agent les (64-bit.)
4 Install the guest agent on the reference machine.
a Right-click the le and select Properties.
b Click General.
c Click Unblock.
d Extract the les.
This produces the directory C:\VRMGuestAgent. Do not rename this directory.
5 Congure the guest agent to communicate with the Manager Service.
a Open an elevated command prompt.
b Navigate to C:\VRMGuestAgent.
c Congure the guest agent to trust your Manager Service machine.
Option Description
Allow the guest agent to trust the
first machine to which it connects.
No conguration required.
Manually install the trusted PEM
file.
Place the Manager Service PEM le in the C:\VRMGuestAgent\
directory.
d Run winservice -i -h Manager_Service_Hostname_fdqn:portnumber -p ssl.
The default port number for the Manager Service is 443.
Option Description
If you are using a load balancer
Enter the fully qualied domain name and port number of your
Manager Service load balancer. For example, winservice -i -h
load_balancer_manager_service.mycompany.com:443 -p ssl.
With no load balancer
Enter the fully qualied domain name and port number of your
Manager Service machine. For example, winservice -i -h
manager_service_machine.mycompany.com:443 -p ssl.
If you are preparing an Amazon
machine image
You need to specify that you are using Amazon. For example,
winservice -i -h manager_service_machine.mycompany.com:
443:443 -p ssl -c ec2
The name of the Windows service is VCACGuestAgentService. You can nd the installation log VCAC-
GuestAgentService.log in C:\VRMGuestAgent.
What to do next
Convert your reference machine into a template for cloning, an Amazon machine image, or a snapshot so
your IaaS architects can use your template when creating blueprints.
Configuring the Windows Guest Agent to Trust a Server
The most secure approach is to install the trusted PEM le manually on each template that uses the guest
agent, but you can also allow the guest agent to trust the rst machine to which it connects.
Installing the PEM le for the trusted server on each template along with the guest agent is the most secure
approach. For security, the guest agent does not check for a certicate if a PEM le already exists in the
VRMGuestAgent directory. If the server certicates change, you must manually rebuild your templates with
the new PEM les.
Configuring vRealize Automation
32 VMware, Inc.