Windows Agent Installation
This guide covers installing the SlimRMM agent on Windows systems.
Supported Versions
- Windows 10 (64-bit)
- Windows 11 (64-bit)
- Windows Server 2016
- Windows Server 2019
- Windows Server 2022
Prerequisites
- Administrator privileges
- Network access to SlimRMM server (HTTPS/443)
- .NET Framework 4.7.2 or higher (usually pre-installed)
Quick Installation
PowerShell (Recommended)
# Run as Administrator
# Download agent
Invoke-WebRequest -Uri "https://your-server.com/api/v1/download/agent/windows-amd64" -OutFile "slimrmm-agent.exe"
# Install with enrollment token
.\slimrmm-agent.exe --install --server https://your-server.com --token YOUR_ENROLLMENT_TOKENCommand Prompt
:: Run as Administrator
:: Download using curl (Windows 10+)
curl -L -o slimrmm-agent.exe https://your-server.com/api/v1/download/agent/windows-amd64
:: Install
slimrmm-agent.exe --install --server https://your-server.com --token YOUR_ENROLLMENT_TOKENMSI Installer
For enterprise deployment via GPO or SCCM:
# Download MSI
Invoke-WebRequest -Uri "https://your-server.com/api/v1/download/agent/windows-amd64.msi" -OutFile "slimrmm-agent.msi"
# Silent install
msiexec /i slimrmm-agent.msi /qn SERVER_URL=https://your-server.com ENROLLMENT_TOKEN=YOUR_TOKENMSI Properties
| Property | Description |
|---|---|
SERVER_URL | SlimRMM server URL |
ENROLLMENT_TOKEN | Enrollment token (optional) |
INSTALL_DIR | Installation directory |
Service Management
PowerShell
# Check status
Get-Service SlimRMMAgent
# Start/Stop/Restart
Start-Service SlimRMMAgent
Stop-Service SlimRMMAgent
Restart-Service SlimRMMAgent
# View logs
Get-EventLog -LogName Application -Source SlimRMMAgent -Newest 50Services Console
- Press
Win + R - Type
services.msc - Find "SlimRMM Agent"
- Right-click for options
Command Line
:: Check status
sc query SlimRMMAgent
:: Start/Stop
net start SlimRMMAgent
net stop SlimRMMAgentConfiguration
Registry Location
HKEY_LOCAL_MACHINE\SOFTWARE\SlimRMM\Agent
| Key | Type | Description |
|---|---|---|
Server | REG_SZ | Server URL |
UUID | REG_SZ | Agent UUID |
MTLSEnabled | REG_DWORD | mTLS status |
LogLevel | REG_SZ | Log level |
Certificate Storage
Certificates are stored in: C:\ProgramData\SlimRMM\certs\
Firewall Configuration
The installer automatically creates firewall rules. Manual configuration:
# Allow outbound HTTPS
New-NetFirewallRule -DisplayName "SlimRMM Agent" -Direction Outbound -Protocol TCP -RemotePort 443 -Action AllowProxy Configuration
System Proxy
The agent respects system proxy settings configured in:
- Internet Options → Connections → LAN settings
Environment Variable
# Set before installation
$env:HTTPS_PROXY = "http://proxy.example.com:8080"
# Install
.\slimrmm-agent.exe --install ...Group Policy Deployment
Create GPO
- Open Group Policy Management
- Create new GPO: "SlimRMM Agent Deployment"
- Edit → Computer Configuration → Policies → Software Settings
- Right-click → New → Package
- Select MSI file from network share
Startup Script
Alternative: Deploy via startup script:
# deploy-slimrmm.ps1
$AgentPath = "C:\Program Files\SlimRMM\slimrmm-agent.exe"
if (-not (Test-Path $AgentPath)) {
# Download
Invoke-WebRequest -Uri "https://your-server.com/api/v1/download/agent/windows-amd64" -OutFile "C:\Temp\slimrmm-agent.exe"
# Install
Start-Process -FilePath "C:\Temp\slimrmm-agent.exe" -ArgumentList "--install", "--server", "https://your-server.com", "--token", "YOUR_TOKEN" -Wait
# Cleanup
Remove-Item "C:\Temp\slimrmm-agent.exe"
}Uninstallation
Control Panel
- Settings → Apps → Apps & features
- Find "SlimRMM Agent"
- Click Uninstall
Command Line
# Find uninstall string
Get-ItemProperty HKLM:\Software\Microsoft\Windows\CurrentVersion\Uninstall\* | Where-Object { $_.DisplayName -like "*SlimRMM*" }
# Or use MSI
msiexec /x {PRODUCT-GUID} /qnManual Removal
# Stop service
Stop-Service SlimRMMAgent
# Remove service
sc delete SlimRMMAgent
# Remove files
Remove-Item -Recurse -Force "C:\Program Files\SlimRMM"
Remove-Item -Recurse -Force "C:\ProgramData\SlimRMM"
# Remove registry
Remove-Item -Path "HKLM:\SOFTWARE\SlimRMM" -RecurseTroubleshooting
Agent Won't Start
# Check Windows Event Log
Get-EventLog -LogName Application -Source SlimRMMAgent -Newest 20
# Check service status
Get-Service SlimRMMAgent | Format-List *
# Try running manually
& "C:\Program Files\SlimRMM\slimrmm-agent.exe" --debugConnection Issues
# Test connectivity
Test-NetConnection -ComputerName your-server.com -Port 443
# Check proxy settings
netsh winhttp show proxy
# Verify DNS
Resolve-DnsName your-server.comCertificate Errors
# Check certificate
$cert = Get-Content "C:\ProgramData\SlimRMM\certs\cert.pem"
$cert | openssl x509 -noout -datesService Installation Errors
Error 1072: Service Marked for Deletion
This error occurs when Windows still has a handle to the old service after uninstallation. Common causes:
- Previous uninstall didn't fully complete
- services.msc console is open
- Another process is still holding the service handle
Solution:
# Kill any lingering agent processes
taskkill /F /IM slimrmm-agent.exe
taskkill /F /IM slimrmm-helper.exe
# Delete the service registration
sc delete SlimRMMAgent
# Wait a moment
Start-Sleep -Seconds 2
# Try installation again
cd "C:\Program Files\SlimRMM"
.\slimrmm-agent.exe install -s https://your-server.comIf the error persists:
- Close any services.msc windows
- Close Task Manager if viewing services
- Restart Windows Explorer:
Stop-Process -Name explorer -Force; Start-Process explorer - If all else fails, reboot the system
Error 1061: Service Cannot Accept Control Messages
This error occurs when running slimrmm-agent.exe update or other commands from PowerShell (not as a service). The service isn't running, so it cannot be stopped.
This is normal behavior - the command will continue. If you see this during an update:
# The agent handles this automatically in v2.1.115+
# For older versions, stop any running agent first:
taskkill /F /IM slimrmm-agent.exe
# Then run the update or install
.\slimrmm-agent.exe updateDebug Logging
Enable detailed logging:
# Set registry key
Set-ItemProperty -Path "HKLM:\SOFTWARE\SlimRMM\Agent" -Name "LogLevel" -Value "debug"
# Restart service
Restart-Service SlimRMMAgent
# View logs
Get-Content "C:\ProgramData\SlimRMM\logs\agent.log" -Tail 100 -WaitSecurity Considerations
- Agent runs as SYSTEM account
- Certificates are stored with restricted ACLs
- All communication is encrypted (TLS 1.3)
- mTLS provides mutual authentication