Step 8: Download and Update Monitoring Agents
Download and install Nodinite 7 Monitoring Agents. Old Windows Service-based agents will be replaced with IIS-hosted agents.
Prerequisites
- Step 7 completed – Monitoring Agents imported to Portal
- PowerShell 7 with administrator privileges
Choose Your Path
The Portal generates a pre-configured ZIP package containing a PowerShell script that installs all Monitoring Agents on your Application Server. There are two ways to generate this package, depending on whether you need to customise ports or service accounts:
| Option | When to use | |
|---|---|---|
| Option A: Use Default Ports | You are happy with the default ports and service account configured in the previous step | |
| Option B: Use Custom Ports or Service Accounts | You need to change ports or the Windows service account before downloading |
Option A: Use Default Ports
Steps
- In Portal environment modal, verify default ports
- Click Download Monitoring Agents
- Wait for ZIP generation

Example of the preparing your download progress screen shown while the ZIP package is being generated.
Extract ZIP to folder on Application Server (e.g.,
C:\Temp\Nodinite7-Agents)Open PowerShell 7 as Administrator
Open Start Menu → Search "PowerShell 7" → Right-click → Run as administratorNavigate to extracted folder:
cd C:\Temp\Nodinite7-AgentsUnblock and run script:
dir -r | unblock-file .\Core-Services-and-Agents.ps1If your service account passwords contain special characters, pass them as
SecureStringvalues to avoid parsing errors.# If all service accounts share the same password $pwd = ConvertTo-SecureString 'P@ssw0rd!' -AsPlainText -Force .\Nodinite7-DEMO-Installation.ps1 ` -WebClientServiceAccountPassword $pwd ` -WebApiServiceAccountPassword $pwd ` -LogApiServiceAccountPassword $pwd ` -LoggingServiceServiceAccountPassword $pwd ` -MonitoringServiceServiceAccountPassword $pwd ` -AzureAgentServiceAccountPassword $pwd ` -AzureLogicAppsAgentServiceAccountPassword $pwd ` -BizTalkAgentServiceAccountPassword $pwd ` -BoomiAgentServiceAccountPassword $pwd ` -DatabaseAgentServiceAccountPassword $pwd ` -FileFolderAgentServiceAccountPassword $pwd ` -IBMMQAgentServiceAccountPassword $pwd ` -LogFileParserAgentServiceAccountPassword $pwd ` -MessageQueueAgentServiceAccountPassword $pwd ` -MuleAgentServiceAccountPassword $pwd ` -NonEventsAgentServiceAccountPassword $pwd ` -RabbitMQAgentServiceAccountPassword $pwd ` -WebServiceAgentServiceAccountPassword $pwd ` -WindowsServerAgentServiceAccountPassword $pwd
Note
You can remove parameters for agents you do not have. Do not include the Pickup Service password parameter in this step because the Pickup Log Events Service is installed later in Step 12.
# If each service account has a different password
$pwdWebClient = ConvertTo-SecureString 'WebClientP@ss' -AsPlainText -Force
$pwdWebApi = ConvertTo-SecureString 'WebApiP@ss' -AsPlainText -Force
$pwdLogApi = ConvertTo-SecureString 'LogApiP@ss' -AsPlainText -Force
$pwdLogging = ConvertTo-SecureString 'LoggingP@ss' -AsPlainText -Force
$pwdMonitoring = ConvertTo-SecureString 'MonitoringP@ss' -AsPlainText -Force
$pwdAzure = ConvertTo-SecureString 'AzureP@ss' -AsPlainText -Force
$pwdAzureLA = ConvertTo-SecureString 'AzureLAP@ss' -AsPlainText -Force
$pwdBizTalk = ConvertTo-SecureString 'BizTalkP@ss' -AsPlainText -Force
$pwdBoomi = ConvertTo-SecureString 'BoomiP@ss' -AsPlainText -Force
$pwdDatabase = ConvertTo-SecureString 'DatabaseP@ss' -AsPlainText -Force
$pwdFileFolder = ConvertTo-SecureString 'FileFolderP@ss' -AsPlainText -Force
$pwdIBMMQ = ConvertTo-SecureString 'IBMMQP@ss' -AsPlainText -Force
$pwdLogFileParser = ConvertTo-SecureString 'LogFileParserP@ss' -AsPlainText -Force
$pwdMsgQueue = ConvertTo-SecureString 'MsgQueueP@ss' -AsPlainText -Force
$pwdMule = ConvertTo-SecureString 'MuleP@ss' -AsPlainText -Force
$pwdNonEvents = ConvertTo-SecureString 'NonEventsP@ss' -AsPlainText -Force
$pwdRabbitMQ = ConvertTo-SecureString 'RabbitMQP@ss' -AsPlainText -Force
$pwdWebService = ConvertTo-SecureString 'WebServiceP@ss' -AsPlainText -Force
$pwdWinServer = ConvertTo-SecureString 'WinServerP@ss' -AsPlainText -Force
.\Nodinite7-DEMO-Installation.ps1 `
-WebClientServiceAccountPassword $pwdWebClient `
-WebApiServiceAccountPassword $pwdWebApi `
-LogApiServiceAccountPassword $pwdLogApi `
-LoggingServiceServiceAccountPassword $pwdLogging `
-MonitoringServiceServiceAccountPassword $pwdMonitoring `
-AzureAgentServiceAccountPassword $pwdAzure `
-AzureLogicAppsAgentServiceAccountPassword $pwdAzureLA `
-BizTalkAgentServiceAccountPassword $pwdBizTalk `
-BoomiAgentServiceAccountPassword $pwdBoomi `
-DatabaseAgentServiceAccountPassword $pwdDatabase `
-FileFolderAgentServiceAccountPassword $pwdFileFolder `
-IBMMQAgentServiceAccountPassword $pwdIBMMQ `
-LogFileParserAgentServiceAccountPassword $pwdLogFileParser `
-MessageQueueAgentServiceAccountPassword $pwdMsgQueue `
-MuleAgentServiceAccountPassword $pwdMule `
-NonEventsAgentServiceAccountPassword $pwdNonEvents `
-RabbitMQAgentServiceAccountPassword $pwdRabbitMQ `
-WebServiceAgentServiceAccountPassword $pwdWebService `
-WindowsServerAgentServiceAccountPassword $pwdWinServer
- Verify agents in Web Client
- In Portal, click Next to exit update process
Option B: Use Custom Ports or Service Accounts
Steps
- In Portal, click Next to continue
- Click Agents tab
- Change ports and service accounts as needed
- Click Save
- Close Environment modal
- Click Actions → Download

Example of the preparing your download progress screen shown while the ZIP package is being generated.
Extract ZIP to Application Server
Open PowerShell 7 as Administrator
Open Start Menu → Search "PowerShell 7" → Right-click → Run as administratorNavigate to extracted folder
Unblock and run script:
dir -r | unblock-file .\Nodinite7-DEMO-Installation.ps1If your service account passwords contain special characters, pass them as
SecureStringvalues to avoid parsing errors.# If all service accounts share the same password $pwd = ConvertTo-SecureString 'P@ssw0rd!' -AsPlainText -Force .\Nodinite7-DEMO-Installation.ps1 ` -WebClientServiceAccountPassword $pwd ` -WebApiServiceAccountPassword $pwd ` -LogApiServiceAccountPassword $pwd ` -LoggingServiceServiceAccountPassword $pwd ` -MonitoringServiceServiceAccountPassword $pwd ` -AzureAgentServiceAccountPassword $pwd ` -AzureLogicAppsAgentServiceAccountPassword $pwd ` -BizTalkAgentServiceAccountPassword $pwd ` -BoomiAgentServiceAccountPassword $pwd ` -DatabaseAgentServiceAccountPassword $pwd ` -FileFolderAgentServiceAccountPassword $pwd ` -IBMMQAgentServiceAccountPassword $pwd ` -LogFileParserAgentServiceAccountPassword $pwd ` -MessageQueueAgentServiceAccountPassword $pwd ` -MuleAgentServiceAccountPassword $pwd ` -NonEventsAgentServiceAccountPassword $pwd ` -RabbitMQAgentServiceAccountPassword $pwd ` -WebServiceAgentServiceAccountPassword $pwd ` -WindowsServerAgentServiceAccountPassword $pwdNote
You can remove parameters for agents you do not have. Do not include the Pickup Service password parameter in this step because the Pickup Log Events Service is installed later in Step 12.
# If each service account has a different password $pwdWebClient = ConvertTo-SecureString 'WebClientP@ss' -AsPlainText -Force $pwdWebApi = ConvertTo-SecureString 'WebApiP@ss' -AsPlainText -Force $pwdLogApi = ConvertTo-SecureString 'LogApiP@ss' -AsPlainText -Force $pwdLogging = ConvertTo-SecureString 'LoggingP@ss' -AsPlainText -Force $pwdMonitoring = ConvertTo-SecureString 'MonitoringP@ss' -AsPlainText -Force $pwdAzure = ConvertTo-SecureString 'AzureP@ss' -AsPlainText -Force $pwdAzureLA = ConvertTo-SecureString 'AzureLAP@ss' -AsPlainText -Force $pwdBizTalk = ConvertTo-SecureString 'BizTalkP@ss' -AsPlainText -Force $pwdBoomi = ConvertTo-SecureString 'BoomiP@ss' -AsPlainText -Force $pwdDatabase = ConvertTo-SecureString 'DatabaseP@ss' -AsPlainText -Force $pwdFileFolder = ConvertTo-SecureString 'FileFolderP@ss' -AsPlainText -Force $pwdIBMMQ = ConvertTo-SecureString 'IBMMQP@ss' -AsPlainText -Force $pwdLogFileParser = ConvertTo-SecureString 'LogFileParserP@ss' -AsPlainText -Force $pwdMsgQueue = ConvertTo-SecureString 'MsgQueueP@ss' -AsPlainText -Force $pwdMule = ConvertTo-SecureString 'MuleP@ss' -AsPlainText -Force $pwdNonEvents = ConvertTo-SecureString 'NonEventsP@ss' -AsPlainText -Force $pwdRabbitMQ = ConvertTo-SecureString 'RabbitMQP@ss' -AsPlainText -Force $pwdWebService = ConvertTo-SecureString 'WebServiceP@ss' -AsPlainText -Force $pwdWinServer = ConvertTo-SecureString 'WinServerP@ss' -AsPlainText -Force .\Nodinite7-DEMO-Installation.ps1 ` -WebClientServiceAccountPassword $pwdWebClient ` -WebApiServiceAccountPassword $pwdWebApi ` -LogApiServiceAccountPassword $pwdLogApi ` -LoggingServiceServiceAccountPassword $pwdLogging ` -MonitoringServiceServiceAccountPassword $pwdMonitoring ` -AzureAgentServiceAccountPassword $pwdAzure ` -AzureLogicAppsAgentServiceAccountPassword $pwdAzureLA ` -BizTalkAgentServiceAccountPassword $pwdBizTalk ` -BoomiAgentServiceAccountPassword $pwdBoomi ` -DatabaseAgentServiceAccountPassword $pwdDatabase ` -FileFolderAgentServiceAccountPassword $pwdFileFolder ` -IBMMQAgentServiceAccountPassword $pwdIBMMQ ` -LogFileParserAgentServiceAccountPassword $pwdLogFileParser ` -MessageQueueAgentServiceAccountPassword $pwdMsgQueue ` -MuleAgentServiceAccountPassword $pwdMule ` -NonEventsAgentServiceAccountPassword $pwdNonEvents ` -RabbitMQAgentServiceAccountPassword $pwdRabbitMQ ` -WebServiceAgentServiceAccountPassword $pwdWebService ` -WindowsServerAgentServiceAccountPassword $pwdWinServerVerify agents in Web Client
Completion Checklist
- Monitoring Agents ZIP downloaded
- PowerShell script completed successfully
- All agents visible in Web Client with correct status
- Agent ports configured correctly
- IIS application pools running
Troubleshooting
Script Fails with Permission Error
Problem: PowerShell script fails with access denied.
Solution:
- Run PowerShell as Administrator
- Verify service account has permissions
- Check IIS application pool identity
Agents Not Visible in Web Client
Problem: After installation, agents don't appear in Web Client.
Solution:
- Refresh Web Client browser
- Check IIS application pools are started
- Verify agent ports are not blocked by firewall
- Check Event Viewer for errors