Skip to content
English - United States
  • There are no suggestions because the search field is empty.

Netarx Flurp: Installation Checklist & Prerequisites

This document outlines the essential information and prerequisites required to deploy the Netarx Flurp within an enterprise environment. Please complete each section thoroughly to ensure an efficient installation process. 

 

Table of Contents 

  1. Organizational and Contact Information 
  2. Microsoft 365 Tenant Approval 
  3. Endpoint Inventory & Security 
  4. Email and Browser Configuration 
  5. System Policies & Restrictions 
  6. Summary: Pre-Installation Checklist 
  7. Troubleshooting Tips 
  8. Contact & Support 

 

Organizational and Contact Information 

Important: Ensure all business and contact details are accurate to facilitate coordinated deployment. 

  • Legal Business Name:
    Example: Netarx Inc. 
  • Primary Mailing Address:
    Example: 1234 Main St, Suite 100, City, Country 
  • Primary Technical Contact (Name and Phone Number):
    Example: Jane Doe, +1-800-111-2222 

 

Microsoft 365 Tenant Approval 

Prerequisite: System Administrator must have permissions to approve Azure consent links. 

  • System Administrator Designated for Approval:
    ______ 
  • Microsoft Site Token (for approval link):
    ______

    A Microsoft Site Token is a unique identifier for your organization's Microsoft 365 instance. It is used to generate tenant consent links required for app deployment.

    Approval Link Template:
    https://login.microsoftonline.com/[YourSiteToken]/adminconsent?client_id=9144a678-b0b3-48d0-b510-289c8d257717&redirect_uri=https://app.netarx.com/api/auth/organization/microsoft/callback&scope=https://graph.microsoft.com/.default Calendars.Read Mail.ReadWrite MailboxSettings.ReadWrite User.Read.All 

 

Endpoint Inventory & Security 

  • Endpoint Computer Inventory:
    Specify device types and estimated counts. 
  • ☐ Windows 10/11       Count: _________ 
  • ☐ macOS      Count: _________ 
  • ☐ Other: ________________  Count: _________ 
  • Endpoint Protection Software (EDR/Antivirus):
    List all security solutions installed on endpoints.
    Example: CrowdStrike, McAfee, Symantec 
  • Bring Your Own Device (BYOD) Policy:
    Are employees allowed to use personal computers for work-related activities? 
    • ☐ Yes, but only through a specific VPN: _________ 
    • ☐ Yes, without a VPN 
    • ☐ No 

 

Email and Browser Configuration 

  • Email Provider: 
    • ☐ Microsoft 365 
    • ☐ Gmail 
    • ☐ Other: _________
  • Primary Email Domain and Alternative Domains:
    Example: company.com; altdomain.com
    _____________________ 
  • Multiple Domains in One Tenant:
    Are all domains managed within a single tenant? _________ 
  • Cloud Email Security/Threat Filtering Provider: 
    • ☐ Proofpoint 
    • ☐ Mimecast 
    • ☐ Barracuda 
    • ☐ Darktrace 
    • ☐ Symantec 
    • ☐ Fortinet 
    • ☐ SpamTitan 
    • ☐ Other: _________ 
  • Acceptable Web Browsers: 
    • ☐ Chrome Version: _____ 
    • ☐ Edge  Version: _____ 
    • ☐ Island Version: _____ 
    • ☐ Other: _________ 

 

System Policies & Restrictions 

  • Browser Policy Management:
    Do you manage browsers via policy or deploy protective browser plug-ins (malware protection, extensions, etc.)?
    ____________________ 
  • Software Installation Policy:
    Are endpoints restricted from installing software? If so, what mechanism is used to block installations?
    ____________________ 
  • Browser Plug-in Restrictions:
    Are there any restrictions on installing plug-ins within the approved browsers?
    ____________________ 
  • Backend Onboarding Restrictions:
    Are there any backend policies that could restrict acceptance of the email token during onboarding (e.g., Azure policies, user consent restrictions)?
    ____________________ 

 

Summary: Pre-Installation Checklist 

Ensure the following are collected and confirmed before beginning installation: 

  • Legal business name, mailing address, and technical contact details are documented. 
  • System Administrator with required permissions is identified. 
  • Microsoft Site Token is available and validated for consent link. 
  • Endpoint inventory and security software information collected. 
  • BYOD policy determined for user devices. 
  • Email provider and all relevant domains documented. 
  • Cloud email security provider and acceptable browsers information are ready. 
  • All software and browser policy restrictions are noted. 
  • Backend onboarding or consent restrictions are clarified. 

 

Troubleshooting Tips 

  • Issue: Approval link validation fails. 
    • Solution: Double-check the Microsoft Site Token for accuracy and ensure it is current. 
  • Issue: Endpoint protection software blocks installation. 
    • Solution: Whitelist the Flurp installation files or temporarily disable endpoint protection during setup. 
  • Issue: Users cannot install browser plug-ins needed for Flurp. 
    • Solution: Coordinate with IT to allow necessary browser extensions or plug-ins. 
  • Issue: Employees with BYOD devices unable to access required services. 
    • Solution: Verify VPN or policy settings that may limit BYOD access. 

 

Contact & Support 

For assistance during the installation process, contact your designated administrator or reach out to the Help Desk or contact your Account Manager. 

 

Tip: Collect and review all prerequisite information in this checklist before starting the Flurp deployment to avoid unnecessary delays.