Overview &
Prerequisites
This guide walks you through deploying Pulse Connect Secure (PCS) agents on Windows Server environments — from initial prerequisites through full validation.
What You'll Learn
Pulse Connect Secure (PCS) agents provide secure SSL/TLS-based VPN connectivity, enabling Zero Trust network access. The agent runs as a Windows service and handles authentication, tunnel management, and policy enforcement.
System Requirements
| Component | Minimum | Recommended |
|---|---|---|
| OS | Windows Server 2016 | Windows Server 2022 |
| RAM | 4 GB | 8 GB+ |
| Disk | 10 GB free | 20 GB free |
| .NET Framework | 4.7.2 | 4.8+ |
| Network | TCP 443 (outbound) | TCP 443 + UDP 4500 |
| Admin Rights | Local Administrator | Domain Admin (recommended) |
Pre-Installation Checklist
- ✓Windows Server has all pending updates applied
- ✓Firewall allows outbound TCP 443 to PCS appliance IP
- ✓DNS resolution of PCS gateway hostname confirmed
- ✓.NET Framework 4.7.2 or higher installed
- ✓Service account credentials prepared (if using non-interactive auth)
- ✓Existing VPN clients/agents removed or identified
Download &
Verify Agent
Obtain the correct agent package from your PCS appliance admin portal and verify its integrity before installation.
Log into the PCS administration portal and navigate to the agent download section. Select the Windows Server variant.
Always verify the SHA-256 hash of the downloaded package against the value shown in the admin portal.
Verify the Authenticode signature to confirm the package is signed by Ivanti/Pulse Secure.
Agent
Installation
Deploy the PCS agent via GUI installer or silent command-line installation for automated/enterprise deployments.
Use the silent install method for reproducible, automated deployments via SCCM, Intune, or Group Policy.
For manual installs on individual servers, run the setup wizard as Administrator.
- ✓Right-click
PCS-AgentSetup.exe→ Run as Administrator - ✓Accept license agreement (EULA)
- ✓Choose install directory (default:
C:\Program Files\Pulse Secure\) - ✓Select "Windows Service" install type
- ✓Click Install and wait for completion
- ✓Reboot if prompted (usually not required on Server)
Confirm the Pulse Secure service is installed and running correctly.
Initial
Configuration
Configure the agent to connect to your PCS gateway, set authentication parameters, and define connection profiles.
Set the primary and optional secondary PCS gateway URLs via registry or the admin configuration tool.
Define how the agent authenticates to the PCS gateway. Certificate-based auth is recommended for server deployments.
| Method | Use Case | Config Key |
|---|---|---|
| Certificate | Server-to-server, no user interaction | AuthType=CERT |
| SAML | Federated identity / SSO environments | AuthType=SAML |
| LDAP/AD | Active Directory domain accounts | AuthType=LDAP |
| Local Auth | Standalone / lab environments | AuthType=LOCAL |
Deploy a Pulse Policy Secure Package (.ppkg) to configure connection profiles, split tunneling, and traffic policies.
Restart-Service PulseSecureService
Advanced
Settings
Fine-tune split tunneling, logging verbosity, proxy configuration, and Host Checker policy enforcement.
Define which traffic routes through the VPN tunnel vs. directly to the internet. Split-tunnel reduces load on the PCS appliance.
Enable verbose logging during initial deployment for troubleshooting. Disable in production.
Host Checker enforces endpoint compliance (AV status, OS patches, firewall state) before granting VPN access. Policies are defined server-side.
Testing
Scenarios
Execute these test scenarios to validate your PCS agent deployment before production rollout.
- Open PowerShell as Administrator on the target Windows Server
- Run:
Test-NetConnection -ComputerName vpn.company.com -Port 443 - Confirm
TcpTestSucceeded: Truein output - Run:
Invoke-WebRequest https://vpn.company.com -UseBasicParsing - Confirm HTTP 200 or 302 response (not timeout/refused)
- Open Pulse Secure client UI (or run CLI connect command)
- Select the configured connection profile
- Enter credentials (or confirm cert-based auth proceeds automatically)
- Verify status changes to "Connected" with assigned virtual IP
- Confirm assigned VIP falls within expected range (e.g., 10.200.0.x)
- While connected, run
route printand capture the routing table - Ping a corporate internal server:
ping 10.0.1.10— should succeed via VPN - Ping a public DNS server:
ping 8.8.8.8— should succeed via local NIC - Use
tracert 10.0.1.10— first hop should be VPN virtual gateway IP - Use
tracert 8.8.8.8— first hop should be your LAN default gateway
- Establish VPN connection and confirm stable state
- Disable the NIC temporarily:
Disable-NetAdapter -Name "Ethernet" -Confirm:$false - Wait 30 seconds to simulate disconnection
- Re-enable NIC:
Enable-NetAdapter -Name "Ethernet" - Observe Pulse agent status — should reconnect automatically within 60 seconds
- Check logs for
RECONNECT_ATTEMPTandCONNECTEDevents
- Temporarily disable Windows Firewall service on a test server
- Attempt to connect to the VPN
- Verify connection is denied with message: "Host Checker policy failed"
- Re-enable Windows Firewall and re-attempt
- Verify connection succeeds and access is restored
Validation
Checks
Complete these automated validation checks to confirm your deployment is fully operational and production-ready.
Validation Dashboard
Automated Validation Script
Portal-Side Validation
- ✓PCS admin portal → Users → Active Sessions shows connected server
- ✓Session shows correct Role, Realm, and assigned Virtual IP
- ✓Host Checker status shows "Passed" for all policies
- ✓Event log (System > Reports > User Access Log) shows no auth errors
- ✓Bandwidth utilization visible in portal dashboard
Trouble-
shooting
Common issues and resolutions encountered during PCS agent deployments on Windows Server.
The PulseSecureService fails to start, shows "Stopped" status, or immediately crashes after starting.
Connection attempt returns "Certificate not found" or "Authentication server rejected the certificate".
VPN connects successfully but drops every few minutes. Often caused by keep-alive timeouts or MTU issues.
Connection blocked by Host Checker even though the server appears to meet all requirements.
C:\ProgramData\Pulse Secure\Logs\ and open a support case with your PCS administrator or Ivanti support.