ArchitecturePuppet Remediate consists of a number of components and services, each one running as an individual Docker container.System requirementsBefore installing Puppet Remediate, check to ensure your system meets these requirements.Install Remediate on online nodesInstall Puppet Remediate on a Linux or Windows machine that is connected to the internet. Install Remediate on offline nodesIf any of your swarm nodes are offline (do not have external connectivity), you must manually import the Puppet Remediate images in order to install the product.Install Remediate from a custom container registryYou can also use a custom Docker registry to install Puppet Remediate.Install Remediate in multi-network deploymentsPuppet Remediate connects to security providers to discover hosts with vulnerabilities. To take action and fix the vulnerabilities, the system needs to connect directly to the hosts. If the host you want to fix is deployed in different network segments that are not directly accessible from where you installed Remediate, you can setup a multi-network deployment.Verify Docker Compose file for online installsWith each Puppet Remediate release, a digital signature is created using the private key portion of an asymmetric key. You can manually validate the signature using the public key portion of the same asymmetric key.Using TLS certificates with RemediateBy default Puppet Remediate uses self-signed TLS certificates. You can also optionally set and configure your own certificates for Remediate if you prefer.Analytics data collectionPuppet Remediate automatically collects data about how you use the product. If you want to opt out of providing this data, you can do so, either during or after installing.Uninstall RemediateYou can uninstall Puppet Remediate easily with a couple of commands.