Chat now with support
Chat mit Support

Change Auditor Threat Detection 7.5 - Deployment Guide

Requirements and prerequisites

For a successful deployment, ensure that your environment meets the minimum system requirements.

The Threat Detection server deployed on VMWare ESX is available in both 8 and 16 cores versions.
For a Hyper-v deployment, a single server is available and you select the number of cores during the deployment.

For all deployments:

Events to configure

NOTE: Consider Maintaining the Change Auditor database size when adding events for Threat Detection auditing.

Events from the following modules are used to build models and generate alerts:

Port Requirements

The following ports are required for Threat Detection server operation:

Maintaining the Change Auditor database size

Some of the events required for Threat Detection can be very noisy and take up significant space in the Change Auditor database. Once the events are sent to the Threat Detection server for analysis storage in the Change Auditor database is no longer needed.

To ensure the database maintains a manageable size, Quest recommends that you purge events older than 30 days.

Particularly noisy events are:

Verwandte Dokumente
Change Auditor Threat Detection - 7.5
Deployment Guide
User Guide
Showing 1 to 2 of 2 rows

The document was helpful.

Bewertung auswählen

I easily found the information I needed.

Bewertung auswählen