For a successful deployment, ensure that your environment meets the minimum system requirements.
• |
NOTE: Consider Maintaining the Change Auditor database size when adding events for Threat Detection auditing. |
Events from the following modules are used to build models and generate alerts:
The following ports are required for Threat Detection server operation:
Change Auditor client and Chrome web browser to Threat Detection server |
|
© ALL RIGHTS RESERVED. Conditions d’utilisation Confidentialité Cookie Preference Center