If you only need to install the Log Viewer, you can follow the installation steps outlined in Installing the Components , and ensure that only the Log Viewer is selected.
2 |
3 |
It Security Search is a cross-product searching platform. Once it is configured in your environment, you set up System Configuration to push collected data from Enterprise Reporter to the IT Security Search repository. To be able to push collected data to the repository, the database account must have db-owner rights to the Enterprise Reporter database. For information on installing and configuring IT Security Search, see the IT Security Search documentation in your download package or CD.
© 2024 Quest Software Inc. ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center