Previous Topic: Uninstall CA Anomaly DetectorNext Topic: Configure Firewalls


Post-Installation Tasks

If you purchase hardware from CA Technologies, all components are delivered with the operating system and security settings already configured. If you purchase software only, use the topics in the CA Network Flow Analysis Installation Guide to complete basic system configuration tasks.

This section describes the configuration procedures that you perform specifically for CA Anomaly Detector. The tasks described here assume that you have completed the steps for pre-installation and installation or upgrade.

Be prepared to configure the firewalls to allow communication between CA Anomaly Detector and other components. For information about configuring firewalls, see Configure Firewalls.

This section contains the following topics:

Configure Firewalls

Register with CA NetQoS Performance Center

Add Products for CA Anomaly Detector to Monitor

Enable the Monitored Products

Sensor Configuration

Configure Alert Targets