Previous Topic: Uninstall CA Anomaly DetectorNext Topic: Register CA Anomaly Detector


Post-Installation Tasks

If you purchase hardware from CA Technologies, all components are delivered with the operating system and security settings already configured. If you purchase software only, use the topics in the CA Network Flow Analysis Installation Guide to complete basic system configuration tasks.

This section describes the configuration procedures that you perform specifically for CA Anomaly Detector. The tasks described here assume that you have completed the steps for pre-installation and installation or upgrade.

Be prepared to configure the firewalls to allow communication between CA Anomaly Detector and other components. For information about configuring firewalls, see Configure Firewalls.

This section contains the following topics:

Register CA Anomaly Detector

Enable Configuration in the NFA Console

Add Products to Monitor

Enable the Monitored Products' Collection Sources

Configure Firewalls

Sensor Configuration

Configure Alert Targets