If you purchase hardware from CA Technologies, all components are delivered with the operating system and security settings already configured. If you purchase software only, use the topics in the CA Network Flow Analysis Installation Guide to complete basic system configuration tasks.
This section describes the configuration procedures that you perform specifically for CA Anomaly Detector.
|
Copyright © 2015 CA Technologies.
All rights reserved.
|
|