Previous Topic: ScalabilityNext Topic: Operating System Support


Installation and Upgrade

If you purchase hardware from CA Technologies, all components are delivered with the operating system and security settings already configured. If you purchase software only, use the topics in the CA Network Flow Analysis Installation Guide to complete basic system configuration tasks.

This section describes the configuration procedures that you perform specifically for CA Anomaly Detector.