Deployment: Deployment Overview

Document created by RSA Information Design and Development on Jul 27, 2016
Version 1Show Document
  • View in full screen mode
 

The components and topology of a Security Analytics network can vary greatly between installations, and should be carefully planned before the process begins. You should also run the Benchmark Utility for each service after you initially deploy Security Analytics to ensure that the host (hardware or VM) and operation systems for each service measures up to the baseline performance RSA recommends.

After the initial planning, and consideration of site requirements and safety requirements, the general sequence is:

  1. Install appliances and connect to the network as described in the Hardware Setup Guides.
  2. Set up licensing for Security Analytics as described in the Security Analytics Licensing Guide.
  3. Configure individual appliances and services as described in Host and Services Configuration Guides. These guides also describe the procedures for applying updates and preparing for version upgrades.

 

You are here: Deployment Overview

Attachments

    Outcomes