<body><!-- [DocumentBodyStart:ba215c2c-bdc2-4f48-9f96-8e05c6cfe5d0] --><div class="jive-rendered-content"><div style="margin-bottom: 15px;"><h6 style="text-align: justify;"><a class="" href="https://community.rsa.com/docs/54405"><span class="jive-icon-med jive-icon-doctype-acrobat" title=""></span>View PDF </a></h6><span class="jp-toc-collapse"> </span><span class="jp-toc-expand"> </span></div><ul class="jp-toc"><li class="leaf"><a class="jive-link-wiki-small" data-containerId="2472" data-containerType="14" data-objectId="74180" data-objectType="102" href="https://community.rsa.com/docs/DOC-74180">Basic Deployment</a></li><li class="leaf"><a class="jive-link-wiki-small" data-containerId="2510" data-containerType="14" data-objectId="66376" data-objectType="102" href="https://community.rsa.com/docs/DOC-66376">Install Security Analytics Virtual Host in Virtual Environment</a><br/><ul><li class="leaf"><a class="jive-link-wiki-small" data-containerId="2510" data-containerType="14" data-objectId="66378" data-objectType="102" href="https://community.rsa.com/docs/DOC-66378">Step 1. Deploy the Virtual Host</a></li><li class="leaf"><a class="jive-link-wiki-small" data-containerId="2510" data-containerType="14" data-objectId="66373" data-objectType="102" href="https://community.rsa.com/docs/DOC-66373">Step 2. Configure the Network</a></li><li class="leaf"><a class="jive-link-wiki-small" data-containerId="2510" data-containerType="14" data-objectId="66372" data-objectType="102" href="https://community.rsa.com/docs/DOC-66372">Step 3. Configure Databases to Accommodate Security Analytics</a><br/><ul><li class="leaf"><a class="jive-link-wiki-small" data-containerId="2510" data-containerType="14" data-objectId="66379" data-objectType="102" href="https://community.rsa.com/docs/DOC-66379">Task 1. Review Initial Datastore Configuration</a></li><li class="leaf"><a class="jive-link-wiki-small" data-containerId="2510" data-containerType="14" data-objectId="66374" data-objectType="102" href="https://community.rsa.com/docs/DOC-66374">Task 2. Review Optimal Datastore Space Configuration</a></li><li class="leaf"><a class="jive-link-wiki-small" data-containerId="2510" data-containerType="14" data-objectId="66377" data-objectType="102" href="https://community.rsa.com/docs/DOC-66377">Task 3. Add New Volume and Extend Existing File Systems</a></li></ul></li><li class="leaf"><a class="jive-link-wiki-small" data-containerId="2510" data-containerType="14" data-objectId="66360" data-objectType="102" href="https://community.rsa.com/docs/DOC-66360">Step 4. Configure Host-Specific Parameters</a></li></ul></li></ul><div class="unique748559432"> </div></div><!-- [DocumentBodyEnd:ba215c2c-bdc2-4f48-9f96-8e05c6cfe5d0] --></body>