This topic provides an overview of the end-to-end sequential configuration procedure for the VMware Collection protocol with a checklist that contains each configuration step.
Configuration steps for the VMware collection protocol must occur in the specific sequence listed in the table below.
VMware Collection Configuration Checklist
Note: The steps in this list are in the order in which you must complete them.
Configure VMware Event Sources in Security Analytics.
Configure VMware Event Sources to Send Events to Security Analytics.
Start service for configured VMware collection protocol.
Verify that VMware Collection is working.