This website uses cookies. By clicking OK, you consent to the use of cookies. Click Here to learn more about how we use cookies.
OK
  • RSA.com
  • Products
    • Archer®
      • Archer®
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Archer® Exchange
      • Training
      • Upcoming Events
      • Videos
    • RSA® Fraud & Risk Intelligence Suite
      • RSA® Fraud & Risk Intelligence Suite
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Web Threat Detection
      • Upcoming Events
      • Videos
    • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Cloud
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Upcoming Patch Content
      • Videos
    • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication Mobile SDK
      • Advisories
      • Events
      • Ideas
      • Knowledge Base
      • Request Access
      • Training
    • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 7.x
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® Adaptive Authentication for eCommerce
      • RSA® Adaptive Authentication for eCommerce
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® FraudAction Services
      • RSA® FraudAction Services
      • Advisories
      • Discussions
      • Documentation
      • Ideas
      • Videos
    • RSA® Web Threat Detection
      • RSA® Web Threat Detection
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Videos
    • RSA NetWitness® Platform
      • RSA NetWitness® Platform
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Integrations
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • RSA NetWitness® Detect AI
      • RSA NetWitness® Detect AI
      • Documentation
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA NetWitness® Investigator
      • RSA NetWitness® Investigator
      • Documentation
      • Download the Client
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA NetWitness® Orchestrator
      • RSA NetWitness® Orchestrator
      • Overview
      • Documentation
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA SecurID® Suite
      • RSA SecurID® Suite
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Knowledge Base
      • Ideas
      • Integrations
      • Training
      • Videos
    • RSA® Identity Governance & Lifecycle
      • RSA® Identity Governance & Lifecycle
      • Advisories
      • Blog
      • Community Exchange
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • RSA SecurID® Access
      • RSA SecurID® Access
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Integrations
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • Other RSA® Products
      • Other RSA® Products
      • RSA® Access Manager
      • RSA® Data Loss Prevention
      • RSA® Digital Certificate Solutions
      • RSA enVision®
      • RSA® Federated Identity Manager
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
  • Resources
    • Advisories
      • Product Advisories on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Hosted
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Product Advisories
    • Blogs
      • Blogs on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Blogs on RSA Link
    • Discussion Forums
      • Discussion Forums
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Discussion Forums on RSA Link
    • Documentation
      • Product Documentation
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Documentation on RSA Link
    • Downloads
      • Product Downloads
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Downloads on RSA Link
    • Ideas
      • Idea Exchange
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Documentation on RSA Link
    • Knowledge Base
      • Knowledge Base
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Knowledge Base Pages on RSA Link
    • Upcoming Events on RSA Link
      • Upcoming Events
    • Videos
      • Videos on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Videos on RSA Link
  • Support
    • RSA Link Support
      • RSA Link Support
      • News & Announcements
      • Getting Started
      • Support Forum
      • Support Knowledge Base
      • Ideas & Suggestions
    • RSA Product Support
      • RSA Product Support
      • General Security Advisories and Statements
      • Product Life Cycle
      • Support Information
      •  
      •  
      •  
      •  
      •  
  • RSA Ready
  • RSA University
    • Certification Program
      • Certification Program
    • Course Catalogs
      • Course Catalogs
      • Archer®
      • RSA NetWitness® Platform
      • RSA SecurID® Suite
    • On-Demand Subscriptions
      • On-Demand Subscriptions
      • Archer®
      • RSA NetWitness® Platform
      • RSA SecurID® Suite
    • Product Training
      • Product Training
      • Archer®
      • RSA® Fraud & Risk Intelligence Suite
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
    • Student Resources
      • Student Resources
      • Access On-Demand Learning
      • Access Virtual Labs
      • Contact RSA University
      • Enrollments & Transcripts
      • Frequently Asked Questions
      • Getting Started
      • Learning Modalities
      • Payments & Cancellations
      • Private Training
      • Training Center Locations
      • Training Credits
      • YouTube Channel
    • Upcoming Events
      • Upcoming Events
      • Full Calendar
      • Conferences
      • Live Classroom Training
      • Live Virtual Classroom Training
      • Webinars
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

RSA NetWitness® Platform Online Documentation

Browse the official RSA NetWitness Platform Online documentation for helpful tutorials, step-by-step instructions, and other valuable resources.
  • RSA Link
  • :
  • Products
  • :
  • RSA NetWitness Platform
  • :
  • Documentation
  • :
  • Online Documentation
  • :
  • Endpoint Config: (Optional) Installing and Configu...
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Email to a Friend
    • Printer Friendly Page
    • Report Inappropriate Content
    • English
    • French (Français)
    • German (Deutsche)
    • Japanese (日本人)
    • Spanish (Español)
Versions
Collections
All Downloads

Table of Contents

  •   Release Notes
    •   Release Notes 11.5
      •   What's New
      •   Fixed Issues
      •   Known Issues
      •   End of Life Functionality
      •   Product Documentation
      •   Getting Help with NetWitness Platform
      •   Build Numbers
      •   Revision History
    •   Release Notes 11.5.0.1
      •   What's New
      •   Upgrade Instructions
      •   Build Numbers
      •   Appendix
    •   Release Notes 11.5.1
      •   What's New
      •   Fixed Issues
      •   Product Documentation
      •   Getting Help with NetWitness Platform
      •   Build Numbers
      •   Revision History
    •   Release Notes 11.5.2
      •   What's New
      •   Fixed Issues
      •   Product Documentation
      •   Getting Help with NetWitness Platform
      •   Build Numbers
      •   Revision History
    •   Release Notes 11.5.3
    •   Release Notes 11.5 Language Pack
      •   Introduction
      •   Contact Customer Care
      •   Product Documentation
      •   Revision History
      •   Release Notes
  •   Getting Started
    •   RSA NetWitness Platform
      •   Introduction
      •   User Roles
      •   Basic Navigation
      •   Logs and Network Investigation
      •   Endpoint Investigation
      •   User Entity Behavior Analysis
      •   Common Use Cases and Business Value
    •   Feeds, Parsers and Hunting Packs
      •   Content Quick Start Guide
      •   Network Data and Logs Hunting Guide
      •   UEBA Essentials Hunting Guide
      •   UEBA Essentials Hunting Pack
      •   Content Bundles (Packs)
      •   Investigation Model for Information Security Incident Response
      •   Investigation Feed
      •   Simple Feed Creation
      •   A Treatise on Writing Packet Parsers
      •   Log Parser Customization
      •   All RSA Content Information
  •   Install and Upgrade
    •   Understand the Architecture and Plan
      •   Look at Deployment from a High Level
      •   Choose Your Deployment Options
      •   Review the Architecture and Ports
      •   Third-Party Licenses
    •   Understand Licenses
      •   Understand NetWitness Licenses
    •   Download RSA NetWitness Platform Software
      •   View All Downloads
    •   Install on a Physical Host
      •   Set up Hardware
      •   Physical Host Installation
      •   Create a Build Stick
      •   Configure and Allocate Storage
    •   Install on an On-Premise Host
      •   Install on an On-Premise Virtual Host
      •   Configure and Allocate Storage
      •   Deploy Health and Wellness (BETA) on a Dedicated Virtual Host
    •   Install in the Cloud
      •   Install on an AWS Instance
      •   Install on an Azure Virtual Machine
      •   Install on a Google Cloud Platform Instance
      •   Configure and Allocate Storage
    •   Install Endpoints
      •   About Insights and Advanced Endpoint Agents
      •   Install an Endpoint Server
      •   Install Endpoint Agents
      •   Install and Configure an Endpoint Relay Server
      •   Migrate Version 4.4.0.x to RSA NetWitness Platform
    •   Install Standalone UEBA Server
      •   Install NetWitness UEBA
      •   Integrate with Third-Party SIEM
    •   Install Platform Licenses
      •   Understand How Licensing Works
      •   Understand License Types
      •   Install Product Licenses
    •   Upgrade from 11.x to 11.x
      •   11.x Physical or Virtual Host to Version 11.5
      •   11.x Physical or Virtual Host to Version 11.5.0.1
      •   11.x Physical or Virtual Host to 11.5.1
      •   11.x Physical or Virtual Host to 11.5.2
      •   11.x Physical or Virtual Host to 11.5.3
  •   Configure and Manage
    •   Basic Services
      •   Hosts and Services
      •   Deploy Hosts and Install Services
      •   Services Configuration Properties
    •   Live Services
    •   Configure Network Data Capture
      •   Configure a Network Decoder
      •   Configure a Broker or Concentrator
      •   Start and Stop Data Capture
      •   Filter Data and Set Up Alert Rules
      •   Configure Feeds and Parsers
      •   Configure Warehouse Connector
      •   Tuning your Core Database
    •   Configure Log Collection
      •   Capture Data
      •   Basic Log Collection
      •   Supported Event Sources
      •   Event Sources for Log Collection
      •   Search for Specific Event Sources
      •   Windows Legacy Collector
      •   Customize Log Parsers
      •   Edit Log Parsers
      •   Archive Log Data
      •   Configure Workbench
      •   Enable Endpoints for Log Collection
      •   Integration with LogStash
      •   Event Export Connector Installation and Configuration Guide
    •   Configure Endpoint Data Collection
      •   Configure the Endpoint Log Hybrid
      •   Forward Endpoint Data to a Log Decoder
      •   Define Agent Behavior
      •   Risk Score Calculation
      •   Monitor Endpoints outside Your Network
    •   Configure UEBA
    •   Configure Real-Time Analysis, Enrichment Lookup, and Automated Threat Detection
      •   Event Stream Analytics
      •   Best Practices for Writing ESA Rules
      •   Enrichment Lookup Capability
      •   Automated Threat Detection
    •   Configure Incident Management Capability
      •   Incident Response Settings
    •   Configure Application Settings
      •   Configure Access, Notification, Logging, Investigation, Live, and Syslog Settings
      •   Configure Your Dashboard
      •   Review the Dashboards Catalog
    •   Configure Reports
      •   Set Up RSA NetWitness for Report Generation
      •   Generate Reports
      •   Review Reports
      •   Review Core Compliance Reports
    •   Configure Security and User Access
      •   Secure the RSA NetWitness Platform Network
      •   Set Up System-Level Security Settings
      •   Change the Default Admin Password
      •   Configure External Authentication
      •   Configure PKI Authentication
      •   Use a Custom Server Certificate
      •   Manage Users with Roles and Permissions
      •   Implement Data Privacy
    •   Configure Your System
    •   Monitor Health and Wellness
      •   Monitor Health and Wellness Using Kibana
      •   Reissue Certificates
      •   Track License Usage
      •   Tune Core Database Performance
      •   Manage Periodic Backups and Incidental Restoring
    •   Maintain the System
      •   Monitor Health and Wellness
      •   Monitor Health and Wellness Using Kibana
      •   Reissue Certificates
      •   Track License Usage
      •   Tune Core Database Performance
      •   Manage Periodic Backups and Incidental Restoring
  •   Investigate and Respond
    •   Respond to Incidents
      •   Incident Management
      •   Use Case Examples
    •   Configure System and View Investigate Settings
      •   Configure Query and Session Attributes for Analysts
      •   Configure Global Default Settings and Limits for Investigate
      •   Configure Navigate and Legacy Events View Settings (User Preference)
      •   Configure Events View Settings (User Preference)
      •   Configure Malware Analysis View Settings (User Preference)
    •   Investigate Network Data and Logs
      •   Search for Text Patterns
      •   Use Query Hints in the Events View
      •   Conduct Malware Analysis
    •   Investigate Endpoints
      •   Review the Workflow
      •   Isolate a Host from the Network
    •   Analyze User and Entity Behavior
  •   Integrate and Develop
    •   RSA NetWitness Platform Integrations Catalog
      •   Integration Catalog
      •   Integrate with RSA Archer
      •   Integrate with RSA SecurID
      •   Integrate with NetWitness Endpoints
    •   Developer Tools
      •   Use the NetWitness API
      •   Use the RESTful API
      •   Use the NwConsole
      •   Use the nw-shell Utility to Troubleshoot Operations
  •   NetWitness Endpoints 4.4
    •   Release Notes
      •   4.4.0.1
      •   4.4.0.2
      •   4.4.0.3
      •   4.4.0.4
      •   4.4.0.5
      •   4.4.0.6
      •   4.4.0.8
      •   4.4.0.9
      •   4.4.1.0
      •   4.4.1.1
      •   4.4.1.2
      •   4.4.1.3
      •   4.4.1.4
    •   Installation
      •   Installation of Endpoint 4.4
    •   User Guide
      •   User Guide for Endpoint 4.4

Product Resources

  •   Advisories
    •   NetWitness Platform
      •   Product Advisories
      •   Security Advisories
      •   Service Notifications
      •   Technical Advisories
    •   NetWitness Orchestrator
      •   Product Advisories
      •   Security Advisories
      •   Service Notifications
      •   Technical Advisories
  •   Blog
  •   Discussions
  •   Documentation
    •   Online Documentation
    •   Detect AI
    •   Endpoint
    •   Hardware Setup Guides
    •   Investigator
    •   Orchestrator
    •   Threat Intelligence
  •   Downloads
    •   RSA NetWitness Platform
    •   RSA NetWitness Investigator
    •   RSA NetWitness Endpoint
  •   Events
  •   Ideas
  •   Integrations
  •   Knowledge Base
    •   NetWitness Platform
    •   NetWitness Endpoint 4.x
  •   Training
  •   Videos
Endpoint Config: (Optional) Installing and Configuring Relay Server

Endpoint Config: (Optional) Installing and Configuring Relay Server

Note: The information in this topic applies to RSA NetWitness Platform Version 11.3.1 and later.

Relay Server (referred to as RAR in RSA Endpoints) extends NetWitness Platform’s visibility into endpoints when they are outside the corporate network. The Relay Server deployed in a cloud or DMZ relays the endpoint data between the hosts and the Endpoint Server. The hosts that are outside the corporate network send the endpoint data to the configured Relay Server and the corresponding Endpoint server pulls the data.

Note: If you have Windows hosts that are outside the corporate network, the log data is not sent to the Relay Server.

You can configure a Relay Server on the Endpoint Server Config view. Once the Relay Server is configured, the policy for the host is automatically updated and you can view the Relay Server settings on the Host Details view > Policy Details panel.

You can configure a single Relay Server with one or more Endpoint servers. In this case, the Relay Server ensures that the endpoint data reaches the Endpoint Server configured in the policy.

The following describes the architecture of the Relay Server.

rar.png

The following flowchart explains how the host switches to the Relay Server.

RAR_Switch.png

Installing the Relay Server

The Relay Server installer contains binaries, certificates, configuration files, and the installation script required to install the Relay Server.

IMPORTANT:
- The Relay Server version must match with the corresponding NetWitness Endpoint Server version. If you plan to upgrade a Relay Server to a newer version, first upgrade the Endpoint Server, then download the Relay Server installer, and run the installer script.
- Operating System updates and general system hardening on the Relay Server must be managed by the customer according to standard best practices. The Relay server package does not contain OS updates and the operating system will not be updated as part of the standard NetWitness update process.
- Do NOT run the nwsetup-tui script to install the Relay Server. Follow the instructions in this document only as Relay Server is an independent server and not part of NetWitness Platform UI (Admin > Hosts).

Installation Media

The Relay Server can be installed only on a CentOS 7 or NetWitness Platform 11.4.0.0 or later base image which is available for download from Download Central (https://download.rsasecurity.com). Also, make sure that the Relay server host is connected to internet to download the required dependencies.
For more information on deploying Relay Server host on a:

  • DMZ - see "Step 1a. Deploy the Virtual Host to create VM" in the Virtual Host Installation Guide.
  • Cloud
    • see "Step 1. Deploy NW Server Host" in the Azure Installation Guide.
    • see "AWS Deployment" in the AWS Installation Guide.

Relay Server Host System Requirements

AgentsRAMCPU CoresDiskIdeal Beacon Interval
2000032 GB4 cores200GB5 min

To install the Relay Server:

  1. Log in to NetWitness Platform.
  2. Click AdminIcon_25x22.png (Admin) > Services.
  3. Select the Endpoint Server service and click ic-actns.png > View > Config > Relay Server tab.
  4. In the Download Installer section, enter the installer password and click Download to download the Relay Server installer file (RelayInstaller.zip).
  5. Copy the Relay Server installer file (RelayInstaller.zip) to the Relay Server host.
  6. Unzip the RelayInstaller.zip file on the Relay Server host. For example:

    /home/RelayInstaller.zip
    unzip <installer path>

  7. Set up the execution permission using the following command:

    chmod +x install.sh

  8. Run the installer script using the following command:

    ./install.sh

    The All necessary RPMs will be installed without further prompts is displayed.

  9. Enter Y to continue the installation.

    The password prompt is displayed.

  10. Enter the password.

    Note: Make sure you enter the same password you set while downloading the Relay Server installer.

    Note: In case if you are re-installing the Relay Server host. Do you wish to update the list prompt is displayed.
    - Enter Y to update the Endpoint server IPs.

    Enter the Endpoint Server IPs prompt is displayed.

  11. Enter all the Endpoint server IPs you plan to configure with the Relay server with comma separated.

If the Relay Server installation is successful, you can check the status of the services:

  • Check if the Relay Server is up and running:

    systemctl status rsa-nw-relay-server

  • Check if Ngnix is running:

    systemctl status ngnix

You can also update Endpoint Server IPs without installing the Relay Server.

To update Endpoint Server IPs without installing the Relay Server:

  1. Run the following command:

    bash /var/netwitness/relay-configure-allowed-hosts.sh

    The list of all the configured Endpoint server IPs is displayed and Do you wish to update the list prompt is displayed.

  2. Enter Y to update the list of Endpoint server IPs.

    Enter the Endpoint Server IPs prompt is displayed.

  3. Enter a comma-separated list of all the Endpoint Server IPs to update.

    The list of updated IPs is displayed.

Configuring the Relay Server

Make sure you have installed the Relay Server.

Note: During Relay Server host installation, firewalld is configured to allow incoming connections only on TCP ports 443 and 22.

To configure the Relay Server:

  1. Log in to NetWitness Platform.
  2. Click AdminIcon_25x22.png (Admin) > Services.
  3. Select the Endpoint Server service and click Actions_Icon.png > View > Config > Relay Server tab.

    The Relay Server tab is displayed.

    RelSerTab.png

  4. Select the Enable Relay Server check box to enable the Relay Server configuration.

    Note: To disable the Relay Server, clear the Enable Relay Server check box.

    Caution: Before you disable the Relay Server configuration, if the hosts will be always roaming make sure to migrate these hosts to an alternate Endpoint server configured with a different Relay server. Else these hosts will not be able to connect back to the corporate network. When you disable the configuration, the Relay Server settings are removed from the EDR policy.

  5. In the Configure section:

    1. Enter the ESH.
    2. Specify the Relay Server, Port and HTTP Beacon Interval.

    IMPORTANT: RSA recommends that you provide the hostname that is resolvable for both agents and Endpoint Server instead of IP address.

  6. Click Test Connection to check if the Relay Server is reachable.
  7. Click Save Configuration to save the configuration.

Note: Before you modify the Relay Server configuration, perform any one of the following:
- Make sure that the hosts are inside the corporate network so that the policy with the Relay Server configuration is applied.
- If hosts will always be roaming, then migrate these hosts to an alternate Endpoint server configured with a different Relay Server.

IMPORTANT: You must change the root password after you deploy the Relay Server host.

docFeedback.png

Previous Topic:Configure Retention Policy for Memory Dumps and MFT
Next Topic:Integrate NetWitness Endpoint 4.4.0.2 or Later with NetWitness Endpoint 11.3
You are here

Table of Contents > (Optional) Installing and Configuring Relay Server

Labels (1)
Labels:
  • Version 11.x

Tags (7)
  • 11.x
  • NetWitness
  • NW
  • NWP
  • RSA NetWitness
  • RSA NetWitness Platform
  • Version 11.x
0 Likes
Was this article helpful? Yes No
Share
No ratings

On this page

Powered by Khoros
  • Products
  • Resources
  • Solutions
  • RSA University
  • Support
  • RSA Labs
  • RSA Ready
  • About RSA Link
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
© 2021 RSA Security LLC or its affiliates.
All rights reserved.