It is recommended, but not required, to use a service account for these interactions. Threat Response interfaces with other systems to receive alerts, perform user lookups, and update systems as part of its response capabilities. If you plan to build a cluster for high-availability, you will need one local IP per-system, plus a single management IP to be shared between the systems. 1 network adaptor (default E1000 but VMXNET3 is also supported)įor administration and general usage, Threat Response will need one IP address allocated to it for network access.500 GB HDD (local databases and backups).50 GB HDD (base system for version 5.0 and beyond).4x vCPU Cores (8x vCPU cores recommended).The virtual machine requires the following, minimum hardware configuration for production deployments: It is distributed as an OVA file, and can be downloaded from the Proofpoint Customer Portal. Threat Response is a stand-alone virtual appliance. You will be seamlessly redirected to the portal with full documentation access Threat Response Requirements ¶ Virtual Machine Requirements ¶ To access all available documentation, please, perform the following steps:ģ. If you are accessing this page directly through the link, all the other content will be protected. Threat Response documentation portal is accessible to Threat Response customers only. Reviewing the Event Viewer for Startup Warnings Managing Threat Response Configuration InformationĮnable the Logon Audit in Active DirectoryĮnable User-IP tracking in Threat Response
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |