Documentation forThreat Monitor

Prepare for installations and upgrades

As part of your pre-flight, prepare the Threat Monitor environment:

Obtain your account credentials and Threat Monitor link.*
Review the VM collector requirements.
Log in to the Threat Monitor UI. The first time you log in, you will be prompted to change your password.
Install Threat Monitor on VMware vSphere or Microsoft Hyper-V.
Add a new collector from the Threat Monitor dashboard and record your collector activation token.

The step is required for new trial users. If you are a licensed customer, coordinate with your customer support representative, if necessary.

Turn on the collector, where you will be prompted to point your browser to a web server running on the collector. For instructions, see the Threat Monitor administrator guide.
Configure your network devices to log to the Threat Monitor collector.
Verify that logs from your network device are processing into the system.

*This information will be provided in your registration confirmation email.