Prepare for installations and upgrades
As part of your pre-flight, prepare the Threat Monitor environment:
|Obtain your account credentials and Threat Monitor link.*|
|Review the VM collector requirements.|
|Log in to the Threat Monitor UI. The first time you log in, you will be prompted to change your password.|
|Install Threat Monitor on VMware vSphere or Microsoft Hyper-V.|
|Add a new collector from the Threat Monitor dashboard and record your collector activation token.
The step is required for new trial users. If you are a licensed customer, coordinate with your customer support representative, if necessary.
|Turn on the collector, where you will be prompted to point your browser to a web server running on the collector. For instructions, see the Threat Monitor administrator guide.|
|Configure your network devices to log to the Threat Monitor collector.|
|Verify that logs from your network device are processing into the system.|
*This information will be provided in your registration confirmation email.