Prepare for installations and upgrades
As part of your pre-flight, prepare the Threat Monitor environment:
![]() |
Obtain your account credentials and Threat Monitor link.* |
![]() |
Review the VM collector requirements. |
![]() |
Log in to the Threat Monitor UI. The first time you log in, you will be prompted to change your password. |
![]() |
Install Threat Monitor on VMware vSphere or Microsoft Hyper-V. |
![]() |
Add a new collector from the Threat Monitor dashboard and record your collector activation token. The step is required for new trial users. If you are a licensed customer, coordinate with your customer support representative, if necessary. |
![]() |
Turn on the collector, where you will be prompted to point your browser to a web server running on the collector. For instructions, see the Threat Monitor administrator guide. |
![]() |
Configure your network devices to log to the Threat Monitor collector. |
![]() |
Verify that logs from your network device are processing into the system. |
*This information will be provided in your registration confirmation email.