Windows Marketplace V.90 Installationsanleitung Seite 3

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 34
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 2
Table of Contents
About Deep Security ....................................................................................................................................................................... 4
Installation Checklist....................................................................................................................................................................... 6
Deep Security Licensing on AWS Marketplace ..................................................................................................................................... 7
Check Permissions and Communication ............................................................................................................................................. 8
Database Deployment Considerations................................................................................................................................................ 9
Installing the Deep Security Manager .............................................................................................................................................. 11
Upgrading the Deep Security Manager............................................................................................................................................. 15
Add Amazon EC2 Resources to Deep Security Manager ...................................................................................................................... 16
Installing Deep Security Agents ...................................................................................................................................................... 19
Appendices ................................................................................................................................ 26
System Requirements ................................................................................................................................................................... 27
Deep Security Manager Performance Features .................................................................................................................................. 29
Creating an SSL Authentication Certificate ....................................................................................................................................... 30
Connecting to your instance via SSH ............................................................................................................................................... 32
Seitenansicht 2
1 2 3 4 5 6 7 8 ... 33 34

Kommentare zu diesen Handbüchern

Keine Kommentare