Table of Contents
About Deep Security ....................................................................................................................................................................... 4
Installation Checklist....................................................................................................................................................................... 6
Deep Security Licensing on AWS Marketplace ..................................................................................................................................... 7
Check Permissions and Communication ............................................................................................................................................. 8
Database Deployment Considerations................................................................................................................................................ 9
Installing the Deep Security Manager .............................................................................................................................................. 11
Upgrading the Deep Security Manager............................................................................................................................................. 15
Add Amazon EC2 Resources to Deep Security Manager ...................................................................................................................... 16
Installing Deep Security Agents ...................................................................................................................................................... 19
Appendices ................................................................................................................................ 26
System Requirements ................................................................................................................................................................... 27
Deep Security Manager Performance Features .................................................................................................................................. 29
Creating an SSL Authentication Certificate ....................................................................................................................................... 30
Connecting to your instance via SSH ............................................................................................................................................... 32
Kommentare zu diesen Handbüchern