Preparing For Your Installation; Deploying Strm; Additional Hardware Requirements; Additional Software Requirements - Juniper SECURITY THREAT RESPONSE MANAGER - SOFTWARE INSTALLATION REV 1 Installation Manual

Table of Contents

Advertisement

1
P
I
NSTALLATION
This chapter provides information for when planning your STRM deployment
including:
Your STRM deployment may consist of STRM installed on one or multiple
systems. You can use the STRM three-tier architecture to install any or all
components on a single server for small enterprises or distributed across multiple
servers for maximum performance and scalability in large enterprise
environments.
To ensure a successful STRM deployment, adhere to the recommendations in this
document.
REPARING

Deploying STRM

Additional Hardware Requirements

Additional Software Requirements

Browser Support

Preparing Your Network Hierarchy

Identifying Network Settings

Identifying Security Monitoring Devices and Flow Data Sources

Identifying Network Assets
STRM Installation Guide
F
Y
OR
OUR

Advertisement

Table of Contents
loading

This manual is also suitable for:

Strm

Table of Contents