Configuring a secured connection

You can configure security for the following connections:

  • Data flow between the Collection Agent and Collection Station.
  • All user inputs (including credentials) for creating objects such as data collectors, email configuration, and so on.

To enable security, you must perform the following configurations:

Related topics

Planning

Security considerations

Security planning for IT Data Analytics

TLS considerations for IT Data Analytics

Was this page helpful? Yes No Submitting... Thank you

Comments