Configuring after installation
This section contains information about one-time and recurring configuration tasks that you can perform after you install the TrueSight IT Data Analytics product:
|Enable security for certain data-flow channels and user inputs specified on the product interface.
|Configure the system to specify the rules by which URLs can bypass the cross-site request forgery (CSRF) checks
|Configuring access URLs
Set up emails to enable sending email notifications for user creation or retrieving forgotten passwords, and notifications alerts.
|Perform configuration changes that might be required before scaling up your deployment.
|Configurations required before scaling up
For instructions about integrating with the external systems supported, see Integrating.