Page tree
    Skip to end of metadata
    Go to start of metadata

    When planning to deploy Infrastructure Management in your environment, consider some of the following security options that you can implement following the installation of the Infrastructure Management components. 

    Related topics

    Network port schematics for Infrastructure Management

    Ports that can be configured when installing Infrastructure Management

    Ports that can be configured after installation

    Configuration files used in Infrastructure Management

    Network ports

    Security considerations for TrueSight Operations Management

    Security guidelines for the PATROL Agent