Security planning for Infrastructure Management
When planning to deploy Infrastructure Management in your environment, consider some of the following security options that you can implement following the installation of the Infrastructure Management components.
Related topics
Network-port-schematics-for-Infrastructure-ManagementPorts that can be configured after installation
Ports that can be configured when installing Infrastructure Management
Configuration files used in Infrastructure Management
Security-considerations-for-TrueSight-Operations-ManagementSecurity guidelines for the PATROL Agent