This quick reference page provides a summary of the specifications of this topology. For a complete reference including installation details, please refer to the configuration guide listed below.
Topology | Supports | Documentation |
---|---|---|
Zeek Intrusion Detection | Zeek Intrusion Detection v1.0 Installation and Configuration Guide |
You may request virtual machine templates for the Zeek Intrusion Detection pod from CSSIA.
The virtual machines in the pod are listed in the table below.
Virtual Machines |
---|
Client |
The Center for Systems Security and Information Assurance (CSSIA) provides virtual machine templates to install on the pod.
To request access to the preconfigured virtual machine templates from CSSIA: