Your NSX-T Data Center environment must meet the following prerequisites before you can use the NSX Suspicious Traffic feature.
Verify that all the license and software requirements are met, including configuring the NSX Intelligence feature.
See System Requirements for the NSX Suspicious Traffic Feature for details.
Ensure that you have an NSX-T role that is authorized to use the NSX Suspicious Traffic feature.
To access all the NSX Suspicious Traffic functionalities during an NSX Manager session, the NSX-T user account you are using must be assigned one of the following NSX-T Data Center built-in roles. See Role-Based Access Control in NSX Intelligence for more information.