Your NSX-T Data Center environment must meet the following prerequisites before you can use the NSX Suspicious Traffic feature.

  • Verify that all the license and software requirements are met, including configuring the NSX Intelligence feature.

    See System Requirements for the NSX Suspicious Traffic Feature for details.

  • Ensure that you have an NSX-T role that is authorized to use the NSX Suspicious Traffic feature.

    To access all the NSX Suspicious Traffic functionalities during an NSX Manager session, the NSX-T user account you are using must be assigned one of the following NSX-T Data Center built-in roles. See Role-Based Access Control in NSX Intelligence for more information.

    • Enterprise Admin

    • Security Admin