Your NSX environment must meet the following prerequisites before you can use the NSX Suspicious Traffic feature included in NSX Intelligence.

  • Verify that all the license and software requirements are met, including configuring the NSX Intelligence feature.

    See System Requirements for the NSX Suspicious Traffic Feature for details.

  • Ensure that you have an NSX role that is authorized to use the NSX Suspicious Traffic feature.

    To access all the NSX Suspicious Traffic functionalities during an NSX Manager session, the NSX user account you are using must be assigned one of the following NSX built-in roles. See Role-Based Access Control in NSX Intelligence for more information.

    • Enterprise Admin

    • Security Admin