To track your progress in activating and configuring Security Intelligence, and to quickly guide you on getting started in using its features, use the following checklist.

Perform these procedures in the order they are listed.

  1. Install NSX 3.2 or later.

    See the installation workflow details in the NSX Installation Guide for version 3.2 or later that is delivered with the VMware NSX Documentation set.

  2. Ensure you have met all the Security Intelligence system requirements and reviewed all the resource limits listed in Preparing to Activate Security Intelligence.

  3. (Optional) If you are upgrading from Security Intelligence 1.2.x or earlier, see Upgrading Security Intelligence for details.

  4. If you are activating Security Intelligence for the first time, use the NSX Manager 3.2 or later user interface to deploy the NSX Application Platform with the Advanced form factor (for production environment) or Evaluation form factor (for non-production environment).

    Security Intelligence is an application hosted on NSX Application Platform. For details, see the Deploying and Managing the VMware NSX Application Platform for version 3.2 or later that is delivered with the VMware NSX Documentation set.

  5. Activate Security Intelligence on the NSX Application Platform. See Activate Security Intelligence for more information.

  6. (Optional) Configure Security Intelligence settings to define for which standalone hosts or clusters of hosts Security Intelligence needs to collect network traffic data.

    By default, after Security Intelligence is activated, it starts collecting network traffic data on all standalone hosts and cluster of hosts in your NSX environment. You can optionally configure Security Intelligence to deactivate traffic data collection for one or more standalone hosts or clusters of hosts. See Configure Security Intelligence Settings.

  7. To start viewing the graphical visualization of your NSX workloads, click Go to NSX Intelligence on the Security Intelligence feature card on the Systems > NSX Application Platform UI page.

    Alternatively, navigate to Plan & Troubleshoot > Discover & Take Action and refresh the web browser you are using for the NSX Manager session.

  8. Begin using the Security Intelligence features, including the NSX recommendations for micro-segmentation feature and the NSX Suspicious Traffic feature.

    For information about getting started using Security Intelligence, see the Using and Managing Security Intelligence document for version 3.2 or later.