Understand the prerequisites that must be met before you can get started using the NSX Suspicious Traffic feature in Security Intelligence. Get an overview of how it works, learn the terminology used with the feature, and prepare the detectors that you want to use to monitor the network traffic flow in your NSX environment.