Complete the VMware Sensor Setup

Role Availability Read-Only Investigator Analyst Manager

After you initialize a new USM Anywhere Sensor, you must configure it in the Setup Wizard. As you complete the VMware Sensor configuration, USM Anywhere performs specific actions, like running an asset discovery scan and collecting logs.

Accessing the Setup Wizard

The Setup Wizard is accessible under the following circumstances:

  • After you first log in to the USM Anywhere web user interface (UI) and see the Welcome to USM Anywhere page, click Get Started to launch the Setup Wizard.
  • If you have already registered one USM Anywhere Sensor but did not complete the setup before logging out, the USM Anywhere Sensor Configuration page launches automatically at your next login to remind you to finalize configuration of the sensor. From that page, you click Configure to launch the Setup Wizard and complete the sensor configuration.

  • If you registered an additional USM Anywhere Sensor, but did not complete the setup, the Sensors page displays an error () in the Configured column. See Sensors Page Overview for more information.

    Go to Data Sources > Sensors, and then click the sensor name to complete the sensor configuration. See USM Anywhere Sensor Management for more information.

Configuring the VMware Sensor in the Setup Wizard

The first time you log in from the Welcome to USM Anywhere web page, the Setup Wizard prompts you to complete the configuration of the first deployed sensor. Thereafter, you can use the Sensors page to configure an additional sensor or to change the configuration options for a deployed sensor. See Sensors Page Overview for more information.

Note: You must have already configured your network interfaces for VMware. See Set Up USM Anywhere on the VMware Virtual Machine for more information.

Within the Setup Wizard, complete the configuration on each page.

Steps in the Setup Wizard

Next...

Now is a great time to run a vulnerability scan. See Vulnerability Assessment for detailed information about running a vulnerability scan.