This quick reference page provides a summary of the specifications of this topology. For a complete reference including installation details, please refer to the configuration guide listed below.
|Zeek Intrusion Detection||Zeek Intrusion Detection v1.0 Installation and Configuration Guide|
You may request virtual machine templates for the Zeek Intrusion Detection pod from CSSIA.
The virtual machines in the pod are listed in the table below.
The Center for Systems Security and Information Assurance (CSSIA) provides virtual machine templates to install on the pod.
To request access to the preconfigured virtual machine templates from CSSIA: