Skip to main content

LevelBlue Named Official Cybersecurity Advisor of the PGA of America. Learn more

LevelBlue Named Official Cybersecurity Advisor of the PGA of America. Learn more

Services
Cyber Advisory
Managed Cloud Security
Data Security
Managed Detection & Response
Email Security
Managed Network Infrastructure Security
Exposure Management
Security Operations Platforms
Incident Readiness & Response
SpiderLabs Threat Intelligence
Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Operational Technology
End-to-end OT security
Microsoft
Unlock the full power of Microsoft Security
Securing the IoT Landscape
Test, monitor and secure network objects
Why LevelBlue
About Us
Awards and Accolades
LevelBlue SpiderLabs
PGA of America Partnership
Secure What's Next
LevelBlue Security Operations Platforms
Security Colony
Partners
Microsoft
Unlock the full power of Microsoft Security
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Loading...
Loading...

INFO: What are the system requirements for Security Reporting Center 2.0?

Expand / Collapse


This article applies to:

  • Security Reporting Center 2.0

Question:

What are the system requirements for Security Reporting Center 2.0?

Information:

Microsoft Windows Requirements

The following table shows the requirements for Microsoft Windows computers.

Component Minimum Requirements
Processor Dual Pentium III 733 MHz or higher
Disk Space 1GB free disk space. SCSI recommended.
RAM 1GB
Operating System Microsoft Windows NT 4.0 with Service Pack 4.0 or higher
Database Application MySQL
Browser Microsoft Internet Explorer 4.x or higher, or
Netscape 4.5 or higher

Reports rely on Java, which is installed with most browsers. However, Java support is not included by default when installing Netscape 6.0 or Netscape 6.1. If you use either of these browsers, make sure you also install Java.

Notes:

Multiple CPUs are recommended for large numbers of profiles and/or users. More disk space and memory is needed to analyze large log files. Also, it is best to install Security Reporting Center on a separate, dedicated system which has access to all of the log files.

This article was previously published as:
NETIQKB13364

To contact LevelBlue about this article or to request support:


Rate this Article:
     
Tags:

Add Your Comments


Comment submission is disabled for anonymous users.
Please send feedback to Trustwave Technical Support or the Webmaster
.