Installing Software Vulnerability Manager CentOS
The following steps appear in the order that they appear in the installation procedure. You can use the arrow and Page Up/Down keys to navigate, press ESC to go back or F2 to open an administrator shell.
• | Initial Configuration |
• | Network Configuration |
• | Customer Information |
• | Server Configuration |
• | Disk Initialization |
• | Database Configuration |
• | Proxy Configuration |
• | Email and SMS Settings |
• | Software Updates |
• | LDAP Configuration |