Suggested Answer:B🗳️
You must configure IBM Security QRadar Risk Manager to read configuration information from the devices in your network. The configuration information that is collected from your network devices generates the topology for your network and allows QRadar Risk Manager to understand your network configuration. Data that is collected in QRadar Risk Manager is used to populate the topology with key information about your network environment. Data collection is a three-step process: 1. Provide QRadar Risk Manager with the credentials to download network device configurations. 2. Discover devices to create a device list in Configuration Source Management. 3. Back up the device list to obtain the device configurations and populate the topology with data about your network. References: http://www.ibm.com/support/knowledgecenter/SS42VS_7.2.6/com.ibm.qradar.doc/c_qrm_gs_ntwk_dta_col.html
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Comments