Step 2. Viewing the End User License Agreement and Privacy Policy

To continue installation, please read the End User License Agreement (EULA) and accept its terms. Installation will not continue until you accept the terms of the End User License Agreement.

You also need to read the Privacy Policy and accept its terms.

To accept the terms of the End User License Agreement and Privacy Policy:

  1. Select the language for viewing the End User License Agreement and Privacy Policy in the list.

    For example, if you want to view the End User License Agreement and Privacy Policy in English, select English.

  2. Press ENTER.

    This opens a window showing the End User License Agreement text.

  3. Please read the End User License Agreement.
  4. If you accept the terms of the End User License Agreement, click the I accept the terms button.

    This opens a window displaying the text of the Privacy Policy.

  5. Please carefully read the Privacy Policy.
  6. If you accept the terms of the Privacy Policy, click the I accept the terms button.

The Setup Wizard proceeds to the next step.

See also

Installing and configuring the Central Node and Sensor components on the same server

Step 1. Starting installation of the Central Node and Sensor components and selecting a server role

Step 3. Selecting a disk for installing the Central Node and Sensor components

Step 4. Creating an account for working in the administrator menu and in the server management console

Step 5. Assigning the host name

Step 6. Enabling a network interface for the first time

Step 7. Configuring the default network route

Step 8. Configuring DNS settings

Step 9. Configuring proxy server connection settings

Step 10. Setting the time zone

Step 11. Configuring time synchronization with an NTP server

Step 12. Connecting to the server with the Sandbox component

Step 13. Allocating the disk for the Targeted Attack Analyzer component's database

Step 14. Creating a local administrator account for the web interface

Step 15. Configuring receipt of mirrored traffic from SPAN ports

Step 16. Configuring integration with a proxy server via ICAP

Step 17. Configuring integration with a mail server via POP3

Step 18. Configuring integration with a mail server via SMTP

Page top