Current ThreatQ Version Filter
 

ThreatQ Installation Options

Based on your business needs, you can install ThreatQ as a virtual instance (OVA) or on your own device (BYOD).  Virtual installs involve downloading the ThreatQ OVA on your Hypervisor.  Bring Your Own Device (BYOD) installs leverage the TQAdmin tool.

In addition, ThreatQuotient also provides hosting services and support for air-gapped instances.

ThreatQ as a Virtual Instance

  1. Review and verify compliance with the ThreatQ system requirements as well as the virtual machine prerequisites.
  2. Install ThreatQ as a virtual instance.
  3. Log into ThreatQ for the first time.
  4. Configure network connectivity.
  5. Download TQAdmin for future use in upgrading ThreatQ.

ThreatQ on Your Own Device

  1. Review and verify compliance with the ThreatQ system requirements as well as the BYOD prerequisites and Amazon Web Services guidelines (if applicable).
  2. Configure network connectivity.
  3. Prepare your device for installation.
  4. Download and run TQAdmin.
  5. Log into ThreatQ for the first time.

Hosting Services

ThreatQuotient offers hosting services for your ThreatQ applications.

Air Gapped Environments

ThreatQuotient provides installation steps for Air Gapped environments - which differ slightly from the standard installation steps for non-air gapped environments. The install guide is available on the ThreatQ Installation Landing page.

See the AGDS section for details regarding AGDS commands, functions, and upgrade procedures.