Advanced Threat Defense Appliances Depending on the model, the Advanced Threat Defense Appliance is a 1-U or 2-U rack dense chassis with Intel® Xeon® E5-2600 product family processor. The Advanced Threat Defense Appliance runs on a pre-installed, hardened Linux kernel 3.6.0 and comes preloaded with the Advanced Threat Defense software. The Advanced Threat Defense Appliance is available in the following models: ATD-3000 — Standard model is a 1U chassis ATD-6000 — High-end model is a 2U chassis ATD-3100 — Standard model is a 1U chassis ATD-6100 — High-end model is a 1U chassis The Advanced Threat Defense Appliances are purpose-built, scalable, and flexible high-performance servers designed to analyze suspicious files for malware. The following are the primary functions of the Advanced Threat Defense Appliance: Host the Advanced Threat Defense software that analyzes files for malware. Host the Advanced Threat Defense web interface. Host the virtual machines used for dynamic analysis of suspicious files. Note: For the performance values related to the appliances, contact Support. Parent topic: Setting up the Advanced Threat Defense Appliance
Advanced Threat Defense Appliances Depending on the model, the Advanced Threat Defense Appliance is a 1-U or 2-U rack dense chassis with Intel® Xeon® E5-2600 product family processor. The Advanced Threat Defense Appliance runs on a pre-installed, hardened Linux kernel 3.6.0 and comes preloaded with the Advanced Threat Defense software. The Advanced Threat Defense Appliance is available in the following models: ATD-3000 — Standard model is a 1U chassis ATD-6000 — High-end model is a 2U chassis ATD-3100 — Standard model is a 1U chassis ATD-6100 — High-end model is a 1U chassis The Advanced Threat Defense Appliances are purpose-built, scalable, and flexible high-performance servers designed to analyze suspicious files for malware. The following are the primary functions of the Advanced Threat Defense Appliance: Host the Advanced Threat Defense software that analyzes files for malware. Host the Advanced Threat Defense web interface. Host the virtual machines used for dynamic analysis of suspicious files. Note: For the performance values related to the appliances, contact Support. Parent topic: Setting up the Advanced Threat Defense Appliance