Documentation Center
AlienVault® USM Anywhere™

Completing the AWS Sensor Setup

Role Availability Read-Only Analyst Manager

After you initialize a new USM Anywhere Sensor, you must configure it using the Setup Wizard. As you configure the AWS sensor, USM Anywhere performs specific actions, like running an asset discovery scan or collecting security events from a predefined cloud storage location.

About Accessing the Setup Wizard

The Setup Wizard is accessible under the following circumstances:

  • When you first log into the USM Anywhere web UI and see the Welcome to USM Anywhere page, click Get Started.
  • If you registered a first Sensor, but did not complete the setup and then logged out, the USM Anywhere Sensor Configuration page launches automatically at your next login to remind you to finalize configuration of the Sensor. From that page, you click Configure to launch the Setup Wizard and complete the Sensor configuration.

  • If you registered an additional Sensor, but did not complete the setup, the Sensors page displays an error ( ) in the Configured column.

    Click Configure ( ) to launch the Setup Wizard and complete the Sensor configuration.

Configuring the Sensor in the Setup Wizard

The first time you log in from the Welcome to USM Anywhere web page, the Setup Wizard prompts you to complete the configuration of the first deployed Sensor. Thereafter, you can use the Sensors page to configure an additional Sensor or to change the configuration options for a deployed Sensor.

The Setup Wizard displays the configuration steps for the AWS sensor

The Amazon Web Services Configuration page provides information about the asset discovery that occurs upon the initial deployment of the USM Anywhere Sensor, summarizing the number of instances, instance types, and regions in your environment.

Review the initial discovery in your AWS environment

Click Next to proceed with the Setup Wizard and complete additional configuration on each page.


Now's a great time to run a vulnerability scan. For detailed information about running a vulnerability scan, go to Vulnerability Assessment.