Final step: Verify the protector installation
In the Data Security module of the Security Manager, verify that the protector status is no longer pending and that the icon displays its active status. Refresh the browser.
Click Deploy.
In the protector command-line interface, the following appears:
The protector is now ready to be configured.