| The Cisco Security Agent product is extremely successful in protecting endpoints around the world. The power it provides must be understood to use it effectively and efficiently. This book attempts to provide guidance and examples to help CSA users worldwide do just that.
This book is intended for anyone currently using the CSA product as well as anyone targeting its implementation. Although this book is a useful resource for the implementation and tuning teams, it also provides a great deal of information pertinent to project managers and IS/IT managers who are tasked with overseeing a CSA project or implementation.
This book is intended to be read cover-to-cover or used as a reference when necessary. The book is broken into five sections and two appendixes that cover a CSA overview, CSA project planning and implementation, CSA installation, CSA policy, monitoring, and troubleshooting. |
|
|
|