Chapter 3. Information Gathering
The process of information gathering for a Cisco Security Agent (CSA) deployment is critical.
You must have a good understanding of your computing and network environments before deploying any security package, and you need to take the following into account:
The types of desktops, laptops, and servers affected.
The types of standard applications used in your environment.
How your users typically operate on a day-to-day basis.
How you best communicate changes to the environment. How your users like to receive notifications of changes to their work environment.
Nonstandard or applications not supported by your central IT department or central software-support organization.
Network configuration and deployment.
You must ...
Get Advanced Host Intrusion Prevention with CSA now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.