Chapter 6
Security Operations
In this chapter, you learn the following:
What logging and monitoring capabilities exist in Meraki Dashboard and how to configure them
How to integrate Meraki Dashboard with the Splunk Cloud Platform for advanced monitoring use cases
How to automate incident responses using Meraki Dashboard and solutions like ServiceNow
How to reduce the time required for compliance reporting by integrating Meraki Dashboard with solutions like AlgoSec
Logging and monitoring are two of the key themes seen across industry best practices, as identified in Chapter 2, “Security Frameworks and Industry Best Practices.” The NIST Cybersecurity Framework, as an example, requires that networks be continuously monitored for cybersecurity ...
Get Securing Enterprise Networks with Cisco Meraki now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.