October 2015
Intermediate to advanced
432 pages
9h 55m
English
There is more to configuring the system than creating strategic policies to direct the way your devices detect network activity. You can apply settings to the system such as user preferences, time zones, audit logging, and other key factors like health checks to alert you to conditions within your devices.
So let’s get started by going over the system settings and user preferences. We’ll also guide you through ...