O'Reilly logo

Advanced Host Intrusion Prevention with CSA by Chad Sullivan, - CCIE No. 6394, Jeff Asher, Paul Mauvais

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. Information Gathering

The process of information gathering for a Cisco Security Agent (CSA) deployment is critical.

You must have a good understanding of your computing and network environments before deploying any security package, and you need to take the following into account:

  • The types of desktops, laptops, and servers affected.

  • The types of standard applications used in your environment.

  • How your users typically operate on a day-to-day basis.

  • How you best communicate changes to the environment. How your users like to receive notifications of changes to their work environment.

  • Nonstandard or applications not supported by your central IT department or central software-support organization.

  • Network configuration and deployment.

You must ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required