The process of information gathering for a Cisco Security Agent (CSA) deployment is critical.
You must have a good understanding of your computing and network environments before deploying any security package, and you need to take the following into account:
The types of desktops, laptops, and servers affected.
The types of standard applications used in your environment.
How your users typically operate on a day-to-day basis.
How you best communicate changes to the environment. How your users like to receive notifications of changes to their work environment.
Nonstandard or applications not supported by your central IT department or central software-support organization.
Network configuration and deployment.
You must ...