Chapter 14. Host Intrusion Prevention

Upon completion of this chapter, you will be able to perform the following tasks:

  • Understand endpoint protection requirements

  • Identify Cisco Security Agent (CSA)-supported platforms

  • Understand CSA policies

  • Configure CSA policies

  • Monitor host events using the Management Center for CSA (CSA MC)

  • Understand basic event reports using CSA MC

  • Understand how to build and deploy agent kits

  • Configure groups and hosts using CSA MC

  • Explain the purpose of the Profiler tool

Network security devices, such as firewalls and intrusion detection systems, enhance the security posture of your network. You must also, however, provide security protection at the endpoint or host level. With the Okena acquisition, Cisco enhanced its endpoint ...

Get CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.