CSA Capabilities

Because CSA resides on the endpoint and observes all system interaction, it can be very effective in securing the endpoint, controlling how the endpoint interacts with surrounding systems, and controlling how users can interact with the local system. Upon installation, CSA begins monitoring local system resources and maintains state tables of what is happening on the system so that the locally enforced security policy is not violated. The agent monitors file and application access and usage, network transactions, registry access, operating system kernel usage, COM object access, and other system components to ensure the strict enforcement of the defined security policy.

Because of its intimate knowledge of what is happening in ...

Get Cisco Security Agent now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.