Chapter 8. Monitoring CSA Events

This chapter covers the following topics:

As the Cisco Security Agent (CSA) hosts deployed throughout your enterprise architecture begin to protect systems from malicious code, worms, viruses, unauthorized user interaction, and other various policy violations, the CSA Management Console (MC) begins to receive events regarding the various issues. These events are correlated in a central repository on the CSA MC known as the event log. These events provide the security operations team with great insight into their environment. From here, they can see what is currently or has already impacted their environment and tighten current policies or ...

Get Cisco Security Agent now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.