Summary

Understanding, interpreting, and using the event log database efficiently directly affects how successful your CSA deployment will be. For day-to-day post-installation monitoring of CSA, refer to the various views available below Events on the main navigation menu to find the information required. Another important topic covered in this chapter is alerting, which speeds in the remediation of security events affecting your architecture by alerting via other management tools and informing the necessary individuals as soon as possible. In the coming chapters, you begin to use the information within the database to assist in tuning the product for an effective, unintrusive, and highly secure deployment.

Get Cisco Security Agent now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.