Chapter 9. Using CSA MC Reports

This chapter covers the following topics:

Chapter 8, “Monitoring CSA Events,” covered using the event log to provide the insight needed to manage your CSA deployment. The historical and near real-time views into the event database provide much of what you need when responding to security issues, alerting necessary parties, tuning the initial deployment, and developing future policy based on historical endpoint usage information. To most efficiently use the reporting feature of the CSA MC, it is necessary to understand how to efficiently use event sets, because they are the ...

Get Cisco Security Agent now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.