Chapter 10. Application Deployment Investigation

This chapter covers the following topics:

Throughout this book, you have learned about the various components in the Cisco Security Agent (CSA) architecture that enable you to protect endpoints and granularly control applications on those systems. Although this product provides you with a great advantage and is an excellent tool to have in your bag of tricks, it is not always the applications and processes you “know” about that cause your most debilitating issues.

In addition to protecting and controlling your systems that use a standard set of applications based on a corporate desktop image, you also need to understand ...

Get Cisco Security Agent now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.